Certified Ethical Hacking Seminar

EC-Council Academia
EC - COUNCIL

6 reasons for choosing this programme

EC-Council certification

1

EC-Council certifications are highly recognised in the labour market, particularly in the fields of Information Technology Security.

Comprehensive training

2

The seminar offers comprehensive training in Ethical Hacking by combining theoretical knowledge with practical training.

Certified Instructors

3

The lectures are given by certified instructors.

Teaching material

4

Participants get online access to the official EC-Council material (for 6 months).

Examination Voucher

5

Participation in the program offers an examination voucher for the Certified Ethical Hacker (CEHv10) professional certification.

Career prospects

6

Obtaining professional certification in Ethical Hacking offers broad and well-paid career prospects in a wide range of businesses (Health, Economy, Energy, etc.), as well as in the public sector.

16
Duration
Certification
(following relevant examinations):
C/EH Certificate by the EC-Council
Greek
Language

The Metropolitan College collaborates with the EC-Council and, as its official Academic Partner, offers a 16-hour seminar on Ethical Hacking.

The EC-Council is the professional body that provides a large number of certifications which are highly recognised in the sector, with emphasis placed on the field of Information Technology Security. In this context, the Metropolitan College offers preparation seminars, online access to the official material of the EC-Council and an examination voucher for the Ethical Hacker (CEHv10) professional certification. It is widely acknowledged that this certification is an outstanding step for advancing the career of a security professional.

1

PROGRAM CONTENTS

The program covers topics such as:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
2

WHO IS IT ADDRESSED TO?

The seminar is aimed at students or graduates of Schools of Informatics, Security officers, Controllers, Security Professionals, System Administrators as well as any professional who is interested in the security of the information of their company and/or that of their clients.