• stars   CEH Training | Certified Ethical Hacker Training   star

    Course Title: EC Council – Ethical Hacking and Countermeasures.

     

    Duration: 5 Days

    The Certified Ethical Hacker (CEH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council)

    Here’s some feedback from our past Certified Ethical Hacking training students…

    “In my view, this Ethical Hacking training is possibly the most interesting CEH training I have ever attended.” Graham H., CEH training September 2013

    “The Ethical Hacker training material and practicals are excellent. Excellent Certified Ethical Hacking instructor, who backs up his CEH principles with detailed and thorough explanations in an easy to understand format.” Tariq, MET Jack, Ethical Hacker training January 2013

    “The CEH instructor of the Ethical Hacker training is brilliant. This was the first time when I have attended a course and I have left feeling I understood it and that the instructor is not just reading off the slides, he is knowledgeable” Lucia, Ethical Hacker training December 2013

    “Great CEH instructor- led course, insightful and enjoyable.” Phillip, Certified Ethical Hacking training August 2012

    “Excellent  CEH training, I liked the area which is Wembley, London, offer of all facilities. Amazing Ethical Hacking instructor ” Simon, Certified Ethical Hacker training January 2013

    “The most powerful professional development I have ever experienced. I feel that I have been on a roller coaster of learning.”Gregorii, Ethical Hacker training February 2012

    “The Certified Ethical Hacking training was well -organised, good balance between self study and common hours, excellent explanation of hacking methods” Polly, CEH training April 2013

     

    Certified ethical hacking trainingCertified ethical hacker training Certified ethical hacking training

     


    CEH Description:

    This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

     

    CEH Objectives:

    To prepare the student to sit the examination Ethical Hacking and Countermeasures. On successful completion of this examination you will be awarded the Certified Ethical Hacker certification awarded by the EC-Council (The International Council of Electronic Commerce Consultants).

     

    CEH Target Audience:

    This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


    Course Outline Version 8:

    CEH v 8 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students at the beginning of the class.

    Course Synopsis:

    • 1. Internet Crime Current Report: IC3
    • 2. Data Breach Investigations Report
    • 3. Types of Data Stolen From the Organizations
    • 4. Essential Terminologies
    • 5. Elements of Information Security
    • 6. Authenticity and Non-Repudiation
    • 7. The Security, Functionality, and Usability Triangle
    • 8. Security Challenges
    • 9. Effects of Hacking
    • 10. Who is a Hacker?
    • 11. Hacker Classes
    • 12. Hacktivism
    • 13. What Does a Hacker Do?
    • 14. Phase 1 – Reconnaissance
    • 15. Phase 2 – Scanning
    • 16. Phase 3 – Gaining Access
    • 17. Phase 4 – Maintaining Access
    • 18. Phase 5 – Covering Tracks
    • 19. Types of Attacks on a System
    • 20. Why Ethical Hacking is Necessary?
    • 21. Defence in Depth
    • 22. Scope and Limitations of Ethical Hacking
    • 23. What Do Ethical Hackers Do?
    • 24. Skills of an Ethical Hacker
    • 25. Vulnerability Research
    • 26. Vulnerability Research Websites
    • 27. What is Penetration Testing?
    • 28. Why Penetration Testing?
    • 29. Penetration Testing Methodology

     

    Our Pass rate of CEH – Certified Ethical Hacker Training to date is 97%

    Who Should Attend CEH | Ethical HackingTraining?

    This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.

    Ec-Coucil -Certified Ethical Hacker Training Modules

    Certified Ethical Hacker 1. Internet Crime Current Report: IC3Certified Ethical Hacker15. Phase 2 – Scanning
    Certified Ethical Hacker2. Data Breach Investigations ReportCertified Ethical Hacker16. Phase 3 – Gaining Access
    Certified Ethical Hacker3. Types of Data Stolen From the OrganizationsCertified Ethical Hacker17. Phase 4 – Maintaining Access
    Certified Ethical Hacker (CEH)4. Essential TerminologiesCertified Ethical Hacker (CEH)18. Phase 5 – Covering Tracks
    Certified Ethical Hacker (CEH)5. Elements of Information SecurityCertified Ethical Hacker (CEH)19. Types of Attacks on a System
    Certified Ethical Hacker6. Authenticity and Non-RepudiationCertified Ethical Hacker20. Why Ethical Hacking is Necessary?
    Certified Ethical Hacker7. The Security, Functionality, and Usability TriangleCertified Ethical Hacker21. Defence in Depth
    Certified Ethical Hacker8. Security ChallengesCertified Ethical Hacker22. Scope and Limitations of Ethical Hacking
    Certified Ethical Hacker9. Effects of HackingCertified Ethical Hacker23. What Do Ethical Hackers Do?
    Certified Ethical Hacker10. Who is a Hacker?Certified Ethical Hacker24. Skills of an Ethical Hacker
    Certified Ethical Hacker11. Hacker ClassesCertified Ethical Hacker25. Vulnerability Research
    Certified Ethical Hacker12. HacktivismCertified Ethical Hacker26. Vulnerability Research Websites
    Certified Ethical Hacker13. What Does a Hacker Do?Certified Ethical Hacker27. What is Penetration Testing?
    Certified Ethical Hacker14. Phase 1 – ReconnaissanceCertified Ethical Hacker28. Why Penetration Testing?
    Certified Ethical Hacker29. Penetration Testing Methodology