Certified Ethical Hacker (CEH) Training

Course 2031
5 DAY COURSE
Price: $3,465.00
Course Outline

In CEH v13, you'll understand and practice cybersecurity testing and acquire hands-on system hacking skills. This thorough training provides advanced hacking techniques, improving your ability to perform information assurance tasks effectively to build and verify a strong security posture.

U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE

Certified Ethical Hacker (CEH) Training Benefits

  • In this CEH Certification course, you will:

    • Successfully prepare for the Certified Ethical Hacker (CEH v13) Certification Exam.
    • Master ethical hacking fundamentals, including its five phases and goals.
    • Perform reconnaissance by gathering publicly available data on target organizations.
    • Apply network scanning and enumeration to identify targets and vulnerabilities.
    • Deploy system hacking techniques, like privilege escalation and password cracking.
    • Investigate malware threats, analyzing their types and devising pen test payloads.
    • Execute packet sniffing, session hijacking, and DoS/DDoS attacks.
    • Exploit web server and application vulnerabilities, including SQL injection.
    • Hack wireless networks and secure mobile platforms like Android and iOS.
    • Navigate cloud and container technologies, addressing threats and countermeasures.
    • Unscramble encryption and hashing with cryptographic attacks and analytical tools.
  • Prerequisites

    Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.

CEH Training Outline

Learning Objectives

Module 01 Introduction to Ethical Hacking

  • Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
  • Use AI to automate tasks and assist in performing reliable probing and analysis.

Module 02 Footprinting and Reconnaissance

  • Gain knowledge of how to use effective techniques and tools like WHOIS and Maltego for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.

Module 03 Scanning Networks

  • Enumerate a variety of network scanning techniques and countermeasures using tools like Nmap and Hping3.

Module 04 Enumeration

  • Employ various enumeration techniques, using SMB analysis SNMP and LDAP scraping to identify the necessary countermeasures.

Module 05 Vulnerability Analysis

  • Learn how to identify security exposures in a target organization’s network, communication infrastructure, and end systems using CVE, CWE and CCVSS scoring.

Module 06 System Hacking

  • Discover how to deploy various system hacking tactics to discover system and network flaws, password cracking, steganography, and how threat actors cover their tracks.

Module 07 Malware Threats

  • Identify diverse types of malware (Trojan, viruses, worms, etc.), APT and fileless malware and gain knowledge about malware analysis procedures, and effective malware countermeasures.

Module 08 Sniffing

  • Master packet sniffing techniques and their uses in discovering network vulnerabilities, plus employ countermeasures to defend against sniffing attacks.

Module 09 Social Engineering

  • Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and identify social engineering countermeasures.

Module 10 Denial-of-Service

  • Discover a variety of Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, and the tools used, plus examine proper DoS/DDoS audit techniques to verify countermeasures.

Module 11 Session Hijacking

  • Investigate the various session-hijacking techniques used to discover session-related authentication, authorization, and cryptographic weaknesses.

Module 12 Evading IDS, Firewalls, and Honeypots

  • Examine firewalls, intrusion detection systems (IDS), and honeypot evasion techniques, the tools used, as well as other perimeter weaknesses and their countermeasures.

Module 13 Hacking Web Servers

  • Investigate web server attacks, including a comprehensive attack methodology with tools like Nikto to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14 Hacking Web Applications

  • Explore web application attacks, including the OWASP Top 10 for auditing vulnerabilities in web applications and countermeasures.

Module 15 SQL Injection

  • Gain key knowledge about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures to defend your data.

Module 16 Hacking Wireless Networks

  • Learn about several types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Module 17 Hacking Mobile Platforms

  • Discover mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Module 18 IoT Hacking

  • Identify distinct types of threats to Internet of Things (IoT) and operational technology (OT), including hacking methodologies, tools, and appropriate countermeasures.

Module 19 Cloud Computing

  • Understand key cloud computing concepts including container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Module 20 Cryptography

  • Master your knowledge of encryption algorithms, cryptographic tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and analytical tools.
Course Dates
Attendance Method
Additional Details (optional)