Certificate of Completion
40
Course bookTop Rated Practice Exams
EC-Council Certification Voucher
$5200
This certification preparation program is for individuals seeking the CEH certification. This program will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The CEH, is the first part of a 3 part EC-Council Information Security Certification Focus Area which helps you master hacking technologies. You will become a hacker, but an ethical one!
Topic A: Information Security Overview
Topic B: Information Security Threats and Attack Vectors
Topic C: Hacking Concepts, Types, and Phases
Topic D: Ethical Hacking Concepts and Scope
Topic E: Information Security Controls
Topic F: Information Security Laws and Standards
Topic G: Foot printing Concepts
Topic H: Foot printing Methodology
Topic I: Foot printing Tools
Topic J: Foot printing Countermeasures
Topic K: Foot printing Penetration Testing
Topic L: Overview of Network Scanning
Topic M: CEH Scanning Methodology
Topic N: Scanning Pen Testing
Topic O: Enumeration Concepts
Topic P: NetBIOS Enumeration
Topic Q: SNMP Enumeration
Topic R: LDAP Enumeration
Topic S: NTP Enumeration
Topic T: SMTP Enumeration
Topic U: Enumeration Countermeasures
Topic V: SMB Enumeration Countermeasures
Topic W: Enumeration Pen Testing
Topic A: Web App Concepts/Threats
Topic B: Web App Hacking Methodology
Topic C: Web Application Hacking Tools
Topic D: Security Tools
Topic E: Web App Pen Testing
Topic F: SQL Injection Concepts
Topic G: Types of SQL Injection
Topic H: SQL Injection Methodology
Topic I: SQL Injection Tools
Topic J: Evasion Techniques
Topic K: Counter-measures
Topic L: Wireless Concepts
Topic M: Wireless Encryption
Topic N: Wireless Threats
Topic O: Wireless Hacking Methodology
Topic P: Wireless Hacking Tools
Topic Q: Bluetooth Hacking
Topic R: Counter-measures
Topic S: Wireless Security Tools
Topic T: Wi-Fi Pen Testing
Topic A: Mobile Platform Attack Vectors
Topic B: Hacking Android OS
Topic C: Hacking iOS
Topic D: Hacking Windows Phone OS
Topic E: Hacking BlackBerry
Topic F: Mobile Device Management (MDM)
Topic G: Mobile Security Guidelines and Tools
Topic H: Mobile Pen Testing
Topic I: IDS, Firewall and Honeypot Concepts/System
Topic J: Evading IDS
Topic K: Evading Firewall
Topic L: IDS/Firewall Evading Tools
Topic M: Detecting Honeypots
Topic N: Penetration Testing
Topic O: Cloud Computing Threats/Attacks
Topic P: Cloud Security
Topic Q: Cloud Security Tools
Topic R: Cloud Penetration Testing
Topic S: Cryptography Concepts
Topic T: Encryption Algorithms
Topic U: Cryptography Tools
Topic V: Public Key Infrastructure(PKI)
Topic W: Email Encryption
Topic X: Disk Encryption
Topic Y: Cryptography Attacks
Topic Z: Cryptanalysis Tools
To be eligible for the CEH certification, you must attend an official training class (from an EC-Council Authorized Training Provider) OR have at least two years of Internet Security related experience.
Students who complete an Advanced Business Learning EC-Council program are automatically eligible to sit for the certification exam due to their Authorized Training Provider status.
To be certified, students must pass the certification exam in the allotted period to complete the 125-question exam.
ABL Cyber Range and Academy
an Arizona Licensed School
ABL Cyber Academy - All Rights Reserved ©