The course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The CEH is the first of a series of 3 comprehensive courses (CEH, ECSA and the APT course) to help a cyber security professional master penetration testing.
Ethical hacking describes hacking performed by an individual or group of individuals, usually hired by companies or governments, to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. Ethical Hacking, often applied in a method called Penetration Testing, is an act of forceful access into systems or networks to discover threats which may be exploited by malicious actors resulting in the loss of data, financial loss, or other major damages.
CEH or Certified Ethical Hacker certification is for the IT professionals who seek a career in the security let that be System security, Network security, Server security, Web application Security, Cloud Security or Mobile Security. The CEH professional easily understands the loopholes and vulnerabilities that are found in a computer network or security system. He or she then uses the information to improve the system. The ethical hacker, as the CEH certified professional may be said to be working as, thinks just like a criminal hacker in many ways, finding out the weaknesses of a computer and network. But the focus here is towards giving system and processes more teeth in lieu of the security threats.
In this course, you will describe the major networking technologies and systems of modern networks, and configure, manage, and troubleshoot modern networks.
- Identify basic network theory concepts and major network communications methods.
- Describe bounded network media.
- Describe unbounded network media.
- Identify the major types of network implementations.
- Identify TCP/IP addressing and data delivery methods.
- Analyze routing and switching technologies.
- Identify the components of a TCP/IP implementation.
- Analyze network security.
- Implement network security.
- Identify the components of a WAN implementation.
- Identify the components used in cloud computing and virtualization.
- Identify the components of a remote network implementation.
- Manage networks.
- Troubleshoot network issues.