C|EH - Certified Ethical Hacking

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

What is New in the CEHV10 Course
This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As “a picture tells a thousand words”, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certi¬ed Instructor. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certi¬ed Ethical Hacker certi¬cation! This course prepares you for EC-Council Certi¬ed Ethical Hacker exam 312-50. In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certi¬ed Ethical Hacker certi¬cation!

What will you learn?

1. Students going through CEH training will learn:
2. Key issues plaguing the information security world, incident management process, and penetration testing
3. Various types of footprinting, footprinting tools, and countermeasures
4. Network scanning techniques and scanning countermeasures
5. Enumeration techniques and enumeration countermeasures
6. System hacking methodology, steganography, steganalysis attacks, and covering tracks
7. Di¬erent types of Trojans, Trojan analysis, and Trojan countermeasures
8. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
9. Packet sni ng techniques and how to defend against sning
10. Social Engineering techniques, identify theft, and social engineering countermeasures
11. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
12. Session hijacking techniques and countermeasures
13. Di¬erent types of webserver attacks, attack methodology, and countermeasures
14. Di¬erent types of web application attacks, web application hacking methodology, and countermeasures
15. SQL injection attacks and injection detection tools
16. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools
17. Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
18. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
19. Various cloud computing concepts, threats, attacks, and security techniques and tools
20. Di¬erent types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
21. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap