Requesting more information and/or the current price of this training is easy. We'll take any current promotions, subsidies, or customer discounts into account.
In de Certified Ethical Hacker (CEH) training leer je alles over de meestvoorkomende hackaanvallen en bekendste targets. Met ontwikkelingen op het gebied van bijvoorbeeld Internet of Things (IoT), Blockchain (inclusief Cryptocurrency), Cyber Warfare, Dark Web, Biometrie, Slimme Meters / Auto's, Artificial Intelligence en Advanced Persistent Threats veranderen de mogelijkheden voor criminele hackers en onwelgevallige overheden echter in een bijna niet bij te houden tempo.
Deze training neemt je mee in deze nieuwe realiteit en verbreedt je hackkennis naar al deze en vele andere geavanceerde terreinen waarmee je extra waarde toevoegt aan de beveiliging van elke innoverende organisatie.
Om deze training succesvol te kunnen volgen is CEH- of vergelijkbare kennis vereist evenals ervaring met hackingtools.
5 dagen
Module 1: Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers
Module 2: Network Insights for Deeper Analytics
Module 3: Read Privileged Kernel Memory and Leak Data to Escalate Privileges
Module 4: Advanced Blockchain Exploits and Cryptocurrency Mining Attacks
Module 5: Sophisticated Government use of Cyberweapon Attacks and How they work
Module 6: Principles of Quantum Entanglement to Secure Communication (Unhackable networks)
Module 7: Guidance For Cybersecurity Disclosure and Advanced Techniques for Cyber Bounty hunting
Module 8: Advanced Mobile Banking and ATM Trojans
Module 9: Quantum Computing and Cryptography
Module 10: Dark Web and How to Download Sophisticated Stealth Tools
Module 11: Advanced Cloud Security - Azure, AWS, Digital Ocean, Google VM.
Module 12: H2O Driverless AI, Amazon SageMaker, and Azure Machine Learning AutoML
Module 13: Deepfakes and Generating Automated Fake news
Module 14: Advanced reat Modelling Attacks
Module 15: Cognitive-Powered Security Intelligence Platform Syllabus
Module 16: Types of Cyberthreat Intelligence
Module 17: Advanced Ransomware and Cryptojacking Attacks
Module 18: Open Source Intelligence in Cybersecurity
Module 19: Attacking AI Chatbot and Voice Assistants - Siri, Google Home and Alexa
Module 20: DeepLocker: How AI Can Power a Stealthy New Breed of Malware
Module 21: Cybersecurity Insurance
Module 22: Advanced File System Protection With Cyber Deception
Module 23: Legal AI: How Machine Learning Is Aiding, Concerning Law Practitioners
Module 24: Advanced reat Hunting Techniques
Module 25: Vulnerability Management Process Based on Weaponization and Asset Value
Module 26: Passwordless Authentication With FIDO
Module 27: Advanced PowerShell Attacks
Module 28: Next Generation of the Cyber Range Attacks
Module 29: Advanced Payment Gateway and Financial Cyberattacks
Module 30: Developing Immersive Cybersecurity Simulation
Module 31: Advanced DDOS Attacks Using IoT Botnets
Module 32: Attacking Hidden Endpoint Management Firewalls and IDS
Module 33: Advanced BGP Router Attacks
Module 34: Machine Learning with Automated Soware Vulnerabilities
Module 35: Hacking Medical IoT Devices
Module 36: Hacking Biometric Security, and Facial Recognition Systems
Module 37: Threat Intelligence Models for Cyber Warfare
Module 38: Artificial Intelligence and Cyberwarfare
Module 39: Hacking Connected Cars
Module 40: Hacking Power Grids
Module 41: Advanced Mobile Phone Hacking, Spying, GPS and Monitoring
Module 42: Home Automation and IoT Gadgets
Module 43: How To Use Tensorflow
Module 44: Advanced EMP Cyberattacks
Module 45: Hacking heart devices, pacemakers, insertable cardiac
Module 46: Integrating IoT Security Into Vulnerability Management Program
Module 47: Containers & Cloud Native Security
Train smarter, not harder. TSTC’s unique method ensures you actually master the skills—and pass with confidence.
Learn more about TSTC