Certified Ethical Hacker (CEH)

Course Overview

EC-Council’s Certified Ethical Hacker training certifies a security professional as an Ethical Hacker and Penetration Tester. CEH training fortifies the abilities to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking.

A CEH certification becomes imperative with the increasing security threats to computer networks and web servers and there is a great need to make networks “hacker-proof”. The best way to do this is by understanding the methods employed by hackers to intrude into systems. A Certified Ethical Hacker starts thinking in a way an “illegal hacker” does but uses the EC-Council’s ethical hacking certification and tools to legally penetrate and test networks and computer systems.

This ethical hacking training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab’s intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then will be led into scanning and attacking their own networks (no real network is harmed). During this ethical hacking course, students learn how intruders escalate privileges and what steps can be taken to secure a system.

CEH Version 9 is the most recent and progressive course covering 270 attack technologies within 18 extensive modules- an ethical hacker should be aware of. This ethical hacking certification helps in mastering the methodology to be used in ethical hacking scenarios or penetration testing. The course also helps cracking the EC-Council Certified Ethical Hacker certification exam 312-50.


Course Details

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Sniffing

MalwareThreats

SocialEngineering

Denial of Service

Session Hijacking

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Hacking Web servers

Hacking Mobile Platforms

Evading IDS,Firewalls, and Honeypot

Cloud Computing

Cryptography


Prerequisites

Basic knowledge of Networking

Basic Knowledge of server and network components.