$2,995.00

    Ask us about our Best Price Guarantee. We’ll beat any competitor’s price!

    ICLIn-Classroom Learning VLTVirtual Live Training GTRGuaranteed to Run
    Location Start date End Date Class Times Class Details Action
    02/08/2021 02/12/2021 ICLVLT Register
    03/22/2021 03/26/2021 ICLVLT Register
    05/03/2021 05/07/2021 ICLVLT Register
    06/14/2021 06/18/2021 ICLVLT Register
    07/26/2021 07/30/2021 ICLVLT Register
    08/30/2021 09/03/2021 ICLVLT Register

    Overview

    CEH Version 10 will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

    Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.

    This course prepares you for EC-Council Certified Ethical Hacker (Exam 312-50)

    Who Should Attend

    This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

    Certification

    The Certified Ethical Hacker certification (Exam 312-50) will be conducted on the last day of training. Students need to pass the online Prometric exam to receive CEH certification.

    Prerequisites

    A foundational knowledge of computers Operating Systems and Networking protocols.

    Description

    Course Outline

    Module 01: Introduction to Ethical Hacking

    Module 02: Footprinting and Reconnaissance

    Module 03: Scanning Networks

    Module 04: Enumeration

    Module 05: Vulnerability Analysis

    Module 06: System Hacking

    Module 07: Malware Threats

    Module 08: Sniffing

    Module 09: Social Engineering

    Module 10: Denial-of-Service

    Module 11: Session Hijacking

    Module 12: Evading IDS, Firewalls, and Honeypots

    Module 13: Hacking Web Servers

    Module 14: Hacking Web Applications

    Module 15: SQL Injection

    Module 16: Hacking Wireless Networks

    Module 17: Hacking Mobile Platforms

    Module 18: IoT Hacking

    Module 19: Cloud Computing

    Module 20: Cryptography