Get ready within 3 months to pass your Certified Ethical Hacker (CEH) certification exam. This course is specially developed and delivered by our CISSP and GCIH Certified industry practitioners to help you pass the CEH exam in the minimum possible time and on your first try. Our world-class online learning comprises of live support with guaranteed response time, targeted lectures and notes written by industry professionals, practice questions and quizzes, and a dedicated course forum and study group to make the most of community and social learning opportunity. Join 100’s of other professionals who have done it before you and stay confident that you are covered by our 100% Pass Guarantee or your money back. Be part of the most dynamic information security community at Eristotle to study for your CEH certification.
ECCouncil’s Certified Ethical Hacker (CEH®) course is claimed to be the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever need to know for beefing up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand and ready to take the EC-Council Certified Ethical Hacker exam 312-50.
The Certified Ethical Hacker (CEH) certification course designed, developed and delivered by Eristotle through learning events, seminars, course groups, lectures and interactions in forums by CISSP Certified industry practitioners and trainers, helps the candidate get the first-hand knowledge about information security management and controls elaborately.
Eristotle awards you a Course Completion Certificate once you successfully satisfy the required criteria. The certificate is a record of your achievement, which you can also use towards any course study requirements.
|CEH Module 01 – Introduction to Ethical Hacking||03:00:00|
|CEH Module 02 – Footprinting and Reconnaissance||03:00:00|
|CEH Module 03 – Scanning Networks||04:00:00|
|CEH Module 04 – Enumeration||04:00:00|
|CEH Module 05 – System Hacking||03:00:00|
|CEH Module 06 – Malware Threats||04:00:00|
|CEH Module 07 – Sniffing||04:00:00|
|CEH Module 08 – Social Engineering||03:00:00|
|CEH Module 09 – Denial of Service||04:00:00|
|CEH Module 10 – Session Hijacking||03:00:00|
|CEH Module 11 – Hacking Webservers||03:00:00|
|CEH Module 12 – Hacking Web Applications||04:00:00|
|CEH Module 13 – SQL Injections||02:30:00|
|CEH Module 14 – Hacking Wireless Networks||04:00:00|
|CEH Module 15 – Hacking Mobile Platforms (TBD)||03:00:00|
|CEH Module 16 – Evading IDS, Firewalls and Honeypots||02:30:00|
|CEH Module 17 – Cloud Computing (TBD)||03:00:00|
|CEH Module 18 – Cryptography||03:00:00|
No Reviews found for this course.