Certified Ethical Hacker (CEH)
Register Now. Seats are limited.
Program:
1: Introduction to Ethical Hacking
2: Footprinting and Reconnaissance
3: Scanning Networks
4: Enumeration
5: System Hacking
6: Trojans and Backdoors
7: Viruses and Worms
8: Sniffers
9: Social Engineering
10: Denial of Service
11: Session Hijacking
12: Hacking Webservers
13: Hacking Web Applications
14: SQL Injections
15: Hacking Wireless Networks
16: Hacking Mobile Platforms
17: Evading IDS, Firewalls, and Honeypots
18: Buffer Overflow
19: Cryptography
20: Penetration Testing
Recomendamos que confirme toda a informação junto do promotor oficial deste evento. Por favor contacte-nos se detectar que existe alguma informação incorrecta.