A message from a Hacker

Dimitrios Zacharopoulos our famous Certified Ethical Hacker instructor

As an Instructor of the CEH since 2004, having to deliver from version 1 of CEH to now Version 11, I can confidently say,that this version 11 is the most comprehensive of all the versions and the most challenging for students.

The course content, and the course labs have been vastly improved, to provide industry updated hacking techniques.As I am a Licenced Penetration Tester and Digital Forensics Professional in the field, and perform Red Team and Blue Teamactivities globaly, I choose EC-Council for its approach to certification courses, that combine industry standards with up-to-date methods of cyber security and countermeasures.

Since the move away from Kali Linux and now using Parrot Linux, when compared to Kali Linux, Parrot Security OS offers better performance on lower-powered laptops and machines while offering an intuitive look and feel with a larger repository of general tools. This assists my student into getting the most out of their courses and ethical hacking techniques.

Join me at Startel for an Advanced and Fun course, and be prepared to work hard with me, to get you that step closer to achieving your examination and certification as a
Certified Ethical Hacker in Version 11.

A message from a Hacker Obipixel Me

Who is a Certified Ethical Hacker?

A Certified Ethical Hacker is an IT Security Specialist typically working in a red team environment.
Focused on attacking computer systems and devices, gaining access to networks, applications, databases, and other critical data on secured systems, and securing the company’s defences.

A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and
creativity of malicious hackers.

Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the
system owners and take all precautions to ensure the outcomes remain confidential.

Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

Why CEHv11 and why it’s different?

Since the introduction of CEH in 2003, it is recognised as a standard within the information security community.CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.

The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

CEH v11 now also covers updated Cloud and IoT modules to incorporate CSP’s Container Technologies (e.g., Docker, Kubernetes), Cloud Computing threats, and a number of IoT hacking tools (e.g. Shikra, Bus Pirate, Facedancer21, and more). This is critical as the world moves towards broader and deeper cloud adoptions.

In 2020, businesses experienced a 2,000% increase in OT based incidents. You can gain expertise in OT, IT, and IIoT (industrial IoT) to secure a critical enterprise OT/IoT deployments. To learn the advanced skills of OT, CEHv11 covers concepts of OT, such as ICS, SCADA, and PLC, various challenges of OT, OT hacking methodology, tools, communication protocols of an OT network like Modbus, Profinet, HART-IP, SOAP, CANopen, DeviceNet, Zigbee, Profibus, etc., and gaining Remote Access using DNP3 protocol.

The CEH v11 now also includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more!

As the security community observed a rise in fileless attacks in 2020, it began to raise concerns about fileless malware attacks. As fileless malware is a relatively new form of malware attack, organizations find it difficult to detect with endpoint security solutions. With the CEH v11, you can now learn various fileless malware techniques with associated defensive strategies, as the course focuses on the taxonomy of fileless malware threats, fileless malware obfuscation techniques to bypass antivirus, launching fileless malware through,script-based injection, launching fileless malware through phishing, and more.

How the CEHv11 is delivered at Startel?

At Startel we realise that we are now living a new normal, with the Covid19 Pandemic and how its changed the way we work.It is for this reason that can we offer the course as Instructor-Led Online and On-site. Either method is effective.Dimitrios Zacharopoulos who has worked with us as one of our instructors since 2007, has already delivered the CEH version 11 over a dozen occassions since October 2020, both onsite and online and is able to still keep the quality and content coverage, with either method of delivery.

Stay Connected

More Updates

De maand van de cybersecurity

Cybersecurity, wat is dat nou eigenlijk, en waarom moet je er iets vanaf weten? En waarom is oktober de ‘maand van de cybersecurity’?
Wat heeft het eigenlijk met voetbal te maken? Je komt dan te weten hoe je je teweer kan stellen tegen al die vervelende ransomware en phising en dergelijke.
Voor de antwoorden op deze interessante vragen: lees deze blog.

IT Talentprogramma 2022

Inleiding In een grijs verleden was je al een IT Talent als je tot 16 kon tellen. Want dan had je kans dat je wist

Op de hoogte blijven van de nieuwste trainingen?

Schrijf je in voor onze nieuwsbrief!

Inschrijven nieuwsbrief