Stop the vulnerabilities before they are exploited
IT professionals who have taken a Certified Ethical Hacker v10 Course are able to stop intrusions before they happen because they learn to think like a hacker. You’ll find out how to use hacking skills for the protection of an organization. The Certified Ethical Hacker v10 Course has been created with input from hundreds of organizations and researchers who have spent thousands of hours establishing the latest methods used by nefarious intruders looking to make money and wreak havoc. In this course, you’ll reap the rewards of that expertise as you learn how to enforce information security practices against these threats.
This prep course is accredited by the EC-Council, the organization that implements the exam through the approved exam centres. By taking training through an accredited school like TechnoEdge, candidates are able to skip the application process the EC-Council normally requires. While it is possible to take the exam without prior training, there is an approval process and a requirement of a minimum of two years of work experience in the information security domain in order to do so.
Taking the accredited training doesn’t guarantee you will pass the exam but training partners like TechnoEdge and our experienced instructors are completely familiar with the content of the Certified Ethical Hacker v10 Course and the content of the exam. They are fully trained in the information from the EC-Council at an advanced level in order to help you have the best shot possible at passing the exam and achieving CEH certification.
Now, in its 10th iteration, this Course prepares you with skills to prevent attacks to computer systems and IS. Exposure to hacking practices comes from learning how hackers think and act – because you will be exploring five phases of Ethical Hacking: reconnaissance, gaining access, enumeration, maintaining access and covering your tracks – the skills actual hackers use.
A combination of hands-on lab-style practice and lecture of this prep course ensures you will have both the information and practical experience to address needs like penetration testing, ethical hacking and threat detection. Labs provide exposure to hundreds of hacking tools and techniques in a “live” hacking experience to mimic real-life situations.
The Certified Ethical Hacker v10 Course prepares you for the CEH exam and upon successful completion, you will receive Certified Ethical Hacking certification. This is a respected and well-known certification within the global IT community and is a baseline hiring standard of many Fortune 500 companies, governments, education institutions and other organizations around the world.
CEH V10 Ethical Hacking Course outline
- Introduction to Ethical Hacking
- Foot printing and Reconnaissance
- Scanning Networks
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Social Engineering
- Session Hijacking
- Evading IDS, Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
CEH V10 Ethical Hacking Course key learning points
- Key issues in the IS world, incident management, penetration testing
- Footprinting types, tools and countermeasures
- Scanning techniques and countermeasures
- Enumeration techniques and countermeasures
- System hacking methodology, steganography, steganalysis attacks, covering tracks
- Trojans, Trojan analysis and countermeasures
- Packet sniffing techniques and defence
- Social Engineering techniques, identify theft and countermeasures
- DoS/DDoS attach techniques, botnets, DDoS attack tools, countermeasures
- Webserver attack types, methodology and countermeasures
- SQL injection attacks and detection tools
- Wireless encryption, methodology, tools and wi-security tools
- Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, Windows phone 8 vulnerabilities, mobile security guidelines and tools
- Firewall, IDS and honeypot evasion techniques, tools and countermeasures
- Cloud computer concepts, threats, attacks, security techniques and tools
- Cryptography ciphers, public key infrastructure (PKI), cryptography attacks and cryptanalysis tools
- Penetration testing, security audit, vulnerability assessment and penetration testing roadmap
- Vulnerability analysis to identify security loopholes in a network, communication infrastructure and end systems
- Threats to IoT platforms and secure defence of IoT devices