Certified Ethical Hacker
Delve into the mindset of a hacker to learn how to defend against cyber attacks with EC Council's Ethical Hacker Certificate.
This course is delivered in partnership with EC–Council, the world’s largest cybersecurity technical certification body. A globally recognized and trusted leader in cybersecurity training, EC Council has over 200,000 security professionals certified in 145 countries, including individuals from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM, and the United Nations.
The Certified Ethical Hacker (C|EH v10) program is an accredited ethical hacking training course that provides the advanced tools and techniques used by hackers and information security professionals to break into an organization’s digital systems.
This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.
This course includes:
- Certified instructor-led training
- Virtual course delivery
- 6 months iLabs subscription
- ECC Certification Voucher w/ Remote Proctoring Services
This course includes a voucher to complete the remote proctored CEH certification exam (valid for one year). Complete your certification at your convenience!
WHO SHOULD ATTEND?
- Ethical hackers
- System Administrators
- Network Administrators and Engineers
- Webmanagers Auditors
- Security professionals in general
There are no prerequisites, however, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended. Members are expected to adhere to recertification requirements through EC-Council’s continuing education requirements.
WHAT YOU WILL LEARN?
1. Key issues plaguing the information security world, incident management process, and penetration testing
2. Various types of footprinting, footprinting tools, and countermeasures
3. Network scanning techniques and scanning countermeasures
4. Enumeration techniques and enumeration countermeasures
5. System hacking methodology, steganography, steganalysis attacks, and covering tracks
6. Different types of Trojans, Trojan analysis, and Trojan countermeasures
7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
8. Packet sniffing techniques and how to defend against sniffing
9. Social Engineering techniques, identify theft, and social engineering countermeasures
10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
11. Session hijacking techniques and countermeasures
12. Different types of webserver attacks, attack methodology, and countermeasures
13. Different types of web application attacks, web application hacking methodology, and countermeasures
14. SQL injection attacks and injection detection tools
15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
16. Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools
17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
18. Various cloud computing concepts, threats, attacks, and security techniques and tools
19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
20. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
21. Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
22. Different threats to IoT platforms and learn how to defend IoT devices securely
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Social Engineering
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing