Certified Ethical Hacker V11

4.5 (1659) 8750 Learners

The CEH training has been desinged in such a manner to help individuals to understand concepts and develop the skill sets that are attractive to all global brands. The training is a combination of both theoretical and practical which will help you understand the course in a dynamic manner and also be able to apply it in real life. 

Wissenhive's training will ensure that it prepares you well to clear the CEH- V11 exam offered by EC- Council.

 

Overview

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

With the wissenhive CEH V11 training you will be able to evolve with the latest operating systems, tools, tactics, exploits, and technologies improving your employbility.

 

 

Key features

  • Accredited Training Partner
  • Exam Voucher Included
  • Access to I labs
  • Study Guides
  • Lifetime Training Access

 

What you will learn

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.

 

Syllabus

International industry expertise at your disposal as you deep-dive into the research topic and sector of your choice.

Career Options

After completing a properly certified ethical hacking course, career options become diverse. Most people think there are limited options, but it’s not true. Let’s cover some prominent leading career options that can be pursued after the ethical hacking course.

According to 2021 statistics in the United States, a professional Ethical Hacker’s average salary is around $100,200, and the monthly salary is about $8350, but typically salary range falls between $89,400 and $114,000 yearly. Salary range depends on various important factors that include the certified ethical hacking training course, education qualification, years of experience, additional skills, industry, etc.

Here are some other ethical hacking profession with their annual salary

 

Job Roles

Annual Salary

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Course Content

Introduction to Ethical Hacking (6 Lectures)

Information Security Overview

Play

Cyber Kill Chain Concepts

Play

Hacking Concepts

Play

Ethical Hacking Concepts

Play

Information Security Controls

Play

Information Security Laws and Standards

Play

Footprinting and Reconnaissance (12 Lectures)

Footprinting Concepts

Play

Footprinting through Search Engines

Play

Footprinting through Web Services

Play

Footprinting through Social Networking Sites

Play

Website Footprinting

Play

Email Footprinting

Play

Who is Footprinting

Play

DNS Footprinting

Play

Network Footprinting

Play

Footprinting through Social Engineering

Play

Footprinting Tools

Play

Footprinting Countermeasures

Play

Scanning Networks (7 Lectures)

Network Scanning Concepts

Play

Scanning Tools

Play

Host Discovery

Play

Port and Service Discovery

Play

OS Discovery (Banner Grabbing/OS Fingerprinting)

Play

Scanning Beyond IDS and Firewall

Play

Draw Network Diagrams

Play

Enumeration (8 Lectures)

Enumeration Concepts

Play

NetBIOS Enumeration

Play

SNMP Enumeration

Play

LDAP Enumeration

Play

NTP and NFS Enumeration

Play

SMTP and DNS Enumeration

Play

Other Enumeration Techniques

Play

Enumeration Countermeasures

Play

Vulnerability Analysis (4 Lectures)

Vulnerability Assessment Concepts

Play

Vulnerability Classification and Assessment Types

Play

Vulnerability Assessment Solutions and Tools

Play

Vulnerability Assessment Reports

Play

System Hacking (5 Lectures)

System Hacking Concepts

Play

Gaining Access

Play

Escalating Privileges

Play

Maintaining Access

Play

Clearing Logs

Play

Malware Threats (8 Lectures)

Malware Concepts

Play

APT Concepts

Play

Trojan Concepts

Play

Virus and Worm Concepts

Play

Fileless Malware Concepts

Play

Fileless Malware Concepts

Play

Countermeasures

Play

Anti-Malware Software

Play

Sniffing (9 Lectures)

Sniffing Concepts

Play

Sniffing Technique: MAC Attacks

Play

Sniffing Technique: DHCP Attacks

Play

Sniffing Technique: ARP Poisoning

Play

Sniffing Technique: Spoofing Attacks

Play

Sniffing Technique: DNS Poisoning

Play

Sniffing Tools

Play

Countermeasures

Play

Sniffing Detection Techniques

Play

Social Engineering (6 Lectures)

Social Engineering Concepts

Play

Social Engineering Techniques

Play

Insider Threats

Play

Impersonation on Social Networking Sites

Play

Identity Theft

Play

Countermeasures

Play

Denial-of-Service (7 Lectures)

DoS/DDoS Concepts

Play

DoS/DDoS Attack Techniques

Play

Botnets

Play

DDoS Case Study

Play

DoS/DDoS Attack Tools

Play

Countermeasures

Play

DoS/DDoS Protection Tools

Play

Session Hijacking (5 Lectures)

Session Hijacking Concepts

Play

Application Level Session Hijacking

Play

Network Level Session Hijacking

Play

Session Hijacking Tools

Play

Countermeasures

Play

Evading IDS, Firewalls, and Honeypots (7 Lectures)

IDS, IPS, Firewall, and Honeypot Concepts

Play

IDS, IPS, Firewall, and Honeypot Solutions

Play

Evading IDS

Play

Evading Firewalls

Play

IDS/Firewall Evading Tools

Play

Detecting Honeypots

Play

IDS/Firewall Evasion Countermeasures

Play

Hacking Web Servers (7 Lectures)

Web Server Concepts

Play

Web Server Attacks

Play

Web Server Attack Methodology

Play

Web Server Attack Tools

Play

Countermeasures

Play

Patch Management

Play

Web Server Security Tools

Play

Hacking Web Applications (5 Lectures)

Web Application Concepts

Play

Web Server Attacks

Play

Web Application Hacking Methodology

Play

Web API, Webhooks, and Web Shell

Play

Web Application Security

Play

SQL Injection (6 Lectures)

SQL Injection Concepts

Play

Types of SQL Injection

Play

SQL Injection Methodology

Play

SQL Injection Tools

Play

Evasion Techniques

Play

Countermeasures

Play

Hacking Wireless Networks (8 Lectures)

Wireless Concepts

Play

Wireless Encryption

Play

Wireless Threats

Play

Wireless Hacking Methodology

Play

Wireless Hacking Tools

Play

Bluetooth Hacking

Play

Countermeasures

Play

Wireless Security Tools

Play

Hacking Mobile Platforms (5 Lectures)

Mobile Platform Attack Vectors

Play

Hacking Android OS

Play

Hacking iOS

Play

Mobile Device Management

Play

Mobile Security Guidelines and Tools

Play

IoT and OT Hacking (10 Lectures)

IoT Hacking & IoT Concepts

Play

IoT Attacks

Play

IoT Hacking Methodology

Play

IoT Hacking Tools

Play

Countermeasures

Play

OT Hacking OT & Concepts

Play

OT Attacks

Play

OT Hacking Methodology

Play

OT Hacking Tools

Play

Countermeasures

Play

Cloud Computing (6 Lectures)

Cloud Computing Concepts

Play

Container Technology

Play

Serverless Computing

Play

Cloud Computing Threats

Play

Cloud Hacking

Play

Cloud Security

Play

Cryptography (8 Lectures)

Cryptography Concepts

Play

Encryption Algorithms

Play

Cryptography Tools

Play

Public Key Infrastructure (PKI)

Play

Email Encryption

Play

Disk Encryption

Play

Cryptanalysis

Play

Countermeasures

Play

Course Details

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

Target Audience

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst 
  • System Administrators
  • Network Administrators and Engineers

 

 

Enquire Now

Training Options

Self-paced Training

899
  • Lifetime access to high-quality self-paced eLearning content curated by industry experts
  • Hands-on projects to perfect the skills learnt
  • Simulation test papers for self-assessment
  • 24x7 learner assistance and support

Live Virtual Classes

1200
  • Online Classroom Flexi-Pass
  • Lifetime access 
  • Hands-on projects to perfect the skills learnt
  • Simulation test papers for self-assessment
  • 24x7 learner assistance and support
Classes starting from:-

One on One Training

Enquiry Now
  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Exam & Certification

CEH (ANSI)

Exam Title: Certified Ethical Hacker (ANSI)  

Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)  

Number of Questions: 125

Duration: 4 hours  

Test Format: Multiple Choice

Availability: ECCEXAM / VUE  

CEH (Practical)

Exam Title: Certified Ethical Hacker (Practical)

Number of Practical Challenges: 20  

Duration: 6 hours  

Availability: Aspen- iLabs  

Test Format: iLabs cyber range

Passing Score: 70%

 

 

Certified Ethical Hacker V11

Frequently Asked Questions

There are no prerequisites to enroll in this Ethical Hacking course. However, having a basic understanding of TCP/IP may enhance your learning experience.

Yes. This online program is accredited by EC-Council.

To unlock the Ethical Hacking training certificate, you have to complete all the modules, along with the projects.

Yes! The CEH  exam voucher is includes in the package.

Email