Overview
EC Council’s C|EH training workshop is the world's most advanced certified ethical hacking course with 19 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.
This is for the first time that EC Council is coming up with classroom training by our EC Council Certified Expert Trainer in your region. You will have hands-on experience in advanced hacking tools & techniques used by hackers & IS professionals. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. This is the 10th version of C|EH. Our certification is recognized and accredited by the American National Standards Institute (ANSI), National Initiative for Cyber Security Education (NICE), CNSS, DoD, NICF, Department of Veterans Affairs, KOMLEK, MSC.
Certification
Certified Ethical Hacker (C|EHv10) (with 1-year exam voucher-redeem option)
Exam Code: 312-50
Who Should Attend
This course is intended for security professionals, auditors, site administrators, and anyone concerned with network infrastructure.
Course Outline
-
Introduction to Ethical Hacking
-
Footprinting and Reconnaissance
-
Scanning Networks
-
Enumeration
-
Vulnerability Analysis
-
System Hacking
-
Malware Threats
-
Sniffing
-
Social Engineering
-
Denial-of-Service
-
Session Hijacking
-
Evading IDS, Firewalls, and Honeypots
-
Hacking Web Servers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
IoT Hacking
-
Cloud Computing
-
Cryptography
Overview
EC Council’s C|EH training workshop is the world's most advanced certified ethical hacking course with 19 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.
This is for the first time that EC Council is coming up with classroom training by our EC Council Certified Expert Trainer in your region. You will have hands-on experience in advanced hacking tools & techniques used by hackers & IS professionals. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. This is the 10th version of C|EH. Our certification is recognized and accredited by the American National Standards Institute (ANSI), National Initiative for Cyber Security Education (NICE), CNSS, DoD, NICF, Department of Veterans Affairs, KOMLEK, MSC.
C | EH Exam
Exam Title: Certified Ethical Hacker
Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
C | EH Practical
Exam Title: Certified Ethical Hacker (Practical)
Number of Practical Challenges: 20
Duration: 6 hours
Availability: Aspen – iLabs
Test Format: iLabs Cyber Range
Who Should Attend
This course is intended for security professionals, auditors, site administrators, and anyone concerned with network infrastructure.
Compare CEH vs CEH Masterclass
Download this resource to find out the difference between Certified Ethical Hacker and Certified Ethical Hacker Masterclass.
Course Outline
-
Introduction to Ethical Hacking
-
Footprinting and Reconnaissance
-
Scanning Networks
-
Enumeration
-
Vulnerability Analysis
-
System Hacking
-
Malware Threats
-
Sniffing
-
Social Engineering
-
Denial-of-Service
-
Session Hijacking
-
Evading IDS, Firewalls, and Honeypots
-
Hacking Web Servers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
IoT Hacking
-
Cloud Computing
-
Cryptography

