Skip to content
Deep Creek Center home.
  • Consulting
  • Services
  • Courses
    • Scrum
      • Scrum Master Certified
      • Scrum Developer Certified
      • Scrum Product Owner Certified
      • Agile Expert Certified
    • Business Analysis/ Business Relationship Management
      • Business Analysis For The IT Professional
      • Modeling Techniques For The Business Analyst
      • Software Quality Assurance
      • Effective Methods Of Software Testing Workshop
      • Effective Use Case Development
      • Business Relationship Management
      • Business Relationship Management Professional (BRMP®)
    • ITIL
      • ITIL 4 Foundations
      • ITIL Specialist: Create, Deliver, and Support
      • ITIL Specialist: Drive Stakeholder Value
      • ITIL Specialist: High Velocity IT
      • ITIL Strategist: Direct, Plan, and Improve
      • ITSM Workshop
    • Project Management / PMI
      • Project Management Principles For IT Professionals
      • Certified Associate In Project Management (CAPM)
      • Project Management Professional (PMP)
    • Cybersecurity
      • NIST Cybersecurity Professional® Foundation
      • NIST Cybersecurity Professional® Practitioner
      • NIST Cybersecurity Professional® 800-171 Specialist
      • NIST Cybersecurity Professional® ISO 27001 Specialist
    • Governance
      • COBIT 5.0 Foundation
  • Blog

CEH

Posted on October 14, 2013 by Patrick von Schlag.

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button]

Course Description

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5-day class they will have hands-on understanding and experience in Ethical Hacking.

Who Should Attend?

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Length

5 days

Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflow
  • Cryptography
  • Penetration Testing

Course Director

Patrick von Schlag
Mr. von Schlag has more than 25 years of real-world experience managing IT and business organizations. He has served as a consultant, facilitator, and instructor in support of more than 200 ITSM program deployments, with a focus on practical benefits. He holds all 11 ITIL 2011 certifications and runs an accredited learning consultancy focused on Making ITIL Work ™ in real organizations. His customer list includes The Walt Disney Company, Microsoft, Nike, Sears, US Marine Corps, US Army, US Air Force, 2nd and 5th Fleet US Navy, DISA, IRS, Federal Reserve, The Hartford, Citigroup, Amgen, Los Angeles County, Port of Long Beach, GDIT, Accenture, Serco, Deloitte, and hundreds of other market-leading companies.

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button]

Posted in Other Courses

Post navigation

CISSP
Request Fulfillment is really obvious…and really important

Sidebar

Search

Post Categories

  • Agile (8)
  • Business Analysis (8)
  • Case Studies (2)
  • Cybersecurity (2)
  • Default (6)
  • DevOps (2)
  • Featured (5)
  • Governance (3)
  • Information Security (1)
  • Inspiration (2)
  • Instructor (5)
  • IT Service Management (6)
  • ITIL (40)
  • ITIL Workshops Courses (7)
  • ITSM (17)
  • ITSM Concepts Series (10)
  • LEAN (6)
  • Making IT Work (48)
  • NIST (6)
  • Other Courses (5)
  • Press (6)
  • PRINCE 2 (2)
  • Project Management (5)
  • Project Management Courses (9)
  • RESILIA (2)
  • Scrum (10)
  • Simulations (2)
  • Training (10)

Upcoming Events

Notice
There are no upcoming events.

Footer

Copyright © 2026. All rights reserved. Deep Creek Center. Privacy Policy | Terms of Service | Sitemap