EC - Council Certified Ethical Hacker (CEH)

Hours: 80 / Access Length: 12 Months / Delivery: Open, Self-Paced
Retail Price: $2,999.00

Course Overview:

The EC-Council CEH v8 Certified Ethical Hacker course includes expert instructor-led training modules with customized presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

EC Council's CEH: Certified Ethical Hacker certification training course enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network.  With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.

This CEH certification training course will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Certified Ethical Hacker or CEH is a vendor-neutral certification that explores the existence and the use of hacking tools and security systems across 22 topical domains.  Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective.

Course Outline:

CEH v8: Module 1
  • Program Introduction
  • Information Security Overview
  • Essential Terminology
  • Information Security Elements
  • Security, Functionality and Usability Triangle
  • Information Security Threats and Attack Vectors
  • Information Security Threats
  • Hacking Concepts
  • Hacker Classes
  • Hacktivism
  • Hacking Phases
  • Types Of Attacks
  • Information Security Controls
  • Scope and Limitations of Ethical Hacking
  • Skills of an Ethical Hacker
  • Defense in Depth
  • Incident Management Process
  • Information Security Policies
  • Penetration Testing
  • Summary
CEH v8: Module 2
  • Footprinting
  • Footprinting Concepts and Terminology
  • Footprinting Threats
  • Search Engines, Social Networking and Job Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Footprinting Using Google
  • WHOIS Footprinting
  • DNS Footprinting
  • Networking Footprinting
  • Footprinting Through Social Engineering
  • Footprinting Through Social Networking Sites
  • Footprinting Tools
  • Footprinting Counter Measures and Pen Testing
  • Summary
CEH v8: Module 3
  • Scanning Networks
  • Overview of Network Scanning
  • Check for Live Systems
  • Check for Open Ports
  • Scanning Techniques
  • Xmas, Fin and Null Scans
  • IDLE Scan
  • ICMP Echo, List and UDP Scanning
  • ACK Flag and Port Scanning Countermeasures
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Summary
CEH v8: Module 4
  • Enumeration
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • UNIX/Linux and LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Enumeration Countermeasures
  • Summary
CEH v8: Module 5
  • System Hacking
  • Hacking Methodology
  • Password Cracking
  • Password Attack Techniques and Types
  • Microsoft Authentication
  • Storing Hash Passwords and LAN Manager Hash
  • Strong Policy Implementation and Enforcement
  • Escalating Privileges
  • Executing Applications
  • Types of Spywares
  • Keylogger and Spyware Defense
  • Hiding Files
  • NTFS Data Streams
  • Steganography
  • Classification of Steganography
  • Steganography Types
  • Steganalysis
  • Cover Your Tracks
  • Penetration Testing
  • Summary
CEH v8: Module 6
  • Trojans and Backdoors
  • Trojan Concepts
  • Trojan Infections
  • Types of Trojans
  • Detecting Trojans
  • Trojan Countermeasures
  • Anti Trojan Software
  • Summary
CEH v8: Module 7
  • Viruses and Worms
  • Viruses Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Virus Detection Methods
  • Summary
CEH v8: Module 8
  • Sniffing
  • Sniffing Concepts
  • Types of Sniffing Attacks
  • Sniffing Protocols and SPAN Ports
  • MAC Attacks
  • DHCP Attacks
  • ARP Spoofing
  • Spoofing Attacks
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Summary
CEH v8: Module 9
  • Social Engineering
  • Social Engineering Concepts
  • Social Engineering Attack Phases
  • Common Social Engineering Targets
  • Social Engineering Techniques and Types
  • Insider Attacks
  • Social Engineering Countermeasures
  • Summary
CEH v8: Module 10
  • Denial of Service
  • DoS Attacks
  • DoS Attack Types
  • Botnets
  • DDoS Attacks
  • DoS Attack Tools
  • DoS and DDoS Attack Counter Measures
  • DDoS Penetration Testing
  • Summary
CEH v8: Module 11
  • Session Hijacking
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Summary
CEH v8: Module 12
  • Hacking Web Servers
  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter Measures
  • Webserver Security Tools
  • Webserver Pen Testing
  • Summary
CEH v8: Module 13
  • Web Applications
  • Web App Threats
  • Injection Flaws
  • Cross Site Scripting Attack
  • Cookie/Session Poisoning and Session Fixation
  • Improper Error Handling
  • Broken Authentication and Session Management
  • Web Service Attack
  • Hacking Methodology
  • Web Hacking Tools
  • Web App Countermeasures
  • Security Tools
  • Web App Pen Testing
  • Summary
CEH v8: Module 14
  • SQL Injection
  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection
  • Blind SQL Injection
  • Advanced SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Injection Attack Counter Measures
  • Summary
CEH v8: Module 15
  • Hacking Wireless Networks
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Hacking Countermeasures
  • Summary
CEH v8: Module 16
  • Hacking Mobile Platforms
  • Mobile Device Hacking Concepts
  • Mobile Attack Vectors
  • Hacking Android OS
  • Hacking Apple IOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management
  • Guidelines and Tools
  • Mobile Pen Testing
  • Summary
CEH v8: Module 17
  • Evading IDS, Firewalls, and Honeypots
  • Intrusion Detection Systems
  • Firewall Concepts
  • Honeypot Concepts
  • IDS Tools
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evasion Tools
  • Countermeasures
  • Summary
CEH v8: Module 18
  • Buffer Overflow
  • Buffer Overflow Concepts
  • Buffer Overflow Methodology
  • Buffer Overflow Detection
  • Buffer Overflows Counter Measures
  • Buffer Overflow Security Tools
  • Summary
CEH v8: Module 19
  • Cryptography
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure
  • E-Mail Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Summary
CEH v8: Module 20
  • Penetration Testing
  • Pen Testing Concepts
  • Pen Testing Types
  • Pen Testing Techniques
  • Pen Testing Phases
  • Outsourcing Pen Testing
  • Summary
CEH v8: Module 21 – Labs
  • Lab-1 FootPrinting
  • Lab-2 Trojan Demo
  • Lab-3 Encryption

This course includes an EC-Council Certified Hacker courseware kit.

Certifications:

This course prepares the student for the EC-Council Certified Ethical Hacker (CEH) v8 certification exam but is not an official EC-Council course.  Upon completion of the course and signing up for the certification exam, the student will be subject to a $100 EC-Council eligibility fee and application process.  The student must also have at least two years of information security related experience.


System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.


** The course outlines displayed on this website are subject to change at any time without prior notice. **