Want create site? Find Free WordPress Themes and plugins.

CEH V9 Riyadh

Introduction: CEH (V9) – Certified Ethical Hacker is a highly advanced technically skilled professional that can figure out vulnerabilities & weaknesses in the target or network systems. In Our CEH training course you will learn a 100% offensive mode to defend your organization using the most advanced and malicious Hacking tools but the uses to these tools will be provided in a legitimate manner only to inspect the current vulnerability in the existing IT environment.

Certified Ethical hacking training is the most advanced course in the world with 18 modules that contains the most advanced topics of security domain that will help keep you well equipped to safeguard your organization from the latest Trojan, virus malware and other security threats.

Our highly qualified, awarded and experienced trainer who is also Microsoft’s MPV (Most valuable professional) & EC-Council instructor has designed 140 real time lab scenarios in this courses that will help you understand the real time cyber/security attacks. This will also enhance your knowledge to not only safeguard your organization but also to use a 100% offensive method against hackers.

The Goal of CEH Workshop: The objective of Certified ethical hacking CEH (V9) is to make you a master of an ethical hacking methodology that can be used in penetration testing, vulnerability testing and more. On completion of the CEH V9 Certification training, you will be well equipped with all the ethical hacking skill which will highly benefit you as an information security professional.

Certification Details: You should have some skills related to basic concepts of Operating Systems, computer architecture, networking in order to get certified

event time

CEH TRAINING KEY TAKEAWAYS

18 – 22 February, 2018


1. Fundamentals of various computer and network security threats
2. Understanding of identity theft, phishing scams, malware, social engineering, and financial frauds
3. Learn to safeguard mobile, media and protect data
4. Protecting computers, accounts, and social networking profiles as a user
5. Understand security incidents and reporting

event time

Professionals Who Can Attend

C Level Executive Training

 

1. Information Assurance (IA) Security officer
2. Information Security Analyst/Administrator
3. Information Security Manager/Specialist
4. Information Systems Security Engineer/Manager
5. Security Analyst
6. Information Security Officers
7. Information Security Auditors
8. Risk/Vulnerability Analyst and many more

2018/02/22 10:00:00

SCHEDULE

Our events are well planned

Trainer Profile

George Dobrea KPM Learning

George Dobrea

EC-Council Instructor

Microsoft Certified Trainer, Microsoft MVP

Qualifications:

  • EC-Council Instructor (CEI) since 2011 / CEH, CND, ECSA
  • Microsoft Certified Trainer (MCT) since 1998 / MCSE & MCSA 2017

Awards:

  • EC-Council Instructor of the Year Award, 2016
  • Microsoft Most Valuable Professional (MVP) award for Cloud and Datacenter Security: yearly awarded since 2005

CEI instructional related activities:

  • 15 classes ( 12 CEH v9 classes, 2 CEH v9 TTT classes, 1 ECSA class) Classes delivered in 5 different countries ( Germany, Nederland, Greece, Romania, Bulgaria)
  • 7 CEH v9 classes delivered for Army Europe Information Technology Training (AEI-TT) program. This is a special program created by US government for the US Army staff

Community Activities:

  • Organizer of two CEI CEH Train-the-Trainer
  • MCT Regional Lead
  • IAMCP (International Association of Microsoft Channel Partners) EMEA Board Member
  • Hacker Halted 2016, Microsoft Ignite 2016, 2017, more…

VENUE

Check out the Venue Information

raddison blu riyadh

RADISSON BLU, RIYADH

Address: Riyadh, KSA
Phone: +91 9900600005
Email: info@kpmlearnings.com

Did you find apk for android? You can find new Free Android Games and apps.
FILL THE FORM
*your data will be kept private with KPM
HOLD ON
We have got special discounts
UPTO 20% OFF
Our representative will get back to you soon
FILL THE FORM
*your data will be kept private with KPM
You will get access to images once you fill
Fill In To Get Complete Details
FULL NAME
MOBILE NUMBER
EMAIL
COMPANY
DESIGNATION
We have designed the training with highly experienced professionals
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email
Fill the form to get agenda in Email