InfoSafe Academy

CEH (Certified Ethical Hacker) Training Course

CEHv11

CEHv11-image

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, handson learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

Module 01 Introduction to Ethical Hacking

Module 02 Footprinting and Reconnaissance

Module 03 Scanning Networks

Module 04 Enumeration

Module 05 Vulnerability Analysis

Module 06 System Hacking

Module 07 Malware Threats

Module 08 Sniffing

Module 09 Social Engineering

Module 10 Denial-of-Service

Module 11 Session Hijacking

Module 12 Evading IDS, Firewalls, and Honeypts

Module 13 Hacking Web Servers

Module 14 Hacking Web Applications

Module 15 SQL Injection

Module 16 Hacking Wireless Networks

Module 17 Hacking Mobile Platforms

Module 18 IoT and OT Hacking

Module 19 Cloud Computing

Module 20 Cryptography

1. New Learning Methodology: Learn – Certify – Engage – Compete

2. Compete: new challenges every month to test your job-ready skills!

3. 100% Compliance to NICE 2.0 Framework

4. Based on a comprehensive industry-wide job-task analysis

5. Hands-on learning labs

6. Practice Range

7. Global C|EH community competitions

8. Cheat Sheet

9. Coverage of the latest malware

10. Lab-intensive program (Every learning objective is demonstrated using labs)

11. Hands-on program (More than 50% of training time is dedicated to labs)

12. Lab environment simulates a real-time environment(Lab setup simulates real-life networks and platforms)

13. Covers the latest hacking tools (Based on Windows, macOS, and Linux)

14. Latest OS covered and a patched testing environment

15. All the tool screenshots are replaced with the latest version

16. All the tool listing slides are updated with the latest tools

17. All the countermeasure slides are updated

CEH Instructor Led (Virtual Classroom)

Duration: 5 days

Session Frequency: 8 hours a day

Course Start: Inquire

Price: Inquire

For questions regarding the training, please contact:

info@infosafe.cloud

Or use the button below to fill out the enrollment form:

EC-Council recognizes InfoSafe Academy as an Accredited Training Center meeting strict standards of excellence for delivering instructor-led training