Become a certified ethical hacker by passing the CEH v11 exam and gaining Certified Ethical Hacker certification. The Certified Ethical Hacker (CEH v11) course contains interactive chapters and hands-on labs which completely cover CEH v11 exam objectives and will make you aware of the latest tools and techniques used by hackers to lawfully hack an organization

starstarstarstarstar

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

The Certified Ethical Hacker (CEH) exam determines the knowledge of the candidate as an effective ethical hacker. It recognizes the importance of identifying security issues to get them resolved. It will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

1
  • Introduction

  • Goals and Methods
    Who Should Read This course?
    Strategies for Exam Preparation
    How This Course Is Organized

2
  • An Introduction to Ethical Hacking

  • Security Fundamentals
    Security Testing
    Cyber Kill Chain
    Hacker and Cracker Descriptions
    Ethical Hackers
    Test Plans—Keeping It Legal
    Ethics and Legality
    Summary
    Review All Key Topics
    Exercises
    Suggested Reading and Resources

3
  • The Technical Foundations of Hacking

  • The Hacking Process
    The Ethical Hacker’s Process
    Information Security Systems and the Stack
    Summary
    Review All Key Topics
    Exercises
    Suggested Reading and Resources

4
  • Footprinting, Reconnaissance, and Scanning

  • Footprinting
    Scanning
    Summary
    Review All Key Topics
    Exercises
    Suggested Reading and Resources

5
  • Enumeration and System Hacking

  • Enumeration
    System Hacking
    Summary
    Review All Key Topics
    Exercise
    Suggested Reading and Resources

6
  • Social Engineering, Malware Threats, and Vulnerability Analysis

  • Social Engineering
    Malware Threats
    Vulnerability Analysis
    Summary
    Review All Key Topics
    Command Reference to Check Your Memory
    Exercises
    Suggested Reading and Resources

7
  • Sniffers, Session Hijacking, and Denial of Service

  • Sniffers
    Session Hijacking
    Denial of Service and Distributed Denial of Service
    Summary
    Review All Key Topics
    Exercises
    Suggested Reading and Resources

8
  • Web Server Hacking, Web Applications, and Database Attacks

  • Web Server Hacking
    Web Application Hacking
    Database Hacking
    Summary
    Review All Key Topics
    Exercise
    Suggested Reading and Resources

9
  • Wireless Technologies, Mobile Security, and Attacks

  • Wireless and Mobile Device Technologies
    Wi-Fi
    Summary
    Review All Key Topics
    Suggested Reading and Resources

10
  • Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection and Prevention Systems
    Firewalls
    Honeypots
    Summary
    Review All Key Topics
    Suggested Reading and Resources

11
  • Cryptographic Attacks and Defenses

  • Cryptography History and Concepts
    Encryption Algorithms
    Public Key Infrastructure
    Email and Disk Encryption
    Cryptoanalysis and Attacks
    Security Protocols and Countermeasures
    Summary
    Review All Key Topics
    Exercises
    Suggested Reading and Resources

12
  • Cloud Computing, IoT, and Botnets

  • Cloud Computing
    IoT
    Botnets
    Summary
    Review All Key Topics
    Suggested Reading and Resources

13
  • Final Preparation

  • Hands-on Activities
    Suggested Plan for Final Review and Study
    Summary

Audience

Security professionals with at least 2 years of work experience in the Information Security domain will benefit from this course and certification.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...