SlideShare a Scribd company logo
Witold Kurkliński
wziął udział w szkoleniu
przygotowującym do
EGZAMINU C|EH™
(CERTIFIED ETHICAL HACKER)
25-29 KWIETNIA 2022
Agenda:
• • Obszary wymagane na egzaminie CEH:
• Introduction to Ethical Hacking • Footprinting and Reconnaissance • Scanning Networks
• Enumeration • System Hacking • Trojans and Backdoors • Viruses and Worms • Sniffers • Social
Engineering •Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web
Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading
IDS Firewalls and Honeypots • Buffer Overflow • Cryptography • Penetration Testing
• • Ćwiczenia praktyczne
• • Testowy egzamin
CZAS TRWANIA SZKOLENIA: 40 GODZIN
TRENER
Maciej Szymczak

More Related Content

More from Witold Kurkliński

eyond Atomic Testing with Attack Flows Certification
eyond Atomic Testing with Attack Flows Certificationeyond Atomic Testing with Attack Flows Certification
eyond Atomic Testing with Attack Flows Certification
Witold Kurkliński
 
Intermediate Breach & Attack Simulation Certification
Intermediate Breach & Attack Simulation CertificationIntermediate Breach & Attack Simulation Certification
Intermediate Breach & Attack Simulation Certification
Witold Kurkliński
 
Delivering Value with the ATT&CK Sightings Report Certification
Delivering Value with the ATT&CK Sightings Report CertificationDelivering Value with the ATT&CK Sightings Report Certification
Delivering Value with the ATT&CK Sightings Report Certification
Witold Kurkliński
 
Emulation Planning For Purple Teams Certification
Emulation Planning For Purple Teams CertificationEmulation Planning For Purple Teams Certification
Emulation Planning For Purple Teams Certification
Witold Kurkliński
 
Introduction to FIN6 Emulation Plans Certification
Introduction to FIN6 Emulation Plans CertificationIntroduction to FIN6 Emulation Plans Certification
Introduction to FIN6 Emulation Plans Certification
Witold Kurkliński
 
Introduction to EASY Framework for Intelligence Certification
Introduction to EASY Framework for Intelligence CertificationIntroduction to EASY Framework for Intelligence Certification
Introduction to EASY Framework for Intelligence Certification
Witold Kurkliński
 
Mapping MITRE ATT&CK to CVE for Impact Certification
Mapping MITRE ATT&CK to CVE for Impact CertificationMapping MITRE ATT&CK to CVE for Impact Certification
Mapping MITRE ATT&CK to CVE for Impact Certification
Witold Kurkliński
 
menuPass Emulation Plan Execution Certification
menuPass Emulation Plan Execution CertificationmenuPass Emulation Plan Execution Certification
menuPass Emulation Plan Execution Certification
Witold Kurkliński
 
MITRE ATT&CK Security Stack Mappings: Azure Certification
MITRE ATT&CK Security Stack Mappings: Azure CertificationMITRE ATT&CK Security Stack Mappings: Azure Certification
MITRE ATT&CK Security Stack Mappings: Azure Certification
Witold Kurkliński
 
MITRE ATT&CK Security Stack Mappings: AWS Certification
MITRE ATT&CK Security Stack Mappings: AWS CertificationMITRE ATT&CK Security Stack Mappings: AWS Certification
MITRE ATT&CK Security Stack Mappings: AWS Certification
Witold Kurkliński
 
Intermediate Purple Teaming Certification
Intermediate Purple Teaming CertificationIntermediate Purple Teaming Certification
Intermediate Purple Teaming Certification
Witold Kurkliński
 
Strategic Cybersecurity Management Certification
Strategic Cybersecurity Management CertificationStrategic Cybersecurity Management Certification
Strategic Cybersecurity Management Certification
Witold Kurkliński
 
Threat Informed Architecture Certification
Threat Informed Architecture CertificationThreat Informed Architecture Certification
Threat Informed Architecture Certification
Witold Kurkliński
 
Foundations of Operationalizing MITRE ATT&CK Certification
Foundations of Operationalizing MITRE ATT&CK CertificationFoundations of Operationalizing MITRE ATT&CK Certification
Foundations of Operationalizing MITRE ATT&CK Certification
Witold Kurkliński
 
Foundations of Purple Teaming Certification
Foundations of Purple Teaming CertificationFoundations of Purple Teaming Certification
Foundations of Purple Teaming Certification
Witold Kurkliński
 
Top ATT&CK Techniques Certification
Top ATT&CK Techniques CertificationTop ATT&CK Techniques Certification
Top ATT&CK Techniques Certification
Witold Kurkliński
 
Foundations of Breach & Attack Simulation Certification
Foundations of Breach & Attack Simulation CertificationFoundations of Breach & Attack Simulation Certification
Foundations of Breach & Attack Simulation Certification
Witold Kurkliński
 
Application of MITRE ATT&CK Navigator Certification
Application of MITRE ATT&CK Navigator CertificationApplication of MITRE ATT&CK Navigator Certification
Application of MITRE ATT&CK Navigator Certification
Witold Kurkliński
 
Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...
Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...
Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...
Witold Kurkliński
 
MITRE ATT&CK Intermediate Certification
MITRE ATT&CK Intermediate CertificationMITRE ATT&CK Intermediate Certification
MITRE ATT&CK Intermediate Certification
Witold Kurkliński
 

More from Witold Kurkliński (20)

eyond Atomic Testing with Attack Flows Certification
eyond Atomic Testing with Attack Flows Certificationeyond Atomic Testing with Attack Flows Certification
eyond Atomic Testing with Attack Flows Certification
 
Intermediate Breach & Attack Simulation Certification
Intermediate Breach & Attack Simulation CertificationIntermediate Breach & Attack Simulation Certification
Intermediate Breach & Attack Simulation Certification
 
Delivering Value with the ATT&CK Sightings Report Certification
Delivering Value with the ATT&CK Sightings Report CertificationDelivering Value with the ATT&CK Sightings Report Certification
Delivering Value with the ATT&CK Sightings Report Certification
 
Emulation Planning For Purple Teams Certification
Emulation Planning For Purple Teams CertificationEmulation Planning For Purple Teams Certification
Emulation Planning For Purple Teams Certification
 
Introduction to FIN6 Emulation Plans Certification
Introduction to FIN6 Emulation Plans CertificationIntroduction to FIN6 Emulation Plans Certification
Introduction to FIN6 Emulation Plans Certification
 
Introduction to EASY Framework for Intelligence Certification
Introduction to EASY Framework for Intelligence CertificationIntroduction to EASY Framework for Intelligence Certification
Introduction to EASY Framework for Intelligence Certification
 
Mapping MITRE ATT&CK to CVE for Impact Certification
Mapping MITRE ATT&CK to CVE for Impact CertificationMapping MITRE ATT&CK to CVE for Impact Certification
Mapping MITRE ATT&CK to CVE for Impact Certification
 
menuPass Emulation Plan Execution Certification
menuPass Emulation Plan Execution CertificationmenuPass Emulation Plan Execution Certification
menuPass Emulation Plan Execution Certification
 
MITRE ATT&CK Security Stack Mappings: Azure Certification
MITRE ATT&CK Security Stack Mappings: Azure CertificationMITRE ATT&CK Security Stack Mappings: Azure Certification
MITRE ATT&CK Security Stack Mappings: Azure Certification
 
MITRE ATT&CK Security Stack Mappings: AWS Certification
MITRE ATT&CK Security Stack Mappings: AWS CertificationMITRE ATT&CK Security Stack Mappings: AWS Certification
MITRE ATT&CK Security Stack Mappings: AWS Certification
 
Intermediate Purple Teaming Certification
Intermediate Purple Teaming CertificationIntermediate Purple Teaming Certification
Intermediate Purple Teaming Certification
 
Strategic Cybersecurity Management Certification
Strategic Cybersecurity Management CertificationStrategic Cybersecurity Management Certification
Strategic Cybersecurity Management Certification
 
Threat Informed Architecture Certification
Threat Informed Architecture CertificationThreat Informed Architecture Certification
Threat Informed Architecture Certification
 
Foundations of Operationalizing MITRE ATT&CK Certification
Foundations of Operationalizing MITRE ATT&CK CertificationFoundations of Operationalizing MITRE ATT&CK Certification
Foundations of Operationalizing MITRE ATT&CK Certification
 
Foundations of Purple Teaming Certification
Foundations of Purple Teaming CertificationFoundations of Purple Teaming Certification
Foundations of Purple Teaming Certification
 
Top ATT&CK Techniques Certification
Top ATT&CK Techniques CertificationTop ATT&CK Techniques Certification
Top ATT&CK Techniques Certification
 
Foundations of Breach & Attack Simulation Certification
Foundations of Breach & Attack Simulation CertificationFoundations of Breach & Attack Simulation Certification
Foundations of Breach & Attack Simulation Certification
 
Application of MITRE ATT&CK Navigator Certification
Application of MITRE ATT&CK Navigator CertificationApplication of MITRE ATT&CK Navigator Certification
Application of MITRE ATT&CK Navigator Certification
 
Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...
Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...
Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK Certific...
 
MITRE ATT&CK Intermediate Certification
MITRE ATT&CK Intermediate CertificationMITRE ATT&CK Intermediate Certification
MITRE ATT&CK Intermediate Certification
 

CEH Training Securitum

  • 1. Witold Kurkliński wziął udział w szkoleniu przygotowującym do EGZAMINU C|EH™ (CERTIFIED ETHICAL HACKER) 25-29 KWIETNIA 2022 Agenda: • • Obszary wymagane na egzaminie CEH: • Introduction to Ethical Hacking • Footprinting and Reconnaissance • Scanning Networks • Enumeration • System Hacking • Trojans and Backdoors • Viruses and Worms • Sniffers • Social Engineering •Denial of Service • Session Hijacking • Hacking Webservers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • Evading IDS Firewalls and Honeypots • Buffer Overflow • Cryptography • Penetration Testing • • Ćwiczenia praktyczne • • Testowy egzamin CZAS TRWANIA SZKOLENIA: 40 GODZIN TRENER Maciej Szymczak