Certified | Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) v11 program is the most comprehensive ethical hacking course on the globe to help information security professionals grasp the fundamentals of ethical hacking. The course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The CEH is the first of a series of 3 comprehensive courses (CEH, ECSA and the APT course) to help a cyber security professional master penetration testing. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

Description

The Purpose of the Certified Ethical Hacker (CEH) v11 credential is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

About the Program

Our security experts have designed over 140 labs which mimic real-time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5-day hands-on class by our Certified EC-Council Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

What is New in CEH  v11

Incorporating Parrot Security OS
  • When compared to Kali Linux, Parrot Security OS offers better performance on lower-powered laptops and machines while offering an intuitive look and feel with a larger repository of general tools.
Re-Mapped to NIST/NICE Framework
  • CEH v11 is mapped rigorously to important Specialty Areas under the NIST/NICE framework’s Protect and Defend (PR) job role category overlapping with other job roles, including Analyze (AN) and Securely Provision (SP).
Enhanced Cloud Security, IoT, and OT Modules
  • CEH v11 covers updated Cloud and IoT modules to incorporate CSP’s Container Technologies (e.g., Docker, Kubernetes), Cloud Computing threats, and a number of IoT hacking tools (e.g. Shikra, Bus Pirate, Facedancer21, and more). This is critical as the world moves towards broader and deeper cloud adoptions.
– Cloud−Based Threats
  • As the cloud industry is estimated to reach $354 billion by 2022, the businesses struggle to limit the frequency of data theft incidents due to misconfigured cloud environments. January to April 2020 alone saw a 630% spike in cloud-based attacks. Learn how to avoid, identify, and respond to cloud-based attacks with CEH v11.
– IoT Threats
  • Market reports anticipate that the worldwide IoT-connected devices are expected to reach 43 billion by 2023. To support this rapid expansion, the prominent players of the internet, including Amazon Web Services, Google, IBM, Microsoft, are swiftly shifting to private cloud services, creating complexities in IoT ecosystems. Learn to deal with IoTbased attacks with the CEH v11 course that covers the latest IoT hacking tools, such as Shikra, Bus Pirate, Facedancer21, and many others.
– Operational Technology (OT} Attacks
  • Last year, businesses experienced a 2,000% increase in OT based incidents. You can gain expertise in OT, IT, and IIoT (industrial IoT) to secure a critical enterprise OT/IoT deployments. To learn the advanced skills of OT, CEH covers concepts of OT, such as ICS, SCADA, and PLC, various challenges of OT, OT hacking methodology, tools, communication protocols of an OT network like odbus, Profinet, HART-IP, SOAP, CANopen, DeviceNet, Zigbee, Profibus, etc., and gaining Remote Access using DNP3 protocol.
Modern Malware Analysis
  • CEH v11 now includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more!
Covering the Latest Threats – Fileless Malware
  • As the security community observed a rise in fileless attacks, it began to raise concerns about fileless malware attacks. As fileless malware is a relatively new form of malware attack, organizations find it difficult to detect with endpoint security solutions. With the CEH v11, you can now learn various fileless malware techniques with associated defensive strategies, as the course focuses on the taxonomy of fileless malware threats, fileless malware obfuscation techniques to bypass antivirus, launching fileless malware through script-based injection, launching fileless malware through phishing, and more.
New Lab Designs and Operating Systems
  • This latest iteration of CEH v11 includes new operating systems, including Windows Server 2019, Windows Server 2016, and Windows 10 configured with Domain Controller, firewalls, and vulnerable web applications for practicing and improving hacking skills.
Increased Lab Time and Hands−on Focus
  • More than 50% of the CEH v11 course is dedicated to practical skills in live ranges via EC-Council labs. EC-Council leads in this aspect of the industry.
Industry’s Most Comprehensive Tools Library
  • The CEH v11 course includes a library of the latest tools required by security practitioners and pen testers across the world.

Course Outline

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

Who Is It For?

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Training Duration:

5 Days (9:00 AM – 6:00 PM)

About the Exam:

  • Exam Title: Certified Ethical Hacker
  • Exam Code: 312-50
  • Number of Questions: 125
  • Duration: 4 Hours
  • Availability: ECC Exam Portal
  • Test Format: Interactive Multiple Choice Questions
  • Passing Score: 70%

Eligibility Criteria:

In order to be eligible to attempt EC-Council CEH, certification examination, candidates may opt to:

Attend Official Training:
If a candidate has completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to attempt the relevant EC-Council exam without going through the application process.

Attempt Exam without Official Training:
In order to be considered for the EC-Council CEH exam without attending official training, candidates must have at least 2 years of work experience in the Information Security domain and remit a non-refundable eligibility application fee of USD 100.00 along with their application form.

 

Reviews

There are no reviews yet.

Be the first to review “Certified | Ethical Hacker (CEH)”

Your email address will not be published. Required fields are marked *