top of page

Certified Ethical Hacker (CEH) Masterclass

DURATION: 32 Hours (4 days)

Overview

EC Council’s C|EH training workshop is the world's most advanced certified ethical hacking course with 19 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. 

This is for the first time that EC Council is coming up with classroom training by our EC Council Certified Expert Trainer in your region. You will have hands-on experience in advanced hacking tools & techniques used by hackers & IS professionals. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. This is the 10th version of C|EH. Our certification is recognized and accredited by the American National Standards Institute (ANSI), National Initiative for Cyber Security Education (NICE), CNSS, DoD, NICF, Department of Veterans Affairs, KOMLEK, MSC.

Certification

 

Certified Ethical Hacker (C|EHv10) (with 1-year exam voucher-redeem option)

Exam Code: 312-50 

Who Should Attend 

This course is intended for security professionals, auditors, site administrators, and anyone concerned with network infrastructure. 

Course Outline 

  1. Introduction to Ethical Hacking

  2. Footprinting and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. Vulnerability Analysis

  6. System Hacking

  7. Malware Threats

  8. Sniffing

  9. Social Engineering

  10. Denial-of-Service

  11. Session Hijacking

  12. Evading IDS, Firewalls, and Honeypots

  13. Hacking Web Servers

  14. Hacking Web Applications

  15. SQL Injection

  16. Hacking Wireless Networks

  17. Hacking Mobile Platforms

  18. IoT Hacking

  19. Cloud Computing

  20. Cryptography

Overview

EC Council’s C|EH training workshop is the world's most advanced certified ethical hacking course with 19 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. 

This is for the first time that EC Council is coming up with classroom training by our EC Council Certified Expert Trainer in your region. You will have hands-on experience in advanced hacking tools & techniques used by hackers & IS professionals. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. This is the 10th version of C|EH. Our certification is recognized and accredited by the American National Standards Institute (ANSI), National Initiative for Cyber Security Education (NICE), CNSS, DoD, NICF, Department of Veterans Affairs, KOMLEK, MSC.

C | EH Exam

 

Exam Title: Certified Ethical Hacker

Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)

C | EH Practical

 

Exam Title: Certified Ethical Hacker (Practical)

Number of Practical Challenges: 20

Duration: 6 hours

Availability: Aspen – iLabs

Test Format: iLabs Cyber Range

Who Should Attend 

This course is intended for security professionals, auditors, site administrators, and anyone concerned with network infrastructure. 

Compare CEH vs CEH Masterclass

Download this resource to find out the difference between Certified Ethical Hacker and Certified Ethical Hacker Masterclass.  

Course Outline 

  1. Introduction to Ethical Hacking

  2. Footprinting and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. Vulnerability Analysis

  6. System Hacking

  7. Malware Threats

  8. Sniffing

  9. Social Engineering

  10. Denial-of-Service

  11. Session Hijacking

  12. Evading IDS, Firewalls, and Honeypots

  13. Hacking Web Servers

  14. Hacking Web Applications

  15. SQL Injection

  16. Hacking Wireless Networks

  17. Hacking Mobile Platforms

  18. IoT Hacking

  19. Cloud Computing

  20. Cryptography

cropped-CEH-master-logo-01-2.png
bottom of page