Certified Ehtical Hacker (CEH) v11

Become a Certified Ethical Hacker and master the skills to protect essential services from cyber threats with CEH v11, the top choice for information security professionals worldwide.

Course Thumbnail

Essential Skills Gained

Checkmark

Understand ethical hacking phases and tools crucial for cybersecurity.

Checkmark

Perform vulnerability analysis to identify security loopholes.

Checkmark

Implement advanced hacking techniques and preventative countermeasures.

Checkmark

Develop strategies to secure systems against diverse cyber threats.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • Information Security Analyst / Administrator
  • Information Assurance Security Officer
  • Network Administrators and Engineers
  • Information Security / IT Auditors

Description

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.” CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure. In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Module 01

  1. Introduction to Ethical Hacking

Module 02

  1. Footprinting and Reconnaissance

Module 03

  1. Scanning Networks

Module 04

  1. Enumeration

Module 05

  1. Vulnerability Analysis

Module 06

  1. System Hacking

Module 07

  1. Malware Threats

Module 08

  1. Sniffing

Module 09

  1. Social Engineering

Module 10

  1. Denial-of-Service

Module 11

  1. Session Hijacking

Module 12

  1. Evading IDS, Firewalls, and Honeypots

Module 13

  1. Hacking Web Servers

Module 14

  1. Hacking Web Applications

Module 15

  1. SQL Injection

Module 16

  1. Hacking Wireless Networks

Module 17

  1. Hacking Mobile Platforms

Module 18

  1. IoT and OT Hacking

Module 19

  1. Cloud Computing

Module 20

  1. Cryptography

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.