DO YOU WANT TO KNOW OUR SERVICES?SITIO EN ESPAÑOL

IT SECURITY

Ethical Hacking Certified Associate (EHCA)

Ethical Hacking Certified Associate (EHCA)Ethical Hacking Certified Associate (EHCA)

Accelerated development in the sectors of computing and telecommunications has significantly affected information management in all human activities. Hacking is intimately linked to the birth of the Internet and the economic, technical, and social opportunities that it meant from its beginnings in the 60s and 70s. From its military origin to its massive proliferation since the year 2000 and its implementation Global today in a multitude of electronic devices, the Internet has served as a vehicle of popularization, dissemination, and exchange for this movement. For this reason, ethical hackers are essential to secure that the organization’s information is as protected as possible.

TopicsTopics

The topics you will learn are:

*Chapter 1: Introduction

  • What is Hacking?
  • What is a hacker?
  • Basic concepts
  • Hacker ethics
  • Fundamental values
  • Ethical hacking
  • Vulnerabilities
  • ADVANTAGES of Ethical Hacking
  • DISADVANTAGES of Ethical Hacking
  • Phases of hacking
  • Penetration test
  • What is a pentester or ethical hacker?
  • Why are pentesters needed?
  • Why become a pentester?
  • Pen-test (penetration test)
  • Pentesting tools

*Chapter 2: Recognition

  • Types of recognition
  • Google hacking
  • Who-Is
  • Nslookup
  • Maltego
  • Social engineering

*Chapter 3: Scanning

  • Scan classes
  • Port states
  • NMAP scanner
  • Vulnerability scanners

*Chapter 4: Enumeration

  • Netbios and CIFS/SMB Protocols
  • Other network protocols
  • Windows Enumeration
  • Enumeration tools

*Chapter 5: Hacking

  • Hacking mechanisms
  • Hacking frameworks
  • Metasploit
  • Key attacks
  • Malware attacks
  • DoS attacks
  • MITM attacks
  • Web and WiFi hacking

*Chapter 6: Writing the Report

  • Suggested Steps
  • Tips to avoid a mental breakdown
  • Documentation tools
  • Sample reports

*Practical laboratory

  • Hacking Metasploitable 2
  • Creating fake emails with sendemail and client-side attacks with SET tool
  • Cracking keys with MEDUSA
  • MITM attack with Ettercap and Wireshark
  • Hacking WEP with Aircrack
  • WPA/WPA2 key attack
MethodologyMethodology

At the end of the course, students will have the general knowledge necessary to be able to carry out penetration tests professionally on IT infrastructure, without causing damage to its operability.

  • 24/7 e-learning platform
  • Web simulator
  • Practical laboratory
  • Digital badge
  • 2 attempts to pass the exam
  • Exam Name: Ethical Hacking Certified Associate (EHCA)
  • Exam Formart: Multiple-Choice questions
  • Exam Delivery: Web-based (safe exam browser), closed book, not outside assistance, timed
  • Exam Duration: Once the exam begins, students have 60 minutes to complete the exam
  • Number of Questions: 40
  • Passing Score: 70%
  • Available Languages: English and Spalnish
Date -- TimeDate -- Time

On demand

OrientationOrientation

The course is aimed at IT students and professionals who wish to learn how to perform Intrusion Testing or Ethical Hacking and who wish to take steps towards their preparation for the EHCA certification.

To benefit from the course it is important to meet the following prerequisites:
– The student must have a solid knowledge of TCP/IP networks.
– Basic knowledge of Linux and Windows

PRICE - PAYMENT METHODSPRICE - PAYMENT METHODS
Price: USD‎‏‏‎ ‎100.00

Payment Methods:

– If you are located in Argentina, choose the currency “ARS” on the web and then pay by bank transfer or Mercado Pago (ask for other means of payment).

– If you are outside of Argentina, choose the currency “USD” and then pay by PayPal (ask for other means of payment).

Paypal is available for all countries!

Escribinos

Tel (ARG) : +5491168978677
Tel (USA) : +15129566271

contacto@ateitiscorp.com

contact@ateitiscorp.com

312 W 2ND St 1702 Casper, WY 82601