Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Certified Ethical Hacker (CEH)

The most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking. The purpose of the CEH credential is to: establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, inform the public that credentialed individuals meet or exceed the minimum standards, and reinforce ethical hacking as a unique and self-regulating profession. (Certificate accredited by EC-Council)

Description

The hacking course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. This hacking course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The CEH is the first of a series of 3 comprehensive courses (CEH, ECSA and the APT course) to help a cyber security professional master penetration testing.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Accredited by EC-Council

About the Exam

Exam Name: CEH 312-50 (ECC EXAM), 312-50 (VUE)
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE

Duration

5 days

Prerequisites

2 years of work experience in the Information Security domain

Target Audience

Security officers
Auditors
Security professionals
Site administrators
Anyone who is concerned about the integrity of the network infrastructure

Topics

Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Cryptography

More Information

Price includes exams and materials.

Similar courses

Certified Network Defender (CND)

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations.

More Information
Security Awareness Training

As a Training Center, our goal is to provide world class education and empower customers with security skills and be equipped with to safeguard themselves and support organizations in their mission critical business needs that continue to grow.

More Information
Certified Secure Computer User (CSCU)

The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. (Certificate accredited by EC-Council)

More Information
Certified Incident Handler (ECIH)

The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.

More Information
Certified Security Analyst (ECSA)

The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges

More Information
Certified Application Security Engineer (CASE.NET)

The Certified Application Security Engineer (CASE .NET) credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

More Information
Certified Application Security Engineer (CASE JAVA)

The CASE Java program is designed to be a hands-on, comprehensive application security training course that trains software developers on the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in today’s insecure operating environment.

More Information
Certified SOC Analyst (CSA)

This program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

More Information
Certified Threat Intelligence Analyst (CTIA)

CTIA is a method-driven Threat Intelligence program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

More Information
Computer Hacking Forensic Investigator (CHFI)

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

More Information

Press enter to see more results