CEH certified Ethical Hacker
CEH – Certified Ethical Hacker Cyber ​​Security Pentest(Attack) RED Team
CEH – Certified Ethical Hacker 3 months

English, Russian, Azerbaijani

Trainer: Fərid Əmirov

₼800.00

₼950.00
Enroll Now

Upon completion of the course, students are awarded a certificate

Course materials

Information Security and Ethical Hacking Overview

Introduction to Ethical Hacking.

Reconnaissance Techniques

Footprinting and Reconnaissance.

Scanning Networks.

Enumeration.

System Hacking Phases and Attack Techniques

Vulnerability Analysis.

System Hacking.

Malware Threats.

Network and Perimeter Hacking Sniffing

Social Engineering.

Denial-of-Service.

Session Hijacking.

Evading IDS, Firewalls, and Honeypots.

Web Application Hacking

Hacking Web Servers.

Hacking Web Applications.

SQL Injection.

Wireless Network Hacking

Hacking Wireless Networks.

Mobile Platform, IoT, and OT Hacking

Hacking Mobile Platforms.

IoT and OT Hacking.

Cloud Computing Cryptography

Course description

Who is a Cyber ​​Security Professional? 

 

Cybersecurity professionals are people who have the authority to protect systems, networks, and data from attacks, and to apply the necessary technologies and techniques to detect and destroy attacks. These experts work to test the security of systems and networks, prevent cyber attacks, and mitigate the effects of attacks. In addition, cybersecurity professionals implement organizations' cybersecurity policies and procedures. 

There are two teams of highly trained cyber security experts - Red Team/Blue Team. Red Team/Blue Team simulations play a critical role in protecting an organization from a wide range of cyber attacks from today's advanced adversaries.

 

What is Pentest(Attack) RED Team?

 

In the cyber security sector, there are different cyber security teams, conventionally identified by different colors, to be prepared for every possible threat and to assess and analyze possible system failures. One of these groups is the Red Team group.

Red Teams are internal or external organizations dedicated to verifying the effectiveness of a security program by mimicking the tools and techniques of cybercriminals as realistically as possible. The red team service is a comprehensive attack simulation that assesses an organization's security infrastructure, devices, networks, employees, applications, and physical security controls from a multi-layered perspective to test its resilience to real-life attacks. Although the process is similar to pentest, it is not the same. Thus, it involves the achievement of one or more goals - usually carried out as a group.