Ontdek wat deze opleiding jou kan bieden!

 


 

Home Alle Opleidingen
Certified Ethical Hacker
terug naar zoekresultaten

Certified Ethical Hacker

Deelnemerskosten
€ 4.719,00 incl. BTW

Lesgeld

€ 3.900,00
Totaal excl. BTW
€ 3.900,00
BTW
€ 819,00
Totaal incl. BTW
€ 4.719,00
Startdata in een groep op locatie en online
Locatie: Houten
Start: 23-02-2026
Toon rooster
Aanmelden
Locatie: Amsterdam
Start: 23-02-2026
Toon rooster
Aanmelden
Locatie: Rotterdam
Start: 23-02-2026
Toon rooster
Aanmelden
Locatie: Eindhoven
Start: 23-02-2026
Toon rooster
Aanmelden
De cursus Certified Ethical Hacker van SpiralTrain behandelt de grondbeginselen van informatie beveiliging, de principes van ethisch hacken, relevante wetten en standaard procedures.
Image
Image

Foot Printing and Reconnaissance

Learn to use the latest techniques to perform foot printing and reconnaissance, a critical phase of the ethical hacking process.

Scanning Networks

Learn network scanning techniques. Learn various enumeration techniques, such as BGP and NFS exploits.

System Hacking

Learn system hacking methodologies like steganography, steganalysis attacks and tracks—used to discover vulnerabilities.

Malware Threats

Learn

...

Foot Printing and Reconnaissance

Learn to use the latest techniques to perform foot printing and reconnaissance, a critical phase of the ethical hacking process.

Scanning Networks

Learn network scanning techniques. Learn various enumeration techniques, such as BGP and NFS exploits.

System Hacking

Learn system hacking methodologies like steganography, steganalysis attacks and tracks—used to discover vulnerabilities.

Malware Threats

Learn different types of malware (Trojan, virus, etc.), APT and fileless malware, malware analysis procedure.

Sniffing

Learn using packet-sniffing techniques to discover network vulnerabilities, and to defend against sniffing attacks.

Social Engineering

Learn social engineering techniques, including identifying theft attempts and audit human-level vulnerabilities.

Denial-of-Service

Learn about different Denial of Service attack techniques, as well as the tools used to audit and protect a target.

Session Hijacking and SQL Injection

Understand session hijacking techniques to discover network-level session management and SQL Injection attacks.

Evading IDS, Firewalls, and Cryptography

Get introduced to firewall, intrusion detection system (IDS), and cryptography attacks.

Hacking Web Servers

Learn about web server attacks, including attack methodology used to audit vulnerabilities in web server infrastructures.

Hacking Wireless Networks

Understand different types of wireless technologies, including encryption and Wi-Fi sedcurity tools.

Hacking Mobile Platforms and IoT

Learn Mobile platform attack vector, IoT and OT attacks, mobile device management and mobile security guidelines.

Cloud Computing

Learn cloud computing concepts and threats, attacks, hacking methodology and cloud security techniques and tools.

Doelgroep Cursus Certified Ethical Hacker

De cursus Certified Ethical Hacker is bedoeld voor aanstaande cybersecurity professionals die technieken willen leren om zwakheden in systemen te vinden voordat criminelen dat doen.

Voorkennis Cursus Certified Ethical Hacker

Algemene kennis van computer systemen en security problemen is voldoende.

Uitvoering Training Certified Ethical Hacker

In de cursus leren de deelnemers door middel van hands-on exercises de tools en technieken om netwerken en systemen te onderzoeken op beveiligingsproblemen.

Certificering cursus Certified Ethical Hacker

De deelnemers krijgen na het goed doorlopen van de training een certificaat van deelname aan de cursus Certified Ethical Hacker. De cursus sluit aan op de vereisten voor het Certified Ethical Hacker examen van het EC-Council. Na afloop kan men met de opgedane kennis dit examen behalen.

Modules

Module 1 : Intro Ethical Hacking

  • Fundamental Security Issues
  • Ethical Hacking Basics
  • Laws and Standard Procedures

Module 2 : Foot Prints

  • Foot Printing Techniques
  • Reconnaissance Techniques
  • Pre-attack Phase

Module 3 : Scanning Networks

  • Network Scanning
  • Determining Device State
  • Countermeasures

Module 4 : Enumeration

  • Enumeration Techniques
  • Border Gateway Protocol
  • Network File Sharing

Module 5 : Vulnerability Analysis

  • Security Loopholes
  • Vulnerability assessment
  • Assessment Tools

Module 6 : System Hacking

  • Hacking Methodologies
  • Steganography Attacks
  • Steganalysis Attacks

Module 7 : Malware Threats

  • Malware Threats
  • Malware Analysis
  • Malware Countermeasures.

Module 8 : Sniffing

  • Packet-sniffing Techniques
  • Discover Network Vulnerabilities
  • Countermeasures Sniffing Attacks.

Module 9 : Social Engineering

  • Social Engineering Techniques
  • Identify Theft Attempts
  • Human-level Vulnerabilities

Module 10 : Denial-of-Service

  • Denial of Service (DoS)
  • Distributed DoS (DDos)
  • Countermeasures and Protections

Module 11 : Session Hijacking

  • Session Hijacking Techniques
  • Authentication and Authorization
  • Cryptographic Weaknesses

Module 12 : Evading IDS and Firewalls

  • Intrusion Detection System (IDS)
  • Honeypot Evasion Techniques
  • Perimeter for Weaknesses

Module 13 : Hacking Web Servers

  • Web Server Attacks
  • Attack Methodology
  • Audit Vulnerabilities

Module 14 : Hacking Web Apps

  • Web Application Attacks
  • Vulnerabilities Web Apps
  • Countermeasures

Module 15 : SQL Injection

  • SQL Injection Attacks
  • Evasion Techniques
  • Injection Countermeasures.

Module 16 : Hacking Wireless

  • Wireless Technologies
  • Encryption Threats
  • Wi-Fi Security Tools

Module 17 : Hacking Mobile Platforms

  • Mobile Attack vector
  • Android and iOS Hacking
  • Mobile Security Guidelines

Module 18 : IoT Hacking

  • IoT and OT attacks
  • Hacking Methodology
  • Hacking tools

Module 19 : Cloud Computing

  • Container Technologies
  • Server Less Computing
  • Cloud Computing Threats

Module 20 : Cryptography

  • Encryption Algorithms
  • Cryptography Tools
  • Cryptography Attacks

 

Lees meer
Opleidingsinformatie
Opleidingssoort
Training
Opleidingsmethode
In een groep op locatie en online
Type certificaat/diploma
Certificaat
Opleidingsduur
5 dagen
Max. deelnemers
12
Studiebelastingsuren
30 per opleiding
Tijdstip
Overdag
Taal in opleiding
Nederlands
Aanbieder
SpiralTrain is een opleidingsinstituut dat zich bij uitstek richt op trainingen voor software developers en zaken die raken aan software development.
SpiralTrain BV
SpiralTrain BV
NRTO