Certified Ethical Hacker V11 -CEH-v11

Ethical Hacking Certification (CEH v11) Training Course is one of the globally-recognized cybersecurity courses for professionals globally.

Ethical Hacking Certification (CEH v11) Training Course is one of the globally-recognized cybersecurity courses for professionals globally. This CEH Certification course is ideal for professionals who manage IT security aspect across infrastructure that overarches physical, cloud, and hybrid environments. This 5-day Certified Ethical Hacker course is also ideal for professionals who are looking to make an entry into the cybersecurity domain and who are looking to clear their CEH V11 examination.

Certified Ethical Hacker V11 Certification Training

The Certified Ethical Hacker course certification from EC-Council is one of the most sought-after certification courses in the IT Security/Cybersecurity domain. With data breaches and hacks on the rise globally, enterprises are creating robust strategies to develop professionals proficient in the cybersecurity domain through ethical hacking programs. In its latest version, the CEH V11 will help professionals to learn about the latest hacking tools, techniques, and practices used by hackers and cybersecurity professionals to hack enterprise systems. Participants taking part in this CEH training will get a copy of the course material and will receive a course completion certificate from an EC-Council Accredited Training Center.

Course Modules

  • Module 01- Introduction to Ethical Hacking

    • Lesson 01 - Information Security Overview

      • 1 Demo of Aspen and iLabs
      • 2 Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
      • 3 Essential Terminology
      • 4 Elements of Information Security
      • 5 The Security, Functionality, and Usability Triangle
    • Lesson 02 - Information Security Threats and Attack Vectors

      • 1 Motives, Goals, and Objectives of Information Security Attacks
      • 2 Top Information Security Attack Vectors
      • 3 Information Security Threat Categories
      • 4 Types of Attacks on a System
      • 5 Information Warfare
    • Lesson 06 - Penetration Testing Concepts

      • 1 Penetration Testing
      • 2 Why Penetration Testing
      • 3 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
      • 4 Blue Teaming/Red Teaming
      • 5 Types of Penetration Testing
      • 6 Phases of Penetration Testing
      • 7 Security Testing Methodology
    • Lesson 03 - Hacking Concepts

      • 1 What is Hacking
      • 2 Who is a Hacker?
      • 3 Hacker Classes
      • 4 Hacking Phases
    • Lesson 04 - Ethical Hacking Concepts

      • 1 What is Ethical Hacking?
      • 2 Why Ethical Hacking is Necessary
      • 3 Scope and Limitations of Ethical Hacking
      • 4 Skills of an Ethical Hacker
    • Lesson 05 - Information Security Controls

      • 1 Information Assurance (IA)
      • 2 Information Security Management Program
      • 4 Enterprise Information Security Architecture (EISA)
      • 5 Network Security Zoning
      • 6 Defense in Depth
      • 7 Information Security Policies
      • 8 Physical Security
      • 10 What is Risk?
      • 11 Threat Modeling
      • 12 Incident Management
      • 13 Security Incident and Event Management (SIEM)
      • 14 User Behavior Analytics (UBA)
      • 15 Network Security Controls
      • 16 Identity and Access Management (IAM)
      • 17 Data Leakage
      • 18 Data Backup
      • 19 Data Recovery
      • 20 Role of AI/ML in Cyber Security
    • Lesson 07 - Information Security Laws and Standards

      • 1 Payment Card Industry Data Security Standard (PCI-DSS
      • 2 ISO/IEC 27001:2013
      • 3 Health Insurance Portability and Accountability Act (HIPAA)
      • 4 Sarbanes Oxley Act (SOX)
      • 5 The Digital Millennium Copyright Act (DMCA)
      • 6 Federal Information Security Management Act (FISMA)
      • 7 Cyber Law in Different Countries
  • Module 02- Footprinting and Reconnaissance

    • Lesson 01 - Footprinting Concepts

    • Lesson 02 - Footprinting through Search Engines

    • Lesson 03 - Footprinting through Web Services

    • Lesson 04 - Footprinting through Social Networking Sites

    • Lesson 05 - Website Footprinting

    • Lesson 06- Email Footprinting

    • Lesson 07- Competitive Intelligence

    • Lesson 08- Whois Footprinting

    • Lesson 09- DNS Footprinting

    • Lesson 10- Network Footprinting

    • Lesson 11- Footprinting through Social Engineering

    • Lesson 12- Footprinting Tools

    • Lesson 13- Countermeasures

    • Lesson 14- Footprinting Pen Testing

  • Module 03- Scanning Networks

    • Lesson 01 - Network Scanning Concepts

    • Lesson 02 - Scanning Tools

    • Lesson 03- Scanning Techniques

    • Lesson 04- Scanning Beyond IDS and Firewall

    • Lesson 05- Banner Grabbing

    • Lesson 06- Draw Network Diagrams

    • Lesson 07- Scanning Pen Testing

  • Module 04- Enumeration

    • Lesson 01 - Enumeration Concepts

    • Lesson 02 - NetBIOS Enumeration

    • Lesson 03 - SNMP Enumeration

    • Lesson 04 - LDAP Enumeration

    • Lesson 05 - NTP Enumeration

    • Lesson 06 - SMTP Enumeration and DNS Enumeration

    • Lesson 07 - Other Enumeration Techniques

    • Lesson 08 - Enumeration Countermeasures

    • Lesson 09 - Enumeration Pen Testing

  • Module 05- Vulnerability Analysis

    • Lesson 01- Vulnerability Assessment Concepts

    • Lesson 02- Vulnerability Assessment Solutions

    • Lesson 03- Vulnerability Scoring Systems

    • Lesson 04- Vulnerability Assessment Tools

    • Lesson 05- Vulnerability Assessment Reports

  • Module 06- System Hacking

    • Lesson 01- System Hacking Concepts

    • Lesson 02- Cracking Passwords

    • Lesson 03- Escalating Privileges

    • Lesson 04- Executing Applications

    • Lesson 05- Hiding Files

    • Lesson 06- Covering Tracks

    • Lesson 07- Penetration Testing

  • Module 07- Malware Threats

    • Lesson 01- Malware Concepts

    • Lesson 02- Trojan Concepts

    • Lesson 03- Virus and Worm Concepts

    • Lesson 04- Malware Analysis

    • Lesson 05- Countermeasures

    • Lesson 06- Anti-Malware Software

    • Lesson 07- Malware Penetration Testing

  • Module 08- Sniffing

    • Lesson 01- Sniffing Concepts

    • Lesson 02- Sniffing Technique: MAC Attacks

    • Lesson 03- Sniffing Technique: DHCP Attacks

    • Lesson 04- Sniffing Technique: ARP Poisoning

    • Lesson 05- Sniffing Technique: Spoofing Attacks

    • Lesson 06- Sniffing Technique: DNS Poisoning

    • Lesson 07- Sniffing Tools

    • Lesson 08- Countermeasures

    • Lesson 09- Sniffing Detection Techniques

    • Lesson 10- Sniffing Pen Testing

  • Module 09- Social Engineering

    • Lesson 01 - Social Engineering Concepts

    • Lesson 02 - Social Engineering Techniques

    • Lesson 04 - Impersonation on Social Networking Sites

    • Lesson 05 - Identity Theft

    • Lesson 06 - Countermeasures

    • Lesson 07 - Social Engineering Penetration Testing

    • Lesson 03- Insider Threats

  • Module 10- Denial-of-Service

    • Lesson 01 - DoS/DDoS Concepts

    • Lesson 02 - DoS/DDoS Attack Techniques

    • Lesson 03 - Botnets

    • Lesson 04 - DDoS Case Study

    • Lesson 05 - DoS/DDoS Attack Tools

    • Lesson 06 - Countermeasures

    • Lesson 07 - DoS/DDoS Protection Tools

    • Lesson 08 - DoS/DDoS Attack Penetration Testing

  • Module 11- Session Hijacking

    • Lesson 01- Session Hijacking Concepts

    • Lesson 02- Application Level Session Hijacking

    • Lesson 03- Network Level Session Hijacking

    • Lesson 04- Session Hijacking Tools

    • Lesson 05- Countermeasures

    • Lesson 06- Penetration Testing

  • Module 12 - Evading IDS, Firewalls, and Honeypots

    • Lesson 01- IDS, Firewall and Honeypot Concepts

    • Lesson 02- IDS, Firewall and Honeypot Solutions

    • Lesson 03- Evading IDS

    • Lesson 04- Evading Firewalls

    • Lesson 05- IDS/Firewall Evading Tools

    • Lesson 06- Detecting Honeypots

    • Lesson 07- IDS/Firewall Evasion Countermeasures

    • Lesson 08- Penetration Testing

  • Module 13- Hacking Web Servers

    • Lesson 01- Web Server Concepts

    • Lesson 02- Web Server Attacks

    • Lesson 03- Web Server Attack Methodology

    • Lesson 04- Web Server Attack Tools

    • Lesson 05- Countermeasures

    • Lesson 06- Patch Management

    • Lesson 07- Web Server Security Tools

    • Lesson 08- Web Server Pen Testing

  • Module 14- Hacking Web Applications

    • Lesson 01 - Web App Concepts

    • Lesson 02 - Web App Threats

    • Lesson 03 - Hacking Methodology

    • Lesson 04 - Web Application Hacking Tools

    • Lesson 05 - Countermeasures

    • Lesson 06 - Web App Security Testing Tools

    • Lesson 07 - Web App Pen Testing

  • Module 15- SQL Injection

    • Lesson 01 - SQL Injection Concepts

    • Lesson 02 - Types of SQL Injection

    • Lesson 03 - SQL Injection Methodology

    • Lesson 04 - SQL Injection Tools

    • Lesson 05 - Evasion Techniques

    • Lesson 06 - Countermeasures

  • Module 16- Hacking Wireless Networks

    • Lesson 01 - Wireless Concepts

    • Lesson 02 - Wireless Encryption

    • Lesson 03 - Wireless Threats

    • Lesson 04 - Wireless Hacking Methodology

    • Lesson 05 - Wireless Hacking Tools

    • Lesson 06 - Bluetooth Hacking

    • Lesson 07 - Countermeasures

    • Lesson 08 - Wireless Security Tools

    • Lesson 09 - Wi-Fi Pen Testing

  • Module 17- Hacking Mobile Platforms

    • Lesson 01- Mobile Platform Attack Vectors

    • Lesson 02- Hacking Android OS

    • Lesson 03- Hacking iOS

    • Lesson 04- Mobile Spyware

    • Lesson 05- Mobile Device Management

    • Lesson 06- Mobile Security Guidelines and Tools

    • Lesson 07- Mobile Pen Testing

  • Module 18- IoT Hacking

    • Lesson 01- IoT Concepts

    • Lesson 02- IoT Attacks

    • Lesson 03- IoT Hacking Methodology

    • Lesson 04- IoT Hacking Tools

    • Lesson 05- Countermeasures

    • Lesson 06- IoT Pen Testing

  • Module 19- Cloud Computing

    • Lesson 01 - Cloud Computing Concepts

    • Lesson 02 - Cloud Computing Threats

    • Lesson 03 - Cloud Computing Attacks

    • Lesson 04 - Cloud Security

    • Lesson 05 - Cloud Security Tools

    • Lesson 06 - Cloud Penetration Testing

  • Module 20- Cryptography

    • Lesson 01- Cryptography Concepts

    • Lesson 02- Encryption Algorithms

    • Lesson 03- Cryptography Tools

    • Lesson 04- Public Key Infrastructure (PKI)

    • Lesson 05- Email Encryption

    • Lesson 06- Disk Encryption

    • Lesson 07- Cryptanalysis

    • Lesson 08- Countermeasures

Course Prerequisites

  • Knowledge of networking and operating systems

Reasons to Choose Koenig's Certified Ethical Hacker Certification Training

  • Widely-recognized CEH course with certification training delivered with Expert Instructors
  • Get a comprehensive understanding of globally-recognized information security standard
  • Move ahead in your career as a Certified Ethical Hacker
  • Expert Cybersecurity instructors and practical lab sessions to help you to clear your CEH certification exam
  • Engage with other IT Security professionals from various industry sectors to gain proper knowledge of security breaches

Key Features of Certified Ethical Hacking Certification Training Course

  • Instructor-led Certified Ethical Hacking Certification Training
  • Get access to a free CEH course preview to begin your preparation
  • Expert Cybersecurity instructors across the globe
  • Accredited CEH v11 course material prepared by SMEs
  • Get practical experience through EC-Council iLab sessions
  • CEH Sample papers provided
  • Industry-recognized Course Completion certificate provided
  • Take advantage of 1-to-1 training and Fly me a Trainer option
  • Training provided across 100+ locations globally

Target Audience for CEH Certification Course

Job roles that can take up certified ethical hacking certification training include, but are not limited to:
  • Penetration Tester
  • IT Security Administrator
  • Information security Analyst
  • Mid-level Security Assurance Auditor
  • System Security Administrator
  • Network Security Engineer
  • SOC Security Analyst
  • Solution Architect
  • Senior Security Consultant
  • Security Compliance Analyst
  • Vulnerability Assessment Analyst, and more

Learning Objectives for CEH v11 Training Course

Participants who take part in Certified Ethical Hacker training will learn about:
  • The step-by-step process and tactics utilized by hackers to penetrate systems
  • Trojans, backdoors, and countermeasures to stop attacks
  • IDS, firewalls, wireless hacking, and more
  • Advanced hacking concepts, smartphone hacking, writing virus codes, corporate espionage, and reverse engineering
  • Powershell, Oracle databases, hacking SQL, Apache Web servers, and more
  • Network, mobile application security, and assess threats and vulnerabilities
  • Information assurance and managing information security
No, the published fee includes all applicable taxes.
Yes, we do.
The Fee includes:
  • Official courseware
  • Testing Via Qubits
Yes, The Edu+ is a AXELOS Learning Partner
Schedule for Group Training is decided by Edu+. Schedule for 1-on-1 is decided by you.
Yes, you can pay from the course page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
You can request a refund if you do not wish to enroll in the course.

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

Your review must be at least 50 characters.
$899$1,299
Clear

What’s included

Open chat
1
Need Help?
Hello,
How can I help you?