OP 17 March, 2022 - 04:43 PM
TOPICS
1. The Truth About Living in a Technology Based World
2. Overview of the CEH Certification Program
3. How to Build a Lab to Hack Safely
4. Installing and Configuring Your Windows Server VMs
5. Installing and Configuring Your Desktop VMs
6. Information Security Overview
7. Security Threats and Attack Vectors
8. Hacking Concepts
9. Hacking Phases
10. Attack Types
11. Information Security Controls
12. How to Prepare for the Certified Ethical Hacker Exam
1. The Truth About Living in a Technology Based World
2. Overview of the CEH Certification Program
3. How to Build a Lab to Hack Safely
4. Installing and Configuring Your Windows Server VMs
5. Installing and Configuring Your Desktop VMs
6. Information Security Overview
7. Security Threats and Attack Vectors
8. Hacking Concepts
9. Hacking Phases
10. Attack Types
11. Information Security Controls
12. How to Prepare for the Certified Ethical Hacker Exam