The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
Prerequisite(s):
Minimum 1 year experience of hands-on experience in computer security.
Audience:
Information Security Analyst / Administrator
Information Assurance (IA) Security Officer
Information Security Manager / Specialist
Information Systems Security Engineer / Manager
Information Security Professionals / Officers
Information Security / IT Auditors
Risk / Threat/Vulnerability Analyst
System Administrators
Network Administrators and Engineers
Outline:
Lesson 1: Introduction to Ethical Hacking
Lesson 2: Footprinting and Reconnaissance
Lesson 3: Scanning Networks
Lesson 4: Enumeration
Lesson 5: Vulnerability Analysis
Lesson 6: System Hacking
Lesson 7: Malware Threats
Lesson 8: Sniffing
Lesson 9: Social Engineering
Lesson 10: Denial-of-Service
Lesson 11: Session Hijacking
Lesson 12: Evading IDS, Firewalls, and Honeypots
Lesson 13: Hacking Web Servers
Lesson 14: Hacking Web Applications
Lesson 15: SQL Injection
Lesson 16: Hacking Wireless Networks
Lesson 17: Hacking Mobile Platforms
Lesson 18: IoT and OT Hacking
Lesson 19: Cloud Computing
Lesson 20: Cryptography
Additional information
Length
5 days
Guaranteed to run
No
Contact Us (425) 460-2200
Thank you for using
Themify Popup
This is a sample pop up. A Themify theme or Builder Plugin (free) is recommended to design the pop up layouts.
Certified Ethical Hacker (CEH)
Dates are listed in Pacific Time Zone
$3,895.00
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
Description
Overview:
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
Prerequisite(s):
Minimum 1 year experience of hands-on experience in computer security.
Audience:
Outline:
Lesson 1: Introduction to Ethical Hacking
Lesson 2: Footprinting and Reconnaissance
Lesson 3: Scanning Networks
Lesson 4: Enumeration
Lesson 5: Vulnerability Analysis
Lesson 6: System Hacking
Lesson 7: Malware Threats
Lesson 8: Sniffing
Lesson 9: Social Engineering
Lesson 10: Denial-of-Service
Lesson 11: Session Hijacking
Lesson 12: Evading IDS, Firewalls, and Honeypots
Lesson 13: Hacking Web Servers
Lesson 14: Hacking Web Applications
Lesson 15: SQL Injection
Lesson 16: Hacking Wireless Networks
Lesson 17: Hacking Mobile Platforms
Lesson 18: IoT and OT Hacking
Lesson 19: Cloud Computing
Lesson 20: Cryptography
Additional information
5 days
No