CEH (V11)- Certified Ethical Hacker

COURSE INTRODUCTION

The EC-Council Certified Ethical Hacker course verifies your advanced security skill-sets to thrive in the worldwide information security domain. Many IT departments have made CEH certification a compulsory qualification for security-related posts, making it a go-to certification for security professionals. CEH-certified professionals typically earn 44 percent higher salaries than their non-certified peers.

The ethical hacking certification course opens up numerous career advancement opportunities, preparing you for a role as a computer network defence (CND) analyst, CND infrastructure support, CND incident responder, CND auditor, forensic analyst, intrusion analyst, security manager, and other related high-profile roles.

KEY FEATURES

  • 40 hours of instructor-led training
  • 6 months free access to CEHv11 iLabs
  • Accredited Training Partner (ATP) of EC-Council
  • Study Material (e-Kit) by EC Council
  • Covers 20 current security domains and 340 attack technologies

COURSE OBJECTIVES

After completing this course, students will have knowledge and skills to:

  • Grasp the step-by-step methodology and tactics that hackers use to penetrate network systems
  • Understand the finer nuances of trojans, backdoors, and countermeasures
  • Get a better understanding of IDS, firewalls, honeypots, and wireless hacking
  • Master advanced hacking concepts, including mobile device, and smartphone hacking, writing virus codes, exploit writing & reverse engineering and corporate espionage,
  • Gain expertise on advanced concepts such as advanced network packet analysis, securing IIS & Apache web servers, Windows system administration using Powershell, and hacking SQL and Oracle databases
  • Cover the latest developments in mobile and web technologies including Andriod, iOS, BlackBerry, Windows Phone, and HTML 5
  • Learn advanced log management for information assurance and allow you to manage information security with more clarity

AUDIENCE

The Certified Ethical Hacker CEH training course is best suited for:

  • Network security officers and practitioners
  • Site administrators
  • IS/IT specialist, analyst, or manager
  • IS/IT auditor or consultant
  • IT operations manager
  • IT security specialist, analyst, manager, architect, or administrator
  • IT security officer, auditor, or engineer
  • Network specialist, analyst, manager, architect, consultant, or administrator
  • Technical support engineer
  • Senior systems engineer
  • Systems analyst or administrator

EXAM & CERTIFICATION

Unlock Simplilearn Certificate:

Attend one complete class of the CEH course.

Validity of CEH exam voucher:

Exam vouchers are valid for 1 year from the date of course purchase. If you do not book the exam within 1 year from the purchase of the voucher, you will need to buy the voucher again as per the actual price.

Is the CEH examination fees included in the course fee?

Yes, the course fee is inclusive of the CEH examination fee.

How many attempts do I have to pass the CEH exam?

You are eligible to take the CEH exam no more than five times in a 12-month period. You are not allowed to retake the same version of the exam If you have already passed that version.

If I fail the CEH exam, how soon can I retake it and how do I apply for CEH re-examination?

If you do not pass the exam in your first attempt, you can retake it any time, but if you fail in your successive attempts, you will have to wait for 14 days every time to retake the exam.

If you fail an EC-Council exam, you can buy an ECC Exam Center voucher to reappear for the exam.

COURSE CONTENT

Lesson 01 - Information Security Overview

Lesson 02 - Information Security Threats and Attack Vectors

Lesson 06 - Penetration Testing Concepts

Lesson 03 - Hacking Concepts

Lesson 04 - Ethical Hacking Concepts

Lesson 05 - Information Security Controls

Lesson 07 - Information Security Laws and Standards

Module 02- Footprinting and Reconnaissance

Module 03- Scanning Networks

Module 04- Enumeration

Module 05- Vulnerability Analysis

Module 06- System Hacking

Module 07- Malware Threats

Module 08- Sniffing

Module 09- Social Engineering

Module 10- Denial-of-Service

Module 11- Session Hijacking

Module 12 - Evading IDS, Firewalls, and Honeypots

Module 13- Hacking Web Servers

Module 14- Hacking Web Applications

Module 15- SQL Injection

Module 16- Hacking Wireless Networks

Module 17- Hacking Mobile Platforms

Module 18- IoT Hacking

Module 19- Cloud Computing

Module 20- Cryptography

Labs
CÓ THỂ BẠN QUAN TÂM
Array
(
)