0
For best deals, Call us now
Use code: UY10 for 10% Flat discount
Buy 1 Get 2 Certifications free with Exam

CEH (v10) - Certified Ethical Hacking Course (Blended Learning)

> Certified Ethical Hacker (CEH) is a computer certification that validates an individual's proficiency in network security, 
> Many IT departments have made CEH certification a mandatory qualification for security-related positions
> CEH certified professionals earn 44-percent higher salaries than non-certified professionals
> It is a must-have certification for security professionals

 

USD 1299 USD 1599

Course Overview

Certified Ethical Hacker certification training course is a globally recognized certification in the IT security domain. This course provides hands-on training required to master the techniques hackers use to penetrate network systems and also fortify the system against hacking

Key Highlights

  • 40 hours of instructor-led training
  • Accredited training partner of EC-Council
  • Six months free access to CEH v10 iLabs
  • Study material by EC-Council (e-kit)
  • 20 current security domains
  • Covers 340 attack technologies
  • Exam pass guarantee 
  • 6 months free access to CEHv10 iLabs
  • No Exam Included

What You'll Learn

  • Learning about trojans, backdoors, and countermeasures
  • Learning about IDS and firewalls
  • Learning advanced hacking concepts
  • Understanding network packet analysis
  • Learn about the latest mobile and web technologies
     

SCHEDULE

    • Delivery Format: Virtual Classroom Live
    • Location: Online
    • Access Period: 5 Weeks
    • Course Date: 30 Oct-5 Dec
    • Course Time: 22:30 - 02:30 CDT
    • Session: Weekdays
    • Total Class: FRI & SAT (10 Sessions)
    QTY
    USD 1299 USD 1599
    • Delivery Format: Virtual Classroom Live
    • Location: Online
    • Access Period: 5 Weeks
    • Course Date: 7 Nov-13 Dec
    • Course Time: 08:30 - 12:30 CDT
    • Session: Weekend
    • Total Class: 08:00 - 12:00 CST
    QTY
    USD 1299 USD 1599

Career Benefits

  • Globally recognized certification
  • Opportunity to work in IT Security domain
  • Higher salary
     

Who Can Attend

  • Network security officers
  • Site administrators
  • IT specialists
  • IT auditors
  • Operations managers
  • Security officers
  • Technical support engineers
  • Systems engineers and analysts

Exam Formats

Your exam voucher fee is included in the price of this ethical hacking course.

What is the Exam format of the CEH v10 examination?

The CEH exam follows the below format:

> 125 Multiple Choice Questions 
> Duration: 4 Hours
> Test Delivery: ECC EXAM, VUE
> Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
> CEH Practical exam:

The Certified Ethical Hacker (Practical) is an extension of the CEH certification. The Practical exam is a 6-hour long test which imitates a real network by making use of live virtual machines, networks and applications.

The CEH Practical exam format is:

> 20 Practical Challenges
> Duration: 6 hours
> Availability: Aspen – iLabs
> Test Format: iLabs Cyber Range
> Passing Score: 70%

Until when can i procure exam voucher?

Your exam voucher fee is included in the price of this ethical hacking course. However, you must procure the CEH exam voucher within 3 months from the date of course purchase. In the event that the CEH exam price does go up and you have not yet booked the exam, you will need to Upskill yourself. pay the difference in amount to
 

Course Delivery

This course is available in the following formats:

  • Virtual Classroom Live Duration: 40 Hrs

Related Courses

Course Syllabus


Module 01 - Introduction to Ethical Hacking

Lesson 01 - Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 06 - Penetration Testing Concepts
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 07 - Information Security Laws and Standards

Module 02 - Footprinting and Reconnaissance

Lesson 01 - Footprinting Concepts
Lesson 02 - Footprinting through Search Engines
Lesson 03 - Footprinting through Web Services
Lesson 04 - Footprinting through Social Networking Sites
Lesson 05 - Website Footprinting
Lesson 06 - Email Footprinting
Lesson 07 - Competitive Intelligence
Lesson 08 - Whois Footprinting
Lesson 09 - DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11- Footprinting through Social Engineering
Lesson 12 - Footprinting Tools
Lesson 13 - Countermeasures
Lesson 14 - Footprinting Pen Testing

Module 03 - Scanning Networks

Lesson 01 - Network Scanning Concepts
Lesson 02 - Scanning Tools
Lesson 03 - Scanning Techniques
Lesson 04 - Scanning Beyond IDS and Firewall
Lesson 05 - Banner Grabbing
Lesson 06 - Draw Network Diagrams
Lesson 07 - Scanning Pen Testing

Module 04 - Enumeration

 Lesson 01 - Enumeration Concepts
 Lesson 02 - NetBIOS Enumeration
 Lesson 03 - SNMP Enumeration
 Lesson 04 - LDAP Enumeration
 Lesson 05 - NTP Enumeration
 Lesson 06 - SMTP Enumeration and DNS Enumeration
 Lesson 07 - Enumeration Countermeasures
 Lesson 08 - Other Enumeration Techniques
 Lesson 09 - Enumeration Pen Testing

Module 05 - Vulnerability Analysis

 Lesson 01 - Vulnerability Assessment Concepts
 Lesson 02 - Vulnerability Assessment Solutions
 Lesson 03 - Vulnerability Scoring Systems
 Lesson 04 - Vulnerability Assessment Tools
 Lesson 05 - Vulnerability Assessment Reports

Module 06 - System Hacking

 Lesson 01 - System Hacking Concepts
 Lesson 02 - Cracking Passwords
 Lesson 03 - Escalating Privileges
 Lesson 04 - Executing Applications
 Lesson 05 - Hiding Files
 Lesson 06 - Covering Tracks
 Lesson 07 - Penetration Testing

Module 07 - Malware Threats

 Lesson 01 - Malware Concepts
 Lesson 02 - Trojan Concepts
 Lesson 03 - Virus and Worm Concepts
 Lesson 04 - Malware Analysis
 Lesson 05- Countermeasures
 Lesson 06- Anti-Malware Software
 Lesson 07- Malware Penetration Testing

Module 08 - Sniffing

Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing
Module 09- Social Engi

Module 09- Social Engineering

Lesson 01 - Social Engineering Concepts
Lesson 02 - Social Engineering Techniques
Lesson 03- Insider Threats
Lesson 04 - Impersonation on Social Networking Sites
Lesson 05 - Identity Theft
Lesson 06 - Countermeasures
Lesson 07 - Social Engineering Penetration Testing

Module 10- Denial-of-Service

Lesson 01 - DoS/DDoS Concepts
Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets
Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools
Lesson 06 - Countermeasures
Lesson 07 - DoS/DDoS Protection Tools
Lesson 08 - DoS/DDoS Attack Penetration Testing

Module 11- Session Hijacking

Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing

Module 12 - Evading IDS, Firewalls, and Honeypots

Lesson 01- IDS, Firewall, and Honeypot Concepts
Lesson 02- IDS, Firewall, and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots
Lesson 07- IDS/Firewall Evasion Countermeasures
Lesson 08- Penetration Testing

Module 13- Hacking Web Servers

Lesson 01- Web Server Concepts
Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing
 

Module 14- Hacking Web Applications

Lesson 01 - Web App Concepts
Lesson 02 - Web App Threats
Lesson 03 - Hacking Methodology
Lesson 04 - Web Application Hacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Web App Security Testing Tools
Lesson 07 - Web App Pen Testing

Module 15- SQL Injection

Lesson 01 - SQL Injection Concepts
Lesson 02 - Types of SQL Injection
Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools
Lesson 05 - Evasion Techniques
Lesson 06 - Countermeasures

Module 16- Hacking Wireless Networks

Lesson 01 - Wireless Concepts
Lesson 02 - Wireless Encryption
Lesson 03 - Wireless Threats
Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools
Lesson 06 - Bluetooth Hacking
Lesson 07 - Countermeasures
Lesson 08 - Wireless Security Tools
Lesson 09 - Wi-Fi Pen Testing

Module 17- Hacking Mobile Platforms

Lesson 01- Mobile Platform Attack Vectors
Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools

Module 18- IoT Hacking

Lesson 01- IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing

Module 19- Cloud Computing

Lesson 01 - Cloud Computing Concepts
Lesson 02 - Cloud Computing Threats
Lesson 03 - Cloud Computing Attacks
Lesson 04 - Cloud Security
Lesson 05 - Cloud Security Tools
Lesson 06 - Cloud Penetration Testing

Module 20- Cryptography

Lesson 01- Cryptography Concepts
Lesson 02- Encryption Algorithms
Lesson 03- Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)
Lesson 05- Email Encryption
Lesson 06- Disk Encryption
Lesson 07- Cryptanalysis
Lesson 08- Countermeasures

FAQ's


What is the prerequisites for the certification?

For Certified Ethical Hacker (CEH) training and certification, there is no specific eligibility criteria but we recommend a basic knowledge of TCP/IP.

Is the CEH Certification course accredited?

> Yes, our Certified Ethical Hacker course is accredited by EC-Council.

 

What do i need to do the to unlock my Certification?

> Attend one complete class of the CEH course.

Until when can i procure the exam voucher?

Your exam voucher fee is included in the price of this ethical hacking course. However, you must procure the CEH exam voucher within 3 months from the date of course purchase. In the event that the CEH exam price does go up and you have not yet booked the exam, you will need to pay the difference in amount to Upskill Yourself.

What is the Validity of my CEH exam voucher?

Exam vouchers are valid for 1 year from the date of course purchase. If you do not book the exam within 1 year from the purchase of the voucher, you will need to buy the voucher again as per the actual price.

How are the labs conducted?

> Labs are conducted on EC Council-designed iLabs. The access period is for six months.

 

What tool do i need to attend the training sessions?

The tools you’ll need to attend the Ethical Hacking Course are:

> Windows: Windows XP SP3 or higher
> Mac: OSX 10.6 or higher
> Internet speed: Preferably 512 Kbps or higher


Headset, speakers and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.

Mike Williams, Direct Consultant