Certified Ethical Hacking (CEH) ONLINE TRAINING

Professional Hacker

Intense School

Most popular Ethical Hacking course is now available in an online format! Rest assured, we have made every effort to replicate the same training experience you would receive in our Instructor-Led Ethical Hacking course. Many online or CBT training offerings are simply a recording of a talking head. Intense School's Hacker Training Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 30 hours of hands-on lab exercises!


Online & Offline Playback (DVD,mobile)
Expert Instructor
Intense Proprietary Exam Prep
Highest Quality Content - 90% Pass
Self-Paced Mentored Training
Mentor & Live Instructor Support
Text books, Pre-Study, and Lab books
Complex Sims and Exercise Files

Ключевые слова

Ethical Hacking,

Характеристики курса

Вид образования
Рекомендуемый возраст для неформального обучения
11-15, 16-18, 19-25, 25-45
Язык обучения
Информационно-коммуникационные технологии (ИКТ)
Авторы курса
Professional Hacker
Intense School
Стоимость курса
Возможность передачи прав на ИС
Входные требования по уровню знаний
Minimum of 12 months of experience in networking technologies Strong knowledge of TCP/IP Information systems and security background
Выходные знания, умения, навыки
the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course Developing the Hacker's Mind Network Surveying Port Scanning System Identification / OS Fingerprinting Vulnerability Research and Verification Service Identification Internet Application Testing Document Grinding Recognizing security issues within an organization Perform legal assessments on remote / foreign networks Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor Implement the right tools for each task of the Methodology Competitive Intelligence Exploiting vulnerabilities remotely Appropriate countermeasures to thwart malicious hacking
Входной тест
Формирование групп по уровню подготовленности
Присутствие преподавателей
Присутствие тьюторов
Присутствие фасилитаторов
Форма представления учебных материалов
мультимедиа, видеолекции, элeктронный учебник
Наличие обратной связи в материалах
Наличие совместного обучения
Наличие форумов, дискуссий
Наличие вебинаров, видеоконференций
Наличие неформального общения, meetup
Интеграция с LMS
Учебная аналитика
Наличие сертификации
Виды сертификации
Название сертификата
Certificate of Completion Certified Ethical Hacker Certified Penetration Tester
Наличие временных границ
5 (дни)
Возможность войти после начала
Тип занятий (синхронность)
синхронные, асинхронные
Возможность формирования собственной траектории, индивидуализации на курсе
Операционные системы
All students must have a high-speed Internet connection (such as DSL, cable modem, or office T1)to fully benefit from our onnline classes and labs, as well as a basic, modern PC and browser. You will need to have a valid product license key for Windows Server 2003 in order to perform the lab work.
Поддержка лиц с ограниченными возможностями