Certified Ethical Hacker (CEH)

Overview

Prepare for the EC-Council CEH v9 certification while learning the latest ethical hacking techniques.

If you're concerned about the integrity of your network's infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v9 to enhance your network's defenses. You'll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network, you'll learn how intruders operate and the steps you can take to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, you'll prepare for the latest Certified Ethical Hacker exam from EC-Council. 

Highlights of CEH v9 include:

  • Diagrams of concepts and attacks for clarity and easier interpretation
  • Key industry-standard tools covered in detail
  • Exclusive section for countermeasures against different attacks
  • Time dedicated to penetration testing
  • Results-oriented, descriptive, and analytical lab manual

Target Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Prerequisites

At least two years of IT security experience and a strong working knowledge of TCP/IP.  The Security+ Prep Course is highly recommended.

Course Objectives

Upon Completion Students will have knowledge of:

  • Footprinting and reconnaissance
  • Hacking web servers, web applications, and wireless networks
  • Cryptography
  • Penetration testing
  • Social engineering
  • Trojans, viruses, and worms
  • Evading IDS, firewalls, and honeypots
  • Enumeration
  • Buffer overflows

Course Outline

Module 1. Introduction to Ethical Hacking
Module 2. Footprinting and Reconnaissance
Modules 3. Scanning Networks
Module 4. Enumeration
Module 5. System Hacking
Module 6. Trojans and Backdoors
Module 7. Viruses and Worms
Module 8. Sniffers
Module 9. Social Engineering
Module 10. Denial of Service
Module 11. Session Hijacking
Module 12. Hijacking Web Servers
Module 13. Hacking Web Applications
Module 14. SQL Injection
Module 15. Hacking Wireless Networks
Module 16. Evading IDS, Firewalls, and Honeypots
Module 17:Cloud Computing
Module 18: Cryptography

SLI Main Menu