Certified Ethical Hacking Training Course

Certified Ethical Hacker (CEH)

Course Title: EC Council – Ethical Hacking and Countermeasures.
Duration:

5 Days
Contact Us for price

The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)

Feedback from our EC-Council – Ethical Hacker course’s students:

“The Certified Ethical Hacker course took me through aspects of hands-on-hacking in a combination with CEH theory in the most understandable way. Excellent instructor. ” David , Certified Ethical Hacking training January 2015

“After attending the Certified Ethical Hacking course I have to say I really feel more overall confident with Hacking tools. The CEH course was definitely worth the trip to London.” Said, CEH course February 2016

“My best recommendations for your CEH course. The Instructor of the CEH course is excellent.” Lanka, CEH April 2009“Great instructor led course, insightful and enjoyable.” Phillip, CEH course September 2015

“I have to mention that this was a first time when I have attended a Certified Ethical Hacker  course and I have left feeling I understood it. I have enjoyed the CEH course and I’m happy to recommend it to everyone ” Jude, CEH training March 2016

“Well prepared Certified Ethical Hacking course, only 10 people in a group, the CEH instructor is knowledgeable and answers in an  easy to understand way” Vladimir, CEH course April 2015

“ This CEH training has good practical methods and that is important to someone who have to go back and actually perform penetration testing” Fred, Certified Ethical Hacker Course May 2015

“The Certified Ethical Hacking training was good , organised and well prepared, you can feel that it is a well build programme” Patrick, Certified Ethical Hacking course April 2016

“I will recommend this CEH course to everyone who needs a ethical hacking course or knowledge.” Andrew, Certified Ethical Hacker training June 2015

 

CEH Description:

 

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and taught how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Underground Hacking Tools

The hacking tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization.
We live in an age where attacks are all susceptible and come from anyplace at any time and we never know how skilled, well-funded, or persistent the threat will be. Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security. Exploring every possible point of entry to find the weakest link in an organization. From the end user, the secretary, the CEO, misconfigurations, vulnerable times during migrations even information left in the dumpster.

CEH Objectives:

 

To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification awarded by the EC-Council (The International Council of Electronic Commerce Consultants).

CEH Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure

Course Outline Version 9:

 

The Ethical Hacking and Countermeasures curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students at the beginning of the class.

Course Synopsis:

 

ECCouncil Ethical Hacking and Countermeasures – CEH modules

 

01 Introduction to Ethical Hacking

 

02 Footprinting and Reconnaissance

 

03 Scanning Networks

 

04 Enumeration

 

05 System Hacking

 

06 Malware Threats

 

07 Sniffing

 

08 Social Engineering

 

09 Denial-of-Service

 

10 Session Hijacking

 

11 Hacking Webservers

 

12 Hacking Web Applications

 

13 SQL Injection

 

14 Hacking Wireless Networks

 

15 Hacking Mobile Platforms

 

16 Evading IDS, Firewalls, and Honeypots

 

17 Cloud Computing

 

18 Cryptography

 

Our Pass rate to date is 98% – CEH Course

Who Should Attend Certified Ethical Hacker | CEH Course?


This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.

Certified Ethical Hacking (CEH) certification

CEH course involves creativity and thinking ‘outside-of-the-box’, that is why vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of ‘defence in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

Certified Ethical Hacking (CEH) graphic pathThe goal of the Certified Ethical Hacking Course is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Delegates should be prepared for action paced course and the sheer size of the CEH training content, however do not be intimidated as we will release e-learning prior to the delegate attending the course and also the instructor will prepare them thoroughly for the Certification Examination, the maunuals can then be taken home and to work and can be used as excellent reference volumes.

Certified Ethical Hacking (CEH) pathStudents of the Certified Ethical Hacker course will be encouraged to experiment and explore in our State-of-the-art Labs knowing that they will not compromise their Organisations network.

Ec-Coucil -Certified Ethical Hacker Course Modules

 Certified Ethical Hacker (CEH) CEH Module 1: Introduction to Ethical Hacking Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 2: Footprinting
 Certified Ethical Hacker (CEH) CEH Module 3: Scanning Certified Ethical Hacker (CEH) CEH Module 4: Enumeration
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 5: System Hacking Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 6: Trojans and Backdoors
 Certified Ethical Hacker (CEH) CEH Module 7: Sniffers Certified Ethical Hacker (CEH) CEH Module 8: Denial of Service
 Certified Ethical Hacker (CEH) CEH Module 9: Social Engineering Certified Ethical Hacker (CEH) CEH Module 10: Session Hijacking
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 11: Hacking Web Servers Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 12: Web Application Vulnerabilities
 Certified Ethical Hacker (CEH) CEH Module 13: Web Based Password Cracking Techniques Certified Ethical Hacker (CEH) CEH Module 14: SQL Injection
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 15: Hacking Wireless Networks Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 16: Virus
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 17: Physical Security Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 18: Linux Hacking