Certified Ethical Hacking

4.5 (1659) 8750 Learners

EC-Council Certified Ethical Hacker preparing confirms a security proficient as an Ethical Hacker and Penetration Tester. CEH preparing affirms the capacities of a moral programmer to make preparations for the shortcomings and weaknesses of organization framework and unlawful hacking.

Download Syllabus

Overview

The Certified Ethical Hacker (CEH v10) training & certification course is one of the most trusted and popular ethical hacking training Program. Current versions are in its 10th iteration and are updated with current technologies like artificial intelligence (AI), Internet of Things (IoT) to provide the learner with most advanced tools and techniques used by hackers and information security professionals. The current version is more focused on hands-on practice. This course is the most popular and most selling in Security Testing Technology.

A CEH certification is helpful considering the increasing security threats to computer networks and web servers and the need to make networks "hacker-proof". The best way to do this is by understanding the methods employed by hackers to intrude into systems. A Certified Ethical Hacker (CEH v10) starts thinking in a way an “illegal hacker” does but uses the EC-Council’s ethical hacking certification experience and tools to legally penetrate and test networks and computer systems.

What you will learn

  • Trojans, backdoors, and countermeasures
  • IDS, firewalls, and honeypots
  • Advanced hacking concepts
  • Network packet analysis
  • Mobile and web technologies
  • Advanced log management

Benefits

This ethical hacking certification verifies the skills required to thrive in the information security domain. Many IT departments have made CEH compulsory for security-related posts. CEH certified ethical hacker professionals earn 44-percent higher salaries than non-certified professionals.

Career Opportunities

  • Information Security Officer      ($15K-$16K)
  • Computer Forensics Engineer  (3.5K -$35K)
  • Ethical Hacker                           ($8.5K-$10K)
  • Network Security Engineer       ($4K-$15K)

Top Companies Hiring:

  • Oracle
  • IBM
  • Cisco
  • Deloitte
  • Accenture
  • Intel

 

Course Content

Information Security Overview 14:01 Play
Information Security Threats and Attack Vectors 14:07 Play
Hacking Concepts 14:07 Play
Ethical Hacking Concepts 14:07 Play
Information Security Controls 14:07 Play
Penetration Testing Concepts 14:07 Play
Information Security Laws and Standards 14:07 Play
Foot Printing Concepts 14:15 Play
Footprinting through Search Engines 14:15 Play
Footprinting through Web Services 14:15 Play
Footprinting through Social Networking Sites 14:16 Play
Website Footprinting 14:16 Play
Email FootPrinting 14:16 Play
Competitive Intelligence 14:16 Play
Who is Footprinting 14:16 Play
DNS Footprinting 14:16 Play
Network Footptrinting 14:16 Play
Footprinting through Social Engineering 14:16 Play
Footprinting Tools 14:16 Play
Countermeasures 14:16 Play
Footprinting Pen Testing 14:16 Play
Network Scanning Concepts 14:18 Play
Scanning Tools 14:18 Play
Scanning Techniques 14:18 Play
Scanning Beyond IDS and Firewall 14:18 Play
Banner Grabbing 14:18 Play
Draw Network Diagrams 14:18 Play
Scanning Pen Testing 14:18 Play
Enumeration Concepts 14:21 Play
NetBIOS Enumeration 14:21 Play
SNMP Enumeration 14:21 Play
LDAP Enumeration 14:21 Play
NTP Enumeration 14:21 Play
SMTP Enumeration and DNS Enumeration 14:21 Play
Other Enumeration Techniques 14:21 Play
Enumeration Countermeasures 14:21 Play
Enumeration Pen Testing 14:21 Play
Vulnerability Assessment Concepts 14:29 Play
Vulnerability Assessment Solutions 14:29 Play
Vulnerability Scoring Systems 14:29 Play
Vulnerability Assessment Tools 14:29 Play
Vulnerability Assessment Reports 14:29 Play
System Hacking Concepts 14:31 Play
Cracking Passwords 14:31 Play
Escalating Privileges 14:31 Play
Executing Applications 14:31 Play
Hiding Files 14:31 Play
Covering Tracks 14:31 Play
Penetration Testing 14:31 Play
Malware Concepts 14:34 Play
Trojan Concepts 14:34 Play
Virus and Worm Concepts 14:34 Play
Malware Analysis 14:34 Play
Countermeasures 14:34 Play
Anti-Malware Software 14:34 Play
Malware Penetration Testing 14:34 Play
Sniffing Concepts 14:36 Play
Sniffing Technique: MAC Attacks 14:36 Play
Sniffing Technique: DHCP Attacks 14:36 Play
Sniffing Technique: ARP Poisoning 14:36 Play
Sniffing Technique: Spoofing Attacks 14:36 Play
Sniffing Technique: DNS Poisoning 14:36 Play
Sniffing Tools 14:36 Play
Countermeasures 14:36 Play
Sniffing Detection Techniques 14:36 Play
Sniffing Pen Testing 14:36 Play
Social Engineering Concepts 14:38 Play
Social Engineering Techniques 14:38 Play
Insider Threats 14:38 Play
Impersonation on Social Networking Sites 14:38 Play
Identity Theft 14:38 Play
Countermeasures 14:38 Play
Social Engineering Penetration Testing 14:38 Play
DoS/DDoS Concepts 14:40 Play
DoS/DDoS Attack Techniques 14:40 Play
Botnets 14:40 Play
DDoS Case Study 14:40 Play
DoS/DDoS Attack Tools 14:40 Play
Countermeasures 14:40 Play
DoS/DDoS Protection Tools 14:40 Play
DoS/DDoS Attack Penetration Testing 14:40 Play
Session Hijacking Concepts 14:42 Play
Application Level Session Hijacking 14:42 Play
Network Level Session Hijacking 14:42 Play
Session Hijacking Tools 14:42 Play
Countermeasures 14:42 Play
Penetration Testing 14:42 Play
IDS, Firewall and Honeypot Concepts 14:44 Play
IDS, Firewall and Honeypot Solutions 14:44 Play
Evading IDS 14:44 Play
Evading Firewalls 14:44 Play
IDS/Firewall Evading Tools 14:44 Play
Detecting Honeypots 14:44 Play
IDS/Firewall Evasion Countermeasures 14:44 Play
Penetration Testing 14:44 Play
Web Server Concepts 14:46 Play
Web Server Attacks 14:46 Play
Web Server Attack Methodology 14:46 Play
Web Server Attack Tools 14:46 Play
Countermeasures 14:46 Play
Web App Security Testing Tools 14:46 Play
Web App Pen Testing 14:46 Play
Web App Concepts 14:49 Play
Web App Threats 14:49 Play
Hacking Methodology 14:49 Play
Web Application Hacking Tools 14:49 Play
Countermeasures 14:49 Play
Web App Security Testing Tools 14:49 Play
Web App Pen Testing 14:49 Play
SQL Injection Concepts 15:10 Play
Types of SQL Injection 15:10 Play
SQL Injection Methodology 15:10 Play
SQL Injection Tools 15:10 Play
Evasion Techniques 15:10 Play
Countermeasures 15:10 Play
Wireless Concepts 15:14 Play
Wireless Encryption 15:14 Play
Wireless Threats 15:14 Play
Wireless Hacking Methodology 15:14 Play
Wireless Hacking Tools 15:14 Play
Bluetooth Hacking 15:14 Play
Countermeasures 15:14 Play
Wireless Security Tools 15:14 Play
Wi-Fi Pen Testing 15:14 Play
Mobile Platform Attack Vectors 15:15 Play
Hacking Android OS 15:15 Play
Hacking iOS 15:15 Play
Mobile Spyware 15:15 Play
Mobile Device Management 15:15 Play
Mobile Security Guidelines and Tools 15:15 Play
Mobile Pen Testing 15:16 Play
IoT Concepts 15:17 Play
IoT Attacks 15:17 Play
IoT Hacking Methodology 15:17 Play
IoT Hacking Tools 15:17 Play
Countermeasures 15:17 Play
IoT Pen Testing 15:17 Play
Cloud Computing Concepts 15:19 Play
Cloud Computing Threats 15:19 Play
Cloud Computing Attacks 15:19 Play
Cloud Security 15:19 Play
Cloud Security Tools 15:19 Play
Cloud Penetration Testing 15:19 Play
Cryptography Concepts 15:20 Play
Encryption Algorithms 15:20 Play
Cryptography Tools 15:20 Play
Public Key Infrastructure (PKI) 15:20 Play
Email Encryption 15:20 Play
Disk Encryption 15:20 Play
Cryptanalysis 15:20 Play
Countermeasures 15:20 Play

Course Details

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

What is the Main Purpose Behind the Certified Ethical Hacker Training?

  • The CEH certification helps establish and govern minimum standards for professional information security specialists in ethical hacking measures.
  • To inform individuals and enterprises that there are individuals who meet or exceed the minimum standards in ethical hacking.
  • Help reiterate an important point that ethical hacking can be a self-regulating profession.

This ethical hacking training will introduce the students to an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab’s intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then learn how to scan and hack their own networks (no real network is harmed) to spot vulnerabilities. During this ethical hacking course, students learn how intruders escalate privileges and what steps can be taken to secure a system.

What's New in Certified Ethical Hacking CEH v10 Course?

The major highlights of CEHv10 are:

  • A new module on the security of IoT devices has been added. The module focusses on the factors affecting IoT security.
  • The module on Vulnerability Analysis has been updated allowing a better understanding and demonstrating the application of vulnerability analysis in a real-world environment. The topic also discusses the tools and techniques widely used by attackers to perform vulnerability analysis.
  • The updated version also focusses on emerging attack vectors on the Cloud, Artificial Intelligence and Machine Learning, simultaneously throwing light on the cloud computing security and the corresponding tools.
  • The CEHv10 comes with a complete update on Malware Analysis process. Malware causes serious damage to the information, data, and systems; resulting in financial losses. The process of Reverse Engineering is emphasized to give clarity on determining the malware’s origin, functionality, and potential impact.
  • STORM, a mobile security tool, has been introduced in this new version.

Eligibility

This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.

Who Should Do Certified Ethical Hacker (CEH v10) training Course?

CEH training is beneficial for the following professionals:

  • Ethical hackers
  • System Administrators
  • Network Administrators and Engineers,
  • Auditors & Security Professionals
  • Network Security Professionals
  • Site Administrators
  • Security Officers
  • Anyone else entrusted with the responsibility of safeguarding the integrity of the network infrastructure

 

Course Info.

Lenght
10 days
Effort
4 Hours per week
Institution
EC Council
Language
English
Video Script
English

Training Options

Selfpaced Training

499
  • Lifetime access to high-quality self-paced eLearning content curated by industry experts
  • 4 hands-on projects to perfect the skills learnt
  • 3 simulation test papers for self-assessment
  • Lab access to practice live during sessions
  • 24x7 learner assistance and support

Live Virtual Classes

599

40 Hours of Online Live Instructor-Led Classes. 

Weekend Class : 10 sessions of 4 hours each.

Live project based on any of the selected use cases, involving implementation of the various AWS services.

You get lifetime access to the Learning Management System (LMS). Class recordings and presentations can be viewed online from

One on One Training

1100
  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Exam & Certification

About The Exam

Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
 

Passing Score:

In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

 

Certified Ethical Hacking

FAQs

The tools you’ll need to attend the Ethical Hacking Course are:

  • Windows: Windows XP SP3 or higher
  • Mac: OSX 10.6 or higher
  • Internet speed: Preferably 512 Kbps or higher
  • Headset, speakers and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.