Ask us about our Best Price Guarantee. We’ll beat any competitor’s price!

    ICLIn-Classroom Learning VLTVirtual Live Training GTRGuaranteed to Run (*Discounted Registrations may not be eligible/are subject to change)
    Location Start date End Date Class Times Class Details Action
    03/11/2024 03/15/2024 ICLVLTGTR Register
    or Quote
    04/29/2024 05/03/2024 ICLVLTGTR Register
    or Quote
    06/17/2024 06/21/2024 ICLVLTGTR Register
    or Quote


    CEH Version 11 will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

    Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.

    This course prepares you for EC-Council Certified Ethical Hacker (Exam 312-50)

    Who Should Attend

    This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.


    Students need to pass the Certified Ethical Hacker certification (Exam 312-50) online to receive the CEH certification.


    A foundational knowledge of computers Operating Systems and Networking protocols.


    Course Outline

    Module 01: Introduction to Ethical Hacking

    Module 02: Footprinting and Reconnaissance

    Module 03: Scanning Networks

    Module 04: Enumeration

    Module 05: Vulnerability Analysis

    Module 06: System Hacking

    Module 07: Malware Threats

    Module 08: Sniffing

    Module 09: Social Engineering

    Module 10: Denial-of-Service

    Module 11: Session Hijacking

    Module 12: Evading IDS, Firewalls, and Honeypots

    Module 13: Hacking Web Servers

    Module 14: Hacking Web Applications

    Module 15: SQL Injection

    Module 16: Hacking Wireless Networks

    Module 17: Hacking Mobile Platforms

    Module 18: IoT Hacking

    Module 19: Cloud Computing

    Module 20: Cryptography