BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Training Heights - ECPv6.15.11//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Training Heights
X-ORIGINAL-URL:https://trainingheights.com
X-WR-CALDESC:Events for Training Heights
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Africa/Lagos
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0100
TZNAME:WAT
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Africa/Lagos:20260622T000000
DTEND;TZID=Africa/Lagos:20260626T000000
DTSTAMP:20260507T105108
CREATED:20260506T094442Z
LAST-MODIFIED:20260506T094442Z
UID:7117-1782086400-1782432000@trainingheights.com
SUMMARY:Certified Ethical Hacker (CEH)
DESCRIPTION:What You Will Learn\n\nCertified Ethical Hacking Fundamentals: Understand the principles of ethical hacking\, penetration testing\, and the role of ethical hackers in identifying and preventing cyber threats.\nFootprinting & Reconnaissance: Learn how to gather information about target systems\, networks\, and organizations using open-source intelligence and reconnaissance techniques.\nScanning & Enumeration: Develop skills to identify live systems\, open ports\, services\, and vulnerabilities using scanning and enumeration tools.\nSystem Hacking Techniques: Understand methods used to gain access to systems\, escalate privileges\, and maintain access\, as well as how to defend against such attacks.\nMalware Threats & Analysis: Learn about different types of malware\, how they operate\, and techniques used to detect\, analyze\, and prevent malware attacks.\nNetwork & Web Application Security: Gain knowledge of securing networks and web applications\, including identifying vulnerabilities such as SQL injection\, XSS\, and other common exploits.\nWireless & Mobile Security: Understand the risks associated with wireless networks and mobile devices\, and how to secure them against unauthorized access and attacks.\nCryptography Fundamentals: Learn the basics of encryption\, hashing\, and cryptographic techniques used to protect sensitive data.\nCloud Security & IoT Security: Explore security challenges in cloud environments and Internet of Things (IoT) systems\, and how to mitigate associated risks.\nPenetration Testing & Reporting: Develop the ability to conduct ethical hacking tests\, document findings\, and provide actionable recommendations to improve security posture.\n\nLimited Slots Available\nSecure your seat — limited availability \nWe keep class sizes small to ensure hands-on support and personalized feedback. \nSeats left: 12 \n📅 Happening on: June 22 – June 26\, 2026 \n⏳ Duration: 5 day • Live
URL:https://trainingheights.com/event/certified-ethical-hacker-ceh/
CATEGORIES:Information Security
ATTACH;FMTTYPE=image/jpeg:https://trainingheights.com/wp-content/uploads/2026/05/Certified-Ethical-Hacker-CEH.jpg
END:VEVENT
END:VCALENDAR