EC-Council CEH Certification Training Course
EC-Council Certified Ethical Hacker (CEH)
|Number of Exams:
||EC-Council Ethical Hacker
DoD Approved 8570: CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor
Grants (discounts) are available for multiple students for the same or different courses.
Guaranteed to Run
Online Self-Study courses allow you to study around your busy schedule, remain working as you train, work at your own pace.
Payment Plan Available
- EC-Council Official Courseware
- EC-Council Official Labs
- Lifetime access to Courseware
- Labs are available for 1 year from date of redemption
- Apply Cost to Instructor-led Training of Same Course
- Hands-on instruction by a certified instructor
- Includes all course materials
- Practice Exam
- Certification Exam
Evening Live Remote
Afternoon/Evening Live Online Courses offered Tuesday & Thursday
- Live Instructor Lecture
- Course Materials
- Lab Access
- Practice Exam
- Certification Exam
This resource is provided by EC-Council as a guide to help you navigate the various certifications available as you structure your own Cyber Security career path or the constructs of your Cyber Security Team. The document is broken down into 6 Primary tracks including:
- Cyber Security Foundations
- Vulnerability Assessment and Penetration Testing
- Cyber Forensics
- Network Defense and Operations
- Software Security
This guide will help you understand what Cyber Security certifications are available by Security Focus Area, Job Role, Intended Audience, as well as some example companies who currently build capability in their Cyber Security teams with EC-Council certifications.
Can't travel or you want to stay with your family or business. No problem!
Stay in your own city and save the additional expenses of roundtrip airfare, lodging, transportation, and meals and receive the same great instruction live from our instructors in our Live Instructor-Led Remote Classroom Training.
Remote Classroom Training
Our Remote Classroom Training is a live class with students observing the instructor and listening through your computer speakers.
You will see the instructor's computer, slides, notes, etc., just like in the classroom. You will be following along, doing work, labs, and individual assignments.
CEH Webinar Training
Intro to Certified Ethical Hacker (CEH) Webinar
Our instructors have been teaching for more than 16 years and are award winners in their areas of expertise.
Our EC-Council instructor is a 7-time Instructor of the Year award winner.
CEH Version 11 will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.
Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking.
This course prepares you for EC-Council Certified Ethical Hacker (Exam 312-50)
Who Should Attend
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
The Certified Ethical Hacker certification (Exam 312-50) will be conducted on the last day of training. Students need to pass the online Prometric exam to receive CEH certification.
A foundational knowledge of computers Operating Systems and Networking protocols.
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
CED Solutions is your best choice for Ethical Hacking,
Ethical Hacking training,
Ethical Hacking certification,
Ethical Hacking boot camp,
Ethical Hacking certification training,
Ethical Hacking certification course,
Ethical Hacking course,
Ethical Hacking class.