Skip to content

COMPUTER HACKER PROFESSIONAL PACKAGE


Blue Mountain

Summary

Price
£1,000 inc VAT
Or £83.33/mo. for 12 months...
Study method
Online
Duration
Self-paced
Qualification
No formal qualification
Additional info
  • Tutor is available to students

Overview

  • 1 Years unlimited access, 
  • 24 hour support available, 
  • Certificate awarded upon completion to show employers your new skills!

The EC-Council CEH v8 Certified Ethical Hacker Training Package from Blue Mountain includes expert instructor-led training modules with customized presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

EC Council's CEH: Certified Ethical Hacker certification training course from Blue Mountain enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.

Certified Ethical Hacker or CEH is a vendor-neutral certification that explores the existence and the use of hacking tools and security systems across 22 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective.

The EC-Council CHFI Computer Hacking Forensics Investigator v8 Training Package from Blue Mountain includes expert instructor-led training modules with customized presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

EC Council's CHFI: Computer Hacking Forensics Investigator certification training course provides students with the necessary training to identify a hacker or intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Computer Hacking Forensic Investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. With the CHFI certification, you will begin to understand the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

Blue Mountain CHFI training course will immerse the student into an interactive environment where they will trace the tracks of a hacker through a client’s systems, trace the originator of defamatory emails, and recover signs of fraud. Students will learn CHFI investigation methods for discovering data that resides in a computer system and recovering deleted, encrypted, or damaged file information. CHFI is a vendor-neutral certification that validates knowledge in securing and analyzing electronic evidence.

Blue Mountain is an EC-Council Authorized Training Provider for online training, ensuring our course follows the approved curriculum and you receive the training and knowledge needed to succeed. Blue Mountain is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!

The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration Tester Training Package from Blue Mountain includes expert instructor-led training modules with customized presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

Blue Mountain ECSA/LPT: EC-Council Certified Security Analyst/Licensed Penetration Tester training course teaches security professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. The ECSA/LPT certification validates an IT security professional's skills and ability to perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. Blue Mountain ECSA/LPT training course explores the analytical phase of ethical hacking, and teaches students Licensed Penetration Testing (LPT) methodology and ground-breaking techniques for security and penetration testing. EC-Council Certified Security Analyst/Licensed Penetration Tester or ECSA/LPT is a vendor-neutral certification that provides real-world hands-on experience by covering advanced hacking and penetration testing methods in all modern infrastructures, operating systems and application environments.

Description

Blue Mountain is an EC-Council Authorized Training Provider for online training, ensuring our training courses follow the approved curriculum and you receive the training and knowledge needed to get certified. Blue Mountain is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!

Certified Ethical Hacking and Countermeasures, CEH Version 8

 

Certified Ethical Hacking and Countermeasures : Module 1

 

Certified Ethical Hacking and Countermeasures : Module 2

 

Certified Ethical Hacking and Countermeasures : Module 3

 

Certified Ethical Hacking and Countermeasures : Module 4

 

Certified Ethical Hacking and Countermeasures : Module 5

 

Certified Ethical Hacking and Countermeasures : Module 6

 

Certified Ethical Hacking and Countermeasures : Module 7

 

Certified Ethical Hacking and Countermeasures : Module 8

 

Certified Ethical Hacking and Countermeasures : Module 9

 

Certified Ethical Hacking and Countermeasures : Module 10

 

Certified Ethical Hacking and Countermeasures : Module 11

 

Certified Ethical Hacking and Countermeasures : Module 12

 

Certified Ethical Hacking and Countermeasures : Module 13

 

Certified Ethical Hacking and Countermeasures : Module 14

 

Certified Ethical Hacking and Countermeasures : Module 15

 

Certified Ethical Hacking and Countermeasures : Module 16

 

Certified Ethical Hacking and Countermeasures : Module 17

 

Certified Ethical Hacking and Countermeasures : Module 18

 

Certified Ethical Hacking and Countermeasures : Module 19

Computer Hacking Forensic Investigator - CHFI

 

Module 01: Computer Forensics in Today's World

Module 02-03: Computer Forensics Investigation Process

Module 04: Digital Evidence

Module 05: First Responder Procedures

Module 06: Computer Forensics Lab

Module 07: Understanding Hard Disks and File Systems

Module 08: Windows Forensics

Module 09: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Deleted Partitions

Module 11 - 12: Using AccessData FTK

Module 13: Steganography and Image File Forensics

Module 14: Application Password Crackers

Module 15: Log Capturing and Event Correlation

Module 16: Network Forensics and Investigating Network Traffic

Module 17: Investigating Wireless Attacks

Module 18: Investigating Web Attacks

Module 19: Tracking Emails and Investigating Email Crimes

Module 20: Mobile Forensics

Module 21: Investigative Reports

Module 22: Becoming an Expert Witness
Module 23: Lab

EC-Council Certified Security Analyst

 

 

 

Module 1: The Need for Security Analysis 

Module 2: Advanced Googling 

Module 3: TCP/IP Packet Analysis 

Module 4: Advanced Sniffing Techniques 

Module 5: Vulnerability Analysis with Nessus 

Module 6: Advanced Wireless Testing 

Module 7: Designing a DMZ 

Module 8: Snort Analysis

Module 9: Log Analysis 

Module 10: Advanced Exploits and Tools 

Module 11: Penetration Testing Methodologies 

Module 12: Customers and Legal Agreements 

Module 13: Penetration Testing Planning and Scheduling

Module 14: Pre Penetration Testing Checklist 

Module 15: Information Gathering

Module 16: Vulnerability Analysis 

Module 17: External Penetration Testing 

Module 18: Internal Network Penetration Testing

Module 19: Router Penetration Testing

Module 20: Firewall Penetration Testing

Module 21: IDS Penetration Testing 

Module 22: Wireless Network Penetration Testing 

Module 23: Denial of Service Penetration Testing 

Module 24: Password Cracking Penetration Testing 

Module 25: Social Engineering Penetration Testing 

Module 26: Stolen Laptop Penetration Testing 

Module 27: Application Penetration Testing 

Module 28: Physical Security Penetration Testing 

Module 29: Database Penetration testing

Module 30: VoIP Penetration Testing

Module 31: VPN Penetration Testing 

Module 32: Penetration Testing Report Analysis 

Module 33: Penetration Testing Report and Documentation Writing 

Module 34: Penetration Testing Deliverables and Conclusion

Module 35: Ethics of a Licensed Penetration Tester 

CISSP: Certified Information Systems Security Professional

 

 

 

Access Control

Telecommunications and Network Security

Information Security Governance and Risk Management

Software Architecture and Design

Cryptography

Security Architecture and Design

Operations Security

Business Continuity and Disaster Recovery

Legal Requirements and Investigations
Physical and Environmental Security


 

 

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.