CEH - Certified Ethical Hacker
Overview
Think like a hacker to identify and fix vulnerabilities before they are exploited.
Training Objectives
- Learn the attack techniques and methodologies used by hackers.
- Conduct internal testing: scans, enumeration, exploitation.
- Master the reconnaissance, scanning and exploitation phases.
- Write penetration test reports and propose remediation plans.
Target Audience
Security professionals, analysts, penetration testers and technical managers looking to strengthen their offensive skills.
Prerequisites
Basic knowledge of networking, systems and security; familiarity with Linux and Windows.
Curriculum
- Introduction to ethical hacking.
- Footprinting and reconnaissance.
- Network scanning.
- Enumeration.
- Vulnerability analysis.
- System hacking.
- Malware threats.
- Sniffing.
- Social engineering.
- Denial of service.
- Session hijacking.
- Evading IDS, firewalls and honeypots.
- Web server hacking.
- Web application hacking.
- SQL injection.
- Wireless network hacking.
- Mobile platform hacking.
- IoT and OT hacking.
- Cloud computing.
- Cryptography.
Duration & Format
5 days, in-person or remote, with a practical lab and EC-Council certified support.
Next Session
30 July – 12 August 2025 in Nouméa
Information & Registration
Contact us for any questions or to register: ceh@form.addo.nc
Learn more about the certification on the official website: CEH - EC-Council