• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Certified Ethical Hacker (CEH) courses in Glasgow

We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.

Know someone teaching this? Help them become an Educator on Cademy.

Online Options

Show all 102

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH)

By Compliance Central

Feeling Stuck in Your Career? The Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH)Bundle is Your Skill-Building Solution. This exceptional collection of 30 premium courses is designed to encourage growth and improve your career opportunities. Suited to meet different interests and goals, the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle provides an engaging learning experience, helping you learn skills across various disciplines. With the Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) Bundle, you'll have a personalised journey that aligns with your career goals and interests. This comprehensive package helps you confidently tackle new challenges, whether entering a new field or enhancing your existing knowledge. The Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle is your gateway to expanding your career options, increasing job demand, and enhancing your skill set. By enrolling in this bundle, you'll receive complimentary PDF certificates for all courses, adding value to your resume at no extra cost. Develop key skills and achieve important progress in your career and personal development. Start your journey today and experience the transformative impact of the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle on your job life and career growth! This Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) Bundle Comprises the Following CPD Accredited Courses: Course 01: Cyber Security Advanced Training Course 02: CompTIA Security+ (SY0-601) Course 03: AWS Certified Solutions Architect Associate Course 04: CEH - Certified Ethical Hacker Course 05: Security Analyst Course 06: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 07: Cyber Intelligence Officer Course 08: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 09: Cyber Security Awareness Training Course 10: Web Application Penetration Testing Course Course 11: Cyber Security Incident Handling and Incident Response Course 12: Digital Forensics for Cyber Professionals Course 13: GDPR Course 14: Cyber Law Online Course Course 15: CompTIA Network+ Certification (N10-007) Course 16: Certified Information Security Manager (CISM) Course 17: Certified Information Systems Security Professional (CISSP) Course 18: CompTIA PenTest+ (Ethical Hacking) Course 19: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 20: Information Management Course 21: Computer Networks Security from Scratch to Advanced Course 22: Data Center Training Essentials: General Introduction Course 23: IT Administration and Networking Course 24: Machine Learning Basics Course 25: SQL Database Basics for Everyone Course 26: Linux Security and Hardening Course 27: Security Management Diploma Course 28: Learn to Make a Fresh Start in Your Life Course 29: Motivation - Motivating Yourself & Others Course 30: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! What will make you stand out? Upon completion of this online Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) Bundle, you will gain the following: CPD QS Accredited Proficiency with this Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle After successfully completing the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle, you will receive a FREE PDF Certificate from REED as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle The online test with immediate results You can study and complete the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle at your own pace. Study for the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle using any internet-connected device, such as a computer, tablet, or mobile device. The Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) bundle is a premier learning resource, with each course module holding respected CPD accreditation, symbolising exceptional quality. The content is packed with knowledge and is regularly updated to ensure it remains relevant. This bundle offers not just education but a constantly improving learning experience designed to enrich both your personal and professional development. Advance the future of learning with the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle, a comprehensive, complete collection of 30 courses. Each course in the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle has been handpicked by our experts to provide a broad range of learning opportunities. Together, these modules form an important and well-rounded learning experience. Our mission is to deliver high-quality, accessible education for everyone. Whether you are starting your career, switching industries, or enhancing your professional skills, the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle offers the flexibility and convenience to learn at your own pace. Make the Cyber Security, CompTIA Security+, Networking & Ethical Hacker package your trusted partner in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) bundle is perfect for: Expand your knowledge and skillset for a fulfilling career with the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle. Earn CPD certification and master in-demand skills with the Cyber Security, CompTIA Security+, Networking, and Ethical Hacker bundle, and become a more valuable professional. Discover your passion or explore new career options with the diverse learning opportunities in the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle. Learn on your schedule, in the comfort of your home - the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle offers ultimate flexibility for busy individuals. Requirements You are warmly invited to register for this bundle. Please be aware that no formal entry requirements or qualifications are necessary. This curriculum has been crafted to be open to everyone, regardless of previous experience or educational attainment. Career path Gain a wide range of skills across various fields, improve your problem-solving capabilities, and keep current with industry trends. Perfect for those aiming for career advancement, exploring a new professional direction, or pursuing personal growth. Begin your journey with the Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) bundle. Certificates CPD Certificates Digital certificate - Included

Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH)
Delivered Online On Demand5 days
£210

CompTIA Security+ (SY0-501): Complete Course and Practice Exam

By Packt

CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security certification in the world!

CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Delivered Online On Demand15 hours 10 minutes
£53.99

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam

By Packt

In this course, you will dive deep into the 5 domains of the CompTIA Pentest+ exam and learn each topic in a succinct manner. You will learn the structure of the exam and create your own pentest lab, and have the confidence to ace the exam, whenever you decide to attempt it.

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
Delivered Online On Demand8 hours 8 minutes
£137.99

Ethical Hacking Online Course

4.8(9)

By Skill Up

Learn with our our premium Ethical Hacking Online Course, which includes modules like Malware Fundamentals, TcpDump, Wireshark, and Discover Hacking Ethics.

Ethical Hacking Online Course
Delivered Online On Demand3 hours 18 minutes
£25

Introduction to Malware Analysis for Incident Responders

By Packt

Increase your cybersecurity capability by learning to perform dynamic and static malware analysis!

Introduction to Malware Analysis for Incident Responders
Delivered Online On Demand1 hour 31 minutes
£141.99

Risk Management for Cybersecurity and IT Managers

By Packt

The Management's Guide to Understanding Risk Management Decisions in Cybersecurity and Information Technology (IT)!

Risk Management for Cybersecurity and IT Managers
Delivered Online On Demand2 hours 8 minutes
£22.99

WiFi Hacking: Wireless Penetration Testing for Beginners

By Packt

A Complete Guide to Hacking WiFi (WEP, WPA, and WPA2) Wireless Security and How to Exploit (Pentest) Their Vulnerabilities!

WiFi Hacking: Wireless Penetration Testing for Beginners
Delivered Online On Demand1 hour 43 minutes
£141.99

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

Educators matching "Certified Ethical Hacker (CEH)"

Show all 1