COURSE INTRODUCTION
The EC-Council Certified Ethical Hacker course verifies your advanced security skill-sets to thrive in the worldwide information security domain. Many IT departments have made CEH certification a compulsory qualification for security-related posts, making it a go-to certification for security professionals. CEH-certified professionals typically earn 44 percent higher salaries than their non-certified peers.
The ethical hacking certification course opens up numerous career advancement opportunities, preparing you for a role as a computer network defence (CND) analyst, CND infrastructure support, CND incident responder, CND auditor, forensic analyst, intrusion analyst, security manager, and other related high-profile roles.
KEY FEATURES
COURSE OBJECTIVES
After completing this course, students will have knowledge and skills to:
AUDIENCE
The Certified Ethical Hacker CEH training course is best suited for:
EXAM & CERTIFICATION
Unlock Simplilearn Certificate:
Attend one complete class of the CEH course.
Validity of CEH exam voucher:
Exam vouchers are valid for 1 year from the date of course purchase. If you do not book the exam within 1 year from the purchase of the voucher, you will need to buy the voucher again as per the actual price.
Is the CEH examination fees included in the course fee?
Yes, the course fee is inclusive of the CEH examination fee.
How many attempts do I have to pass the CEH exam?
You are eligible to take the CEH exam no more than five times in a 12-month period. You are not allowed to retake the same version of the exam If you have already passed that version.
If I fail the CEH exam, how soon can I retake it and how do I apply for CEH re-examination?
If you do not pass the exam in your first attempt, you can retake it any time, but if you fail in your successive attempts, you will have to wait for 14 days every time to retake the exam.
If you fail an EC-Council exam, you can buy an ECC Exam Center voucher to reappear for the exam.
COURSE CONTENT
Lesson 01 - Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 06 - Penetration Testing Concepts
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 07 - Information Security Laws and Standards
Module 02- Footprinting and Reconnaissance
Module 03- Scanning Networks
Module 04- Enumeration
Module 05- Vulnerability Analysis
Module 06- System Hacking
Module 07- Malware Threats
Module 08- Sniffing
Module 09- Social Engineering
Module 10- Denial-of-Service
Module 11- Session Hijacking
Module 12 - Evading IDS, Firewalls, and Honeypots
Module 13- Hacking Web Servers
Module 14- Hacking Web Applications
Module 15- SQL Injection
Module 16- Hacking Wireless Networks
Module 17- Hacking Mobile Platforms
Module 18- IoT Hacking
Module 19- Cloud Computing
Module 20- Cryptography