filmov
tv
CEH v11: The Ultimate Ethical Hacking certification
Показать описание
Highlights of some of what sets CEH v11 apart from the rest:
1. The newly updated Certified Ethical Hacker (CEH) v11 program now includes a library of the latest tools required by security practitioners and penetration testers across the world.
2. It is mapped rigorously to important specialty areas under the NIST/NICE framework’s Protect and Defend (PR) job role category.
3. More than 50% of the CEH v11 course is dedicated to practical skills in live ranges via EC-Council labs.
4. CEH has updated Cloud and IoT modules to incorporate CSPs, Container Technologies (e.g., Docker, Kubernetes), as well as Cloud Computing threats and a number of IoT hacking tools such as Shikra, Bus Pirate, Facedancer21, and more.
5. The program has new operating systems, including Windows Server 2019, Windows Server 2016, and Windows 10, configured with Domain Controller, firewalls, and vulnerable web applications for practicing and improving hacking skills.
6. It also includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more.
If these are not motivating you to become a CEH, we wonder what will!
1. The newly updated Certified Ethical Hacker (CEH) v11 program now includes a library of the latest tools required by security practitioners and penetration testers across the world.
2. It is mapped rigorously to important specialty areas under the NIST/NICE framework’s Protect and Defend (PR) job role category.
3. More than 50% of the CEH v11 course is dedicated to practical skills in live ranges via EC-Council labs.
4. CEH has updated Cloud and IoT modules to incorporate CSPs, Container Technologies (e.g., Docker, Kubernetes), as well as Cloud Computing threats and a number of IoT hacking tools such as Shikra, Bus Pirate, Facedancer21, and more.
5. The program has new operating systems, including Windows Server 2019, Windows Server 2016, and Windows 10, configured with Domain Controller, firewalls, and vulnerable web applications for practicing and improving hacking skills.
6. It also includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more.
If these are not motivating you to become a CEH, we wonder what will!