Certified Ethical Hacker (CEH v10) Training

Certified Ethical Hacker (CEH v10) Training

Level: Intermediate
Course: 2031

 

In this award-winning Certified Ethical Hacker (CEH v10) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your CEH certification course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam remotely.

Certification Voucher Extensions

EC-Council is extending expiration dates on ALL ECC Exam Vouchers by 90 days at no cost, to ensure everyone has the appropriate time to prepare for their certification exams.

iLabs Access Extensions

EC-Council will offer existing iLabs users a 90-day extension by request to provide additional training time within EC-Council cyber ranges as they experience the disruptions and delays associated with COVID-19. Any iLabs user that has purchased and redeemed an iLabs access code on or after January 1st, 2020 can write to ace-support@eccouncil.org.

Key Features of this Certified Ethical Hacker Training:

Official EC-Council Curriculum

Access to hundreds of exam prep questions

Exam voucher included in course tuition After-course instructor coaching benefit

After-course computing sandbox included

You Will Learn How To:

Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam

Apply countermeasures to secure your system against threats

Test system security and data access using real-world hacking techniques

Employ complex tools to identify and analyze your company’s risks and weaknesses Find vulnerabilities in a network infrastructure

Goals Blended Learning – On Demand & Live Review Session

Live, Instructor-Led – Live, Online Training

5-day instructor-led training course

Earn 29 NASBA credits (live, in-class training only)

Exam voucher included

One-on-one after-course instructor coaching

After-course computing sandbox

Tuition can be paid later by invoice -OR- at the time of checkout by credit card

Certified Ethical Hacker On-Demand Course Information

Recommended Experience

Two years of security-related experience and a strong practical working knowledge of TCP/IP

Exam Information

This course prepares you to take the CEH exam via ProctorU

Exam voucher is supplied by EC-Council Certification Information

This is an EC-Council certification prep course

Certified Ethical Hacker On-Demand Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking

Reviewing the elements of information security

The security, functionality and usability triangle

Outlining the methods of hackers

Reconnaissance

Scanning

Gaining access

Maintaining access Covering tracks

Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

Conducting vulnerability research

Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

Objectives and methods of footprinting

Searching for information with Google Hacking

Employing footprinting countermeasures

Scanning networks

Adopting multiple scanning techniques

Identifying IDS–evasion and IP–fragmentation tools

Leveraging vulnerability scanning tools

Applying IP spoofing detection

Examining enumeration techniques

Enumerating user accounts using default passwords

Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

CEH Hacking Methodology (CHM)

Cracking passwords and escalating privileges

Defending against password cracking and keyloggers

Hiding information with steganography

Uncovering Trojans and backdoors

Injecting a Trojan into a host

Analyzing Trojan activity

Dissecting viruses, worms and sniffers

Distributing malware on the web

Recognizing key indicators of a virus attack

Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks

Recognizing symptoms and techniques of a DoS attack

Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

Cross–Site Scripting (XSS) and web application DoS attacks

Defending against SQL injection

Implementing a man–in–the–middle attack

Hijacking sessions and web servers

Spoofing a site to steal credentials

Preventing hijacking by implementing countermeasures

Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

Assessing various types of Intrusion Detection Systems (IDS) and tools

Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

Exploiting input validation failures

Defending against memory corruption attacks

Performing Penetration Testing

Performing security and vulnerability assessments

Determining testing points and locations

Announced vs. unannounced testing

CEH Training FAQs

How do I become a Certified Ethical Hacker?

To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

How do I take the EC-Council Certified Ethical Hacker exam?

This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.

In Class & Live, Online Training

Important Certified Ethical Hacker Course Information

Recommended Experience

Two years of security-related experience and a strong practical working knowledge of TCP/IP

Lab Bundle Available

Reinforce your skills while practicing the CEH exam objectives with CYBRScore Lab Bundles: {course:E002}

Exam Information

This course prepares you to take the CEH exam via ProctorU

You can request your voucher from Learning Tree at any time after you complete the course

Certification Information

Certified Ethical Hacker Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking

Reviewing the elements of information security

The security, functionality and usability triangle

Outlining the methods of hackers

Reconnaissance

Scanning

Gaining access

Maintaining access Covering tracks

Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

Conducting vulnerability research

Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

Objectives and methods of footprinting

Searching for information with Google Hacking

Employing footprinting countermeasures

Scanning networks

Adopting multiple scanning techniques

Identifying IDS–evasion and IP–fragmentation tools

Leveraging vulnerability scanning tools

Applying IP spoofing detection

Examining enumeration techniques

Enumerating user accounts using default passwords

Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

CEH Hacking Methodology (CHM)

Cracking passwords and escalating privileges

Defending against password cracking and keyloggers

Hiding information with steganography

Uncovering Trojans and backdoors

Injecting a Trojan into a host

Analyzing Trojan activity

Dissecting viruses, worms and sniffers

Distributing malware on the web

Recognizing key indicators of a virus attack

Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks

Recognizing symptoms and techniques of a DoS attack

Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

Cross–Site Scripting (XSS) and web application DoS attacks

Defending against SQL injection

Implementing a man–in–the–middle attack

Hijacking sessions and web servers

Spoofing a site to steal credentials

Preventing hijacking by implementing countermeasures

Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

Assessing various types of Intrusion Detection Systems (IDS) and tools

Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

Exploiting input validation failures

Defending against memory corruption attacks

Performing Penetration Testing

Performing security and vulnerability assessments

Determining testing points and locations

Announced vs. unannounced testing

CEH Training FAQs

How do I become a Certified Ethical Hacker?

To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

How do I take the EC-Council Certified Ethical Hacker exam?

This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.

On-Demand Training Outline

Ethical Hacking Fundamentals

Considering the effects of hacking

Reviewing the elements of information security

The security, functionality and usability triangle

Outlining the methods of hackers

Reconnaissance

Scanning

Gaining access

Maintaining access Covering tracks

Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

Conducting vulnerability research

Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

Objectives and methods of footprinting

Searching for information with Google Hacking

Employing footprinting countermeasures

Scanning networks

Adopting multiple scanning techniques

Identifying IDS–evasion and IP–fragmentation tools

Leveraging vulnerability scanning tools

Applying IP spoofing detection

Examining enumeration techniques

Enumerating user accounts using default passwords

Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

CEH Hacking Methodology (CHM)

Cracking passwords and escalating privileges

Defending against password cracking and keyloggers

Hiding information with steganography

Uncovering Trojans and backdoors

Injecting a Trojan into a host

Analyzing Trojan activity

Dissecting viruses, worms and sniffers

Distributing malware on the web

Recognizing key indicators of a virus attack

Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks

Recognizing symptoms and techniques of a DoS attack

Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

Cross–Site Scripting (XSS) and web application DoS attacks

Defending against SQL injection

Implementing a man–in–the–middle attack

Hijacking sessions and web servers

Spoofing a site to steal credentials

Preventing hijacking by implementing countermeasures

Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

Assessing various types of Intrusion Detection Systems (IDS) and tools

Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

Exploiting input validation failures

Defending against memory corruption attacks

Performing Penetration Testing

Performing security and vulnerability assessments

Determining testing points and locations

Announced vs. unannounced testing

CEH Training FAQs

What background do I need?

Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.

Is the on-demand content the same as the 5-day instructor class?

Yes, and it’s EC-Council official content!

What on-demand content will I receive?

An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.

How many labs will I receive?

You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.

What is CyberQ Exam Prep?

CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.

What is the “test pass guarantee”?

You will receive one retake exam voucher at no additional cost in the event that you don’t pass the exam on the first try.

How will I access my course materials if I choose this method?

Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.

How do I schedule my instructor-led training?

Once payment is received, you will receive details for your Unlimited Access Training Bundle via email. At that time, you may call or email our customer service team for assistance in enrolling in the event date of your choice.

One Day Instructor-Led Review

You’ll be able to register for a Training Review Session at any time after you’ve placed your order.

Comments are closed.