Certified Ethical Hacking (CEH)

This program will train you on the most advanced tools and techniques used by black and grey hat hackers alike to break into an organization to assess, document, and remediate vulnerabilities from a vendor neutral perspective. CEH will put you in the driver’s seat of an interactive, hand’s-on learning environment that challenges you to test the integrity of systems and networks by hacking them!

Certified Ethical Hacker (CEH) Training Program

The Certified Ethical Hacker (CEH) is a core training program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The Certified Ethical Hacker program is the most comprehensive Ethical Hacking program in the world. (Source: EC-Council)

Live, instructor-led

Whether online or in-person, this class is live to give you the opportunity to directly engage with your instructor.

Hands-on

This course includes hands-on labs and tools training to provide you with tangible skills in addition to your classroom knowledge.

UP-TO-DATE MATERIALS

You will receive books, study guides, practice questions, and external resources to ensure your ultimate preparation.

Certificate of completion

At the end of your course, you will receive a certificate of completion and will be prepared to take the Certified Ethical Hacker exam.

Price

$3000

Duration

5 Days/40 hours

or

4 weeks/40 hours

Location(s)

Live on-line and in-person

2020 Date(s)

August 8

September 5

Learning Objectives

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Interested in this course?

Have a question?