Certified Ethical Hacker (CEH v10) Training
Level: Intermediate
Course: 2031
In this award-winning Certified Ethical Hacker (CEH v10) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.
Included in your CEH certification course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam remotely.
Certification Voucher Extensions
EC-Council is extending expiration dates on ALL ECC Exam Vouchers by 90 days at no cost, to ensure everyone has the appropriate time to prepare for their certification exams.
iLabs Access Extensions
EC-Council will offer existing iLabs users a 90-day extension by request to provide additional training time within EC-Council cyber ranges as they experience the disruptions and delays associated with COVID-19. Any iLabs user that has purchased and redeemed an iLabs access code on or after January 1st, 2020 can write to ace-support@eccouncil.org.
Key Features of this Certified Ethical Hacker Training:
Official EC-Council Curriculum
Access to hundreds of exam prep questions
Exam voucher included in course tuition After-course instructor coaching benefit
After-course computing sandbox included
You Will Learn How To:
Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
Apply countermeasures to secure your system against threats
Test system security and data access using real-world hacking techniques
Employ complex tools to identify and analyze your company’s risks and weaknesses Find vulnerabilities in a network infrastructure
Goals Blended Learning – On Demand & Live Review Session
Live, Instructor-Led – Live, Online Training
5-day instructor-led training course
Earn 29 NASBA credits (live, in-class training only)
Exam voucher included
One-on-one after-course instructor coaching
After-course computing sandbox
Tuition can be paid later by invoice -OR- at the time of checkout by credit card
Certified Ethical Hacker On-Demand Course Information
Recommended Experience
Two years of security-related experience and a strong practical working knowledge of TCP/IP
Exam Information
This course prepares you to take the CEH exam via ProctorU
Exam voucher is supplied by EC-Council Certification Information
This is an EC-Council certification prep course
Certified Ethical Hacker On-Demand Course Outline
Ethical Hacking Fundamentals
Considering the effects of hacking
Reviewing the elements of information security
The security, functionality and usability triangle
Outlining the methods of hackers
Reconnaissance
Scanning
Gaining access
Maintaining access Covering tracks
Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
Functions of an ethical hacker
Conducting vulnerability research
Identifying elements of information warfare
Applying Covert Techniques to Scan and Attack a Network
Footprinting and reconnaissance
Objectives and methods of footprinting
Searching for information with Google Hacking
Employing footprinting countermeasures
Scanning networks
Adopting multiple scanning techniques
Identifying IDS–evasion and IP–fragmentation tools
Leveraging vulnerability scanning tools
Applying IP spoofing detection
Examining enumeration techniques
Enumerating user accounts using default passwords
Simple Network Management Protocol (SNMP) enumeration
Analyzing System Risks and Weaknesses to Apply Countermeasures
System hacking
CEH Hacking Methodology (CHM)
Cracking passwords and escalating privileges
Defending against password cracking and keyloggers
Hiding information with steganography
Uncovering Trojans and backdoors
Injecting a Trojan into a host
Analyzing Trojan activity
Dissecting viruses, worms and sniffers
Distributing malware on the web
Recognizing key indicators of a virus attack
Analyzing worms and malware
Social engineering and Denial–of–Service (DoS)
Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks
Recognizing symptoms and techniques of a DoS attack
Implementing tools to defend against DoS attacks
Assessing and Preventing Gaps in a Network Infrastructure
Hacking web applications and wireless networks
Cross–Site Scripting (XSS) and web application DoS attacks
Defending against SQL injection
Implementing a man–in–the–middle attack
Hijacking sessions and web servers
Spoofing a site to steal credentials
Preventing hijacking by implementing countermeasures
Leveraging Metasploit in an attack
Evading IDS, firewalls and honeypots
Assessing various types of Intrusion Detection Systems (IDS) and tools
Bypassing firewalls and accessing blocked sites
Buffer overflow and cryptography
Exploiting input validation failures
Defending against memory corruption attacks
Performing Penetration Testing
Performing security and vulnerability assessments
Determining testing points and locations
Announced vs. unannounced testing
CEH Training FAQs
How do I become a Certified Ethical Hacker?
To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.
How do I take the EC-Council Certified Ethical Hacker exam?
This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.
Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?
No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.
In Class & Live, Online Training
Important Certified Ethical Hacker Course Information
Recommended Experience
Two years of security-related experience and a strong practical working knowledge of TCP/IP
Lab Bundle Available
Reinforce your skills while practicing the CEH exam objectives with CYBRScore Lab Bundles: {course:E002}
Exam Information
This course prepares you to take the CEH exam via ProctorU
You can request your voucher from Learning Tree at any time after you complete the course
Certification Information
Certified Ethical Hacker Course Outline
Ethical Hacking Fundamentals
Considering the effects of hacking
Reviewing the elements of information security
The security, functionality and usability triangle
Outlining the methods of hackers
Reconnaissance
Scanning
Gaining access
Maintaining access Covering tracks
Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
Functions of an ethical hacker
Conducting vulnerability research
Identifying elements of information warfare
Applying Covert Techniques to Scan and Attack a Network
Footprinting and reconnaissance
Objectives and methods of footprinting
Searching for information with Google Hacking
Employing footprinting countermeasures
Scanning networks
Adopting multiple scanning techniques
Identifying IDS–evasion and IP–fragmentation tools
Leveraging vulnerability scanning tools
Applying IP spoofing detection
Examining enumeration techniques
Enumerating user accounts using default passwords
Simple Network Management Protocol (SNMP) enumeration
Analyzing System Risks and Weaknesses to Apply Countermeasures
System hacking
CEH Hacking Methodology (CHM)
Cracking passwords and escalating privileges
Defending against password cracking and keyloggers
Hiding information with steganography
Uncovering Trojans and backdoors
Injecting a Trojan into a host
Analyzing Trojan activity
Dissecting viruses, worms and sniffers
Distributing malware on the web
Recognizing key indicators of a virus attack
Analyzing worms and malware
Social engineering and Denial–of–Service (DoS)
Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks
Recognizing symptoms and techniques of a DoS attack
Implementing tools to defend against DoS attacks
Assessing and Preventing Gaps in a Network Infrastructure
Hacking web applications and wireless networks
Cross–Site Scripting (XSS) and web application DoS attacks
Defending against SQL injection
Implementing a man–in–the–middle attack
Hijacking sessions and web servers
Spoofing a site to steal credentials
Preventing hijacking by implementing countermeasures
Leveraging Metasploit in an attack
Evading IDS, firewalls and honeypots
Assessing various types of Intrusion Detection Systems (IDS) and tools
Bypassing firewalls and accessing blocked sites
Buffer overflow and cryptography
Exploiting input validation failures
Defending against memory corruption attacks
Performing Penetration Testing
Performing security and vulnerability assessments
Determining testing points and locations
Announced vs. unannounced testing
CEH Training FAQs
How do I become a Certified Ethical Hacker?
To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.
How do I take the EC-Council Certified Ethical Hacker exam?
This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.
Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?
No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.
On-Demand Training Outline
Ethical Hacking Fundamentals
Considering the effects of hacking
Reviewing the elements of information security
The security, functionality and usability triangle
Outlining the methods of hackers
Reconnaissance
Scanning
Gaining access
Maintaining access Covering tracks
Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
Functions of an ethical hacker
Conducting vulnerability research
Identifying elements of information warfare
Applying Covert Techniques to Scan and Attack a Network
Footprinting and reconnaissance
Objectives and methods of footprinting
Searching for information with Google Hacking
Employing footprinting countermeasures
Scanning networks
Adopting multiple scanning techniques
Identifying IDS–evasion and IP–fragmentation tools
Leveraging vulnerability scanning tools
Applying IP spoofing detection
Examining enumeration techniques
Enumerating user accounts using default passwords
Simple Network Management Protocol (SNMP) enumeration
Analyzing System Risks and Weaknesses to Apply Countermeasures
System hacking
CEH Hacking Methodology (CHM)
Cracking passwords and escalating privileges
Defending against password cracking and keyloggers
Hiding information with steganography
Uncovering Trojans and backdoors
Injecting a Trojan into a host
Analyzing Trojan activity
Dissecting viruses, worms and sniffers
Distributing malware on the web
Recognizing key indicators of a virus attack
Analyzing worms and malware
Social engineering and Denial–of–Service (DoS)
Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks
Recognizing symptoms and techniques of a DoS attack
Implementing tools to defend against DoS attacks
Assessing and Preventing Gaps in a Network Infrastructure
Hacking web applications and wireless networks
Cross–Site Scripting (XSS) and web application DoS attacks
Defending against SQL injection
Implementing a man–in–the–middle attack
Hijacking sessions and web servers
Spoofing a site to steal credentials
Preventing hijacking by implementing countermeasures
Leveraging Metasploit in an attack
Evading IDS, firewalls and honeypots
Assessing various types of Intrusion Detection Systems (IDS) and tools
Bypassing firewalls and accessing blocked sites
Buffer overflow and cryptography
Exploiting input validation failures
Defending against memory corruption attacks
Performing Penetration Testing
Performing security and vulnerability assessments
Determining testing points and locations
Announced vs. unannounced testing
CEH Training FAQs
What background do I need?
Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.
Is the on-demand content the same as the 5-day instructor class?
Yes, and it’s EC-Council official content!
What on-demand content will I receive?
An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.
How many labs will I receive?
You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.
What is CyberQ Exam Prep?
CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.
What is the “test pass guarantee”?
You will receive one retake exam voucher at no additional cost in the event that you don’t pass the exam on the first try.
How will I access my course materials if I choose this method?
Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.
How do I schedule my instructor-led training?
Once payment is received, you will receive details for your Unlimited Access Training Bundle via email. At that time, you may call or email our customer service team for assistance in enrolling in the event date of your choice.
One Day Instructor-Led Review
You’ll be able to register for a Training Review Session at any time after you’ve placed your order.