CERTIFIED ETHICAL HACKER V11

Provided by

About the course

Description
 

In this award-winning Certified Ethical Hacker (CEH v11) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your CEH certification course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

About This Course
 
Key Features:
 

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course instructor coaching benefit
  • After-course computing sandbox included

 
Learning Objectives:
 

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure
     

 

Course Content
Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

 Exam Information
This course includes a voucher to take the CEH exam via ProctorU
You can request your voucher at any time after you complete the course
Prerequisites
 

It is recommended that delegates have two years of security-related experience and a strong practical working knowledge of TCP/IP

What's Included?
 

  • Breakfast, Lunch, mid-morning coffees/teas, etc
  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox

Who Should Attend?
 

Information Security Analyst / Administrator

Information Assurance (IA) Security Officer

Information Security Manager / Specialist

Information Systems Security Engineer / Manager

Information Security Professionals / Officers

Information Security / IT Auditors

Risk / Threat / Vulnerability Analyst

System Administrators

Related article

Addressing The Weakest link John McGlone at The Training Centre outlines how you can address the weakest link in cybersecurity. Companies spend a s...