Pages

Wednesday, May 20, 2015

CEHv8 training with instructor Peter GUBAREVICH in Prague on June 8-12, 2015

We invite you to join our high-end ethical hacking training event led by one of the best ethical hacking instructor in Europe and IT security instructor star - Mr. Peter Gubarevich. The next class is scheduled in Prague on June 8-12, 2015 and is Guaranteed-to-Run (G2R). Don't miss this training event!




Our Unique Practice Based Approach to learn ethical hacking

We believe that the best way to learn ethical hacking is from someone who has real industry experience and will be teaching students most importantly to do their job and not just to pass a theory exam. Peter Gubarevich is well positioned to meet these expectation perfectly.

Peter Gubarevich, IT Security Expert and Certified Instructor

Peter Gubarevich has had considerable IT Security experience. He received following instructor grades: Microsoft Certified Trainer, Certified Cisco Systems Instructor, Certified EC-Council Instructor and was awarded as Microsoft MVP: Enterprise Security and Microsoft Security Trusted Advisor.

EC-Council Official Certified Ethical Hacker ver. 8 (CEHv8)

Course date, Guaranteed to Run: PRAGUE, June 8-12, 2015
Location: PRAGUE, at New Horizons venue
Language: English
Method of presenting the course: Traditional Instructor Led Training (TILT)
Lector: Mr. Peter GUBAREVICH
Cut-off date for registration: May 29, 2015

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Topics covered include
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflow
  • Cryptography
  • Penetration Testing

Certified Ethical Hacker (CEH) Certification

If a candidate attends an official instructor-led training (ILT), computer-based training (CBT), online live training, or academic learning, candidate is eligible to attempt the CEHv8 exam. A student passing this exam will be recognized as a Certified Ethical Hacker.


Get in Touch

For more information or registration contact us on phone numbers or e.mail adresses:


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.