EC-COUNCIL

CERTIFIED ETHICAL HACKER (CEH) V11

$5,200.00

COURSE  FEATURES

LECTURES

0

QUIZZES

0

DURATION

12 weeks

SKILL LEVEL

Advanced Level

LANGUAGE

English

STUDENTS

10

ASSESSMENTS

Self

Certified Ethical Hacker (CEH) Preparation Training – EC-Council

Credential to be awarded: Certificate of Completion

Total Hours: 40

ALL Included: All Fees for: Course book, Top Rated Practice Exams and EC-Council Certification Voucher

Total tuition & fees: $5200

Course Description

This certification preparation program is for individuals seeking the CEH certification. This program will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The CEH, is the first part of a 3 part EC-Council Information Security Certification Focus Area which helps you master hacking technologies. You will become a hacker, but an ethical one!

SCHEDULE: Personalized, Flexible IT / Cyber Training – Courses Begin Weekly

Course content in online with a structured schedule for keeping on-track to complete the course in 12 weeks or less. 

Cyber / IT Practice Range – this is real-world, hands on skills building lab, provided with every course. Learn security scanning and hacking tools using Live Range Targets. All students learn NMAP, Metasploit, BurpSuite, Wireshark and dozens more… learn how to hash files use encryption, identify application and network systems vulnerabilities. ABL Cyber Range facilities are open to every student 6 days a week, or access VPN 24/7.

Cyber and IT MENTORING: in-person and virtual meetings for One-on-One Mentoring by a CEH mentor gets you ready to pass your certification and SHINE in job interviews. Your certification and Cyber IT Range skills get ABL Academy student selected over other job applicants.

Call or email ABL Cyber Academy to discuss a flexible training schedule to meet you work or other demands on your time.

 

CEH Domains:

Introduction to Ethical Hacking, Foot printing and Reconnaissance, Scanning Networks, and Enumeration

Topic A: Information Security Overview

Topic B: Information Security Threats and Attack Vectors

Topic C: Hacking Concepts, Types, and Phases

Topic D: Ethical Hacking Concepts and Scope

Topic E: Information Security Controls

Topic F: Information Security Laws and Standards

Topic G: Foot printing Concepts

Topic H: Foot printing Methodology

Topic I: Foot printing Tools

Topic J: Foot printing Countermeasures

Topic K: Foot printing Penetration Testing

Topic L: Overview of Network Scanning

Topic M: CEH Scanning Methodology

Topic N: Scanning Pen Testing

Topic O: Enumeration Concepts

Topic P: NetBIOS Enumeration

Topic Q: SNMP Enumeration

Topic R: LDAP Enumeration

Topic S: NTP Enumeration

Topic T: SMTP Enumeration

Topic U: Enumeration Countermeasures

Topic V: SMB Enumeration Countermeasures

Topic W: Enumeration Pen Testing

System Hacking, Malware Threats, and Sniffing

Topic A: CEH Hacking Methodology (CHM)

Topic B: CEH System Hacking Steps

Topic C: Hiding Files

Topic D: Covering Tracks

Topic E: Penetration Testing

Topic F: Introduction to Malware

Topic G: Types of Trojans

Topic H: Virus and Worms Concepts

Topic I: Malware Reverse Engineering

Topic J: Malware Detection

Topic K: Countermeasures

Topic L: Anti-Malware Software

Topic M: Penetration Testing

Topic N: Sniffing Concepts

Topic O: MAC Attacks

Topic P: DHCP Attacks

Topic Q: ARP Poisoning

Topic R: Spoofing Attack

Topic S: DNS Poisoning

Topic T: Sniffing Tools

Topic U: Sniffing Detection Techniques

Topic V: Sniffing Pen Testing

Social Engineering, Denial-of-Service, Session Hijacking, and Hacking Webservers

Topic A: Social Engineering Concepts

Topic B: Social Engineering Techniques

Topic C: Impersonation on Social Networking Sites

Topic D: Identity Theft

Topic E: Social Engineering Countermeasures

Topic F: Penetration Testing

Topic G: DoS/DDoS Concepts

Topic H: DoS/DDoS Attack Techniques

Topic I: Botnets

Topic J: DDoS Case Study

Topic K: Counter-measures

Topic L: DoS/DDoS Protection Tools

Topic M: DoS/DDoS Attack Penetration Testing

Topic N: Session Hijacking Concepts

Topic O: Application Level Session Hijacking

Topic P: Network-level Session Hijacking

Topic Q: Session Hijacking Tools

Topic R: Session Hijacking Pen Testing

Topic S: Webserver Concepts

Topic T: Webserver Attacks

Topic U: Attack Methodology

Topic V: Webserver Attack Tools

Topic W: Patch Management

Topic X: Webserver Security Tools

Topic Y: Webserver Pen Testing

Hacking Web Applications, SQL Injection, Hacking Wireless Networks, and Hacking Mobile Platforms

Topic A: Web App Concepts/Threats

Topic B: Web App Hacking Methodology

Topic C: Web Application Hacking Tools

Topic D: Security Tools

Topic E: Web App Pen Testing

Topic F: SQL Injection Concepts

Topic G: Types of SQL Injection

Topic H: SQL Injection Methodology

Topic I: SQL Injection Tools

Topic J: Evasion Techniques

Topic K: Counter-measures

Topic L: Wireless Concepts

Topic M: Wireless Encryption

Topic N: Wireless Threats

Topic O: Wireless Hacking Methodology

Topic P: Wireless Hacking Tools

Topic Q: Bluetooth Hacking

Topic R: Counter-measures

Topic S: Wireless Security Tools

Topic T: Wi-Fi Pen Testing

Evading IDS, Firewalls, and Honeypots, Cloud Computing, and Cryptography

Topic A: Mobile Platform Attack Vectors

Topic B: Hacking Android OS

Topic C: Hacking iOS

Topic D: Hacking Windows Phone OS

Topic E: Hacking BlackBerry

Topic F: Mobile Device Management (MDM)

Topic G: Mobile Security Guidelines and Tools

Topic H: Mobile Pen Testing

Topic I: IDS, Firewall and Honeypot Concepts/System

Topic J: Evading IDS

Topic K: Evading Firewall

Topic L: IDS/Firewall Evading Tools

Topic M: Detecting Honeypots

Topic N: Penetration Testing

Topic O: Cloud Computing Threats/Attacks

Topic P: Cloud Security

Topic Q: Cloud Security Tools

Topic R: Cloud Penetration Testing

Topic S: Cryptography Concepts

Topic T: Encryption Algorithms

Topic U: Cryptography Tools

Topic V: Public Key Infrastructure(PKI)

Topic W: Email Encryption

Topic X: Disk Encryption

Topic Y: Cryptography Attacks

Topic Z: Cryptanalysis Tools

Recommendations and Prerequisites 

EC-Council Organization
Certification Recommendations/Prerequisites

To be eligible for the CEH certification, you must attend an official training class (from an EC-Council Authorized Training Provider) OR have at least two years of Internet Security related experience. 

Students who complete an Advanced Business Learning EC-Council program are automatically eligible to sit for the certification exam due to their Authorized Training Provider status.


EC-Council Organization
Certification Exam Requirements

To be certified, students must pass the certification exam in the allotted period to complete the 125-question exam.


ABL Cyber Range and Academy
an Arizona Licensed School

ABL Cyber Academy - All Rights Reserved ©