Certified Ethical Hacker (CEH) v11
  • Certified Ethical Hacker (CEH) v11 badge

    What You Will Learn

    This certification preparation program is for individuals seeking the CEH certification. This program will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The CEH is the first part of a 3-part EC-Council Information Security Certification Focus Area which helps you master hacking technologies. You will become a hacker, but an ethical one!

    PRICE: $5,200
  • Course Details

    Course Duration

    12 weeks, 15 per week

    Credit to be Awarded

    Certified Ethical Hacker (CEH) v11 Certification

    Learning method


  • Prerequisites

    General Prerequisites

    Students must be 18 years of age and possess a high school diploma, General Equivalency Diploma (GED), or Home School Diploma.

    EC Council Certification Recommendations/Prerequisites

    To be eligible for the CEH certification, you must attend an official training class (from an EC-Council Authorized Training Provider) OR have at least two years of Internet Security-related experience.

    Students who complete an Advanced Business Learning EC-Council program are automatically eligible to sit for the certification exam due to their Authorized Training Provider status.

    EC Council Certification Exam Requirements

    To be certified, students must pass the certification exam in the allotted period to complete the 125-question exam.

  • Outline

    • Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, and Enumeration 
    • System Hacking, Malware Threats, and Sniffing
    • Social Engineering, Denial-of-Service, Session Hijacking, and Hacking Webservers 
    • Hacking Web Applications, SQL Injection, Hacking Wireless Networks, and Hacking Mobile Platforms 
    • Evading IDS, Firewalls, Honeypots, Cloud Computing, and Cryptography 
  • Module Group 1

    Introduction to Ethical Hacking, Foot printing and Reconnaissance, Scanning Networks, and Enumeration

    • Topic A: Information Security Overview
    • Topic B: Information Security Threats and Attack Vectors
    • Topic C: Hacking Concepts, Types, and Phases
    • Topic D: Ethical Hacking Concepts and Scope
    • Topic E: Information Security Controls
    • Topic F: Information Security Laws and Standards
    • Topic G: Foot printing Concepts
    • Topic H: Foot printing Methodology
    • Topic I: Foot printing Tools
    • Topic J: Foot printing Countermeasures
    • Topic K: Foot printing Penetration Testing
    • Topic L: Overview of Network Scanning
    • Topic M: CEH Scanning Methodology
    • Topic N: Scanning Pen Testing
    • Topic O: Enumeration Concepts
    • Topic P: NetBIOS Enumeration
    • Topic Q: SNMP Enumeration
    • Topic R: LDAP Enumeration
    • Topic S: NTP Enumeration
    • Topic T: SMTP Enumeration
    • Topic U: Enumeration Countermeasures
    • Topic V: SMB Enumeration Countermeasures
    • Topic W: Enumeration Pen Testing
  • Module Group 2

    System Hacking, Malware Threats, and Sniffing 

    • Topic A: CEH Hacking Methodology (CHM)
    • Topic B: CEH System Hacking Steps
    • Topic C: Hiding Files
    • Topic D: Covering Tracks
    • Topic E: Penetration Testing
    • Topic F: Introduction to Malware
    • Topic G: Types of Trojans
    • Topic H: Virus and Worms Concepts
    • Topic I: Malware Reverse Engineering
    • Topic J: Malware Detection
    • Topic K: Countermeasures
    • Topic L: Anti-Malware Software
    • Topic M: Penetration Testing
    • Topic N: Sniffing Concepts
    • Topic O: MAC Attacks
    • Topic P: DHCP Attacks
    • Topic Q: ARP Poisoning
    • Topic R: Spoofing Attack
    • Topic S: DNS Poisoning
    • Topic T: Sniffing Tools
    • Topic U: Sniffing Detection Techniques
    • Topic V: Sniffing Pen Testing
  • Module Group 3

    Social Engineering, Denial-of-Service, Session Hijacking, and Hacking Webservers 

    • Topic A: Social Engineering Concepts
    • Topic B: Social Engineering Techniques
    • Topic C: Impersonation on Social Networking Sites
    • Topic D: Identity Theft
    • Topic E: Social Engineering Countermeasures
    • Topic F: Penetration Testing
    • Topic G: DoS/DDoS Concepts
    • Topic H: DoS/DDoS Attack Techniques
    • Topic I: Botnets
    • Topic J: DDoS Case Study
    • Topic K: Counter-measures
    • Topic L: DoS/DDoS Protection Tools
    • Topic M: DoS/DDoS Attack Penetration Testing
    • Topic N: Session Hijacking Concepts
    • Topic O: Application-Level Session Hijacking
    • Topic P: Network-level Session Hijacking
    • Topic Q: Session Hijacking Tools
    • Topic R: Session Hijacking Pen Testing
    • Topic S: Webserver Concepts
    • Topic T: Webserver Attacks
    • Topic U: Attack Methodology
    • Topic V: Webserver Attack Tools
    • Topic W: Patch Management
    • Topic X: Webserver Security Tools
    • Topic Y: Webserver Pen Testing
  • Module Group 4

    Hacking Web Applications, SQL Injection, Hacking Wireless Networks, and Hacking Mobile Platforms 

    • Topic A: Web App Concepts/Threats
    • Topic B: Web App Hacking Methodology
    • Topic C: Web Application Hacking Tools
    • Topic D: Security Tools
    • Topic E: Web App Pen Testing
    • Topic F: SQL Injection Concepts
    • Topic G: Types of SQL Injection
    • Topic H: SQL Injection Methodology
    • Topic I: SQL Injection Tools
    • Topic J: Evasion Techniques
    • Topic K: Counter-measures
    • Topic L: Wireless Concepts
    • Topic M: Wireless Encryption
    • Topic N: Wireless Threats
    • Topic O: Wireless Hacking Methodology
    • Topic P: Wireless Hacking Tools
    • Topic Q: Bluetooth Hacking
    • Topic R: Counter-measures
    • Topic S: Wireless Security Tools
    • Topic T: Wi-Fi Pen Testing
  • Module Group 5

    Evading IDS, Firewalls, and Honeypots, Cloud Computing, and Cryptography

    • Topic A: Mobile Platform Attack Vectors
    • Topic B: Hacking Android OS
    • Topic C: Hacking iOS
    • Topic D: Hacking Windows Phone OS
    • Topic E: Hacking BlackBerry
    • Topic F: Mobile Device Management (MDM)
    • Topic G: Mobile Security Guidelines and Tools
    • Topic H: Mobile Pen Testing
    • Topic I: IDS, Firewall, and Honeypot Concepts/System
    • Topic J: Evading IDS
    • Topic K: Evading Firewall
    • Topic L: IDS/Firewall Evading Tools
    • Topic M: Detecting Honeypots
    • Topic N: Penetration Testing
    • Topic O: Cloud Computing Threats/Attacks
    • Topic P: Cloud Security
    • Topic Q: Cloud Security Tools
    • Topic R: Cloud Penetration Testing
    • Topic S: Cryptography Concepts
    • Topic T: Encryption Algorithms
    • Topic U: Cryptography Tools
    • Topic V: Public Key Infrastructure(PKI)
    • Topic W: Email Encryption
    • Topic X: Disk Encryption
    • Topic Y: Cryptography Attacks
    • Topic Z: Cryptanalysis Tools

ABL Cyber Range and Academy
an Arizona Licensed School

ABL Cyber Academy - All Rights Reserved ©