Certified Ethical Hacker (CEH) Training

Course 2031

  • Duration: 5 days
  • Sandbox: Yes
  • Exam Voucher: Yes
  • Language: English
  • 29 CompTIA CEUs
  • 29 NASBA CPE Credits (live, in-class training only)
  • Level: Intermediate

In CEH v13, you'll understand and practice cybersecurity testing and acquire hands-on system hacking skills. This thorough training provides advanced hacking techniques, improving your ability to perform information assurance tasks effectively to build and verify a strong security posture.

U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE

CEH Training Delivery Methods

  • In-Person

  • Online

  • Upskill your whole team by bringing Private Team Training to your facility.

CEH Training Information

In this CEH Certification course, you will:

  • Successfully prepare for the Certified Ethical Hacker (CEH v13) Certification Exam.
  • Master ethical hacking fundamentals, including its five phases and goals.
  • Perform reconnaissance by gathering publicly available data on target organizations.
  • Apply network scanning and enumeration to identify targets and vulnerabilities.
  • Deploy system hacking techniques, like privilege escalation and password cracking.
  • Investigate malware threats, analyzing their types and devising pen test payloads.
  • Execute packet sniffing, session hijacking, and DoS/DDoS attacks.
  • Exploit web server and application vulnerabilities, including SQL injection.
  • Hack wireless networks and secure mobile platforms like Android and iOS.
  • Navigate cloud and container technologies, addressing threats and countermeasures.
  • Unscramble encryption and hashing with cryptographic attacks and analytical tools.

Prerequisites

Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.

CEH Training Outline

Module 01 Introduction to Ethical Hacking

  • Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
  • Use AI to automate tasks and assist in performing reliable probing and analysis.

Module 02 Footprinting and Reconnaissance

  • Gain knowledge of how to use effective techniques and tools like WHOIS and Maltego for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.

Module 03 Scanning Networks

  • Enumerate a variety of network scanning techniques and countermeasures using tools like Nmap and Hping3.

Module 04 Enumeration

  • Employ various enumeration techniques, using SMB analysis SNMP and LDAP scraping to identify the necessary countermeasures.

Module 05 Vulnerability Analysis

  • Learn how to identify security exposures in a target organization’s network, communication infrastructure, and end systems using CVE, CWE and CCVSS scoring.

Module 06 System Hacking

  • Discover how to deploy various system hacking tactics to discover system and network flaws, password cracking, steganography, and how threat actors cover their tracks.

Module 07 Malware Threats

  • Identify diverse types of malware (Trojan, viruses, worms, etc.), APT and fileless malware and gain knowledge about malware analysis procedures, and effective malware countermeasures.

Module 08 Sniffing

  • Master packet sniffing techniques and their uses in discovering network vulnerabilities, plus employ countermeasures to defend against sniffing attacks.

Module 09 Social Engineering

  • Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and identify social engineering countermeasures.

Module 10 Denial-of-Service

  • Discover a variety of Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, and the tools used, plus examine proper DoS/DDoS audit techniques to verify countermeasures.

Module 11 Session Hijacking

  • Investigate the various session-hijacking techniques used to discover session-related authentication, authorization, and cryptographic weaknesses.

Module 12 Evading IDS, Firewalls, and Honeypots

  • Examine firewalls, intrusion detection systems (IDS), and honeypot evasion techniques, the tools used, as well as other perimeter weaknesses and their countermeasures.

Module 13 Hacking Web Servers

  • Investigate web server attacks, including a comprehensive attack methodology with tools like Nikto to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14 Hacking Web Applications

  • Explore web application attacks, including the OWASP Top 10 for auditing vulnerabilities in web applications and countermeasures.

Module 15 SQL Injection

  • Gain key knowledge about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures to defend your data.

Module 16 Hacking Wireless Networks

  • Learn about several types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Module 17 Hacking Mobile Platforms

  • Discover mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Module 18 IoT Hacking

  • Identify distinct types of threats to Internet of Things (IoT) and operational technology (OT), including hacking methodologies, tools, and appropriate countermeasures.

Module 19 Cloud Computing

  • Understand key cloud computing concepts including container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Module 20 Cryptography

  • Master your knowledge of encryption algorithms, cryptographic tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and analytical tools.

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

CEH Training FAQs

To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.

No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.

Chat With Us