EC-Council certifications are highly recognised in the labour market, particularly in the fields of Information Technology Security.
Certified Ethical Hacking Seminar
6 reasons for choosing this programme
The seminar offers comprehensive training in Ethical Hacking by combining theoretical knowledge with practical training.
The lectures are given by certified instructors.
Participants get online access to the official EC-Council material (for 6 months).
Participation in the program offers an examination voucher for the Certified Ethical Hacker (CEHv10) professional certification.
Obtaining professional certification in Ethical Hacking offers broad and well-paid career prospects in a wide range of businesses (Health, Economy, Energy, etc.), as well as in the public sector.
(following relevant examinations):
C/EH Certificate by the EC-Council
The Metropolitan College collaborates with the EC-Council and, as its official Academic Partner, offers a 16-hour seminar on Ethical Hacking.
The EC-Council is the professional body that provides a large number of certifications which are highly recognised in the sector, with emphasis placed on the field of Information Technology Security. In this context, the Metropolitan College offers preparation seminars, online access to the official material of the EC-Council and an examination voucher for the Ethical Hacker (CEHv10) professional certification. It is widely acknowledged that this certification is an outstanding step for advancing the career of a security professional.
The program covers topics such as:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Social Engineering
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
WHO IS IT ADDRESSED TO?
The seminar is aimed at students or graduates of Schools of Informatics, Security officers, Controllers, Security Professionals, System Administrators as well as any professional who is interested in the security of the information of their company and/or that of their clients.