Certified Ethical Hacker (CEH V11)

Course overview
This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.
You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v11 program.
Ethical Hacker
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.
Who should attend?
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Prerequisite
Students should be familiar with Windows NT and/or Linux operating systems. TCP/IP and basic networking knowledge. Students should have knowledge of basic router concepts as they relate to Layer 3 of the OSI model. Not anyone can be a student – the Accredited Training Centers (ATC) will make sure the applicants work for legitimate company.
Course Structure:
CEHv10 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.
- Module 1:Introduction to Ethical Hacking
- Module 2:Footprinting and Reconnaissance
- Module 3:Scanning Networks
- Module 4:Enumeration
- Module 5:Vulnerability Analysis
- Module 6: System Hacking
- Module 7: Malware Threats
- Module 8: Sniffing
- Module 9: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Certified Ethical Hacking Certification
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
CEH V10 exam
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
CEH Practical
Number of Practical Challenges: 20
Test Duration: 6 Hours
Test Format: iLabs cyber range
Test Delivery: Aspen- iLabs
* C|EH (Practical) is available fully proctored, online, with remote facilities globally.