+1 416-333-3717

Mon to Fri Open: 10am - 6pm

Certified Ethical Hacker (CEH)

$ 2,500 + HST

Duration: 39 hours (5 weekends)

Next Batch: July 1st, 2024

Want to know more ?
Categories Cyber Security
The Certified Ethical Hacker (CEH) certification equips cybersecurity professionals with essential skills in ethical hacking techniques and methodologies. This certification program covers a broad spectrum of security domains, including network scanning, system hacking, malware threats, social engineering, and cryptography. CEH training emphasizes practical knowledge and hands-on experience in identifying vulnerabilities, assessing risks, and implementing effective countermeasures to protect systems and data from malicious attacks. By obtaining CEH certification, professionals demonstrate their ability to ethically hack and secure systems, contributing to enhanced cybersecurity practices within organizations worldwide.
Prerequisite
  • Requires at least two years of work experience in the information security domain.
  • Familiarity with networking basics, such as TCP/IP protocols and subnetting, is beneficial.
  • Basic knowledge of operating systems (Windows, Linux) and proficiency in basic programming/scripting languages can be advantageous.
Total Duration: 39 Hours
Endorsed by

What will you learn?

  • Ethics and legal considerations
  • Types of hackers
  • Phases of ethical hacking
  • Penetration testing methodologies
  • Footprinting concepts
  • Information gathering techniques
  • WHOIS lookup
  • Social engineering for information gathering
  • Network scanning techniques
  • Port scanning
  • Network mapping
  • Vulnerability scanning
  • Techniques for enumeration
  • SNMP enumeration
  • LDAP enumeration
  • NTP enumeration
  • Vulnerability assessment techniques
  • Vulnerability scanning tools
  • Vulnerability databases
  • Common vulnerabilities and exposures (CVE)
  • Password cracking techniques
  • Privilege escalation
  • Escalating privileges using exploits
  • Covering tracks and hiding files
  • Types of malware (viruses, worms, trojans, etc.)
  • Malware analysis techniques
  • Anti-malware technologies
  • Malware detection and removal
  • Sniffing techniques and tools
  • Sniffing countermeasures (encryption, ARP spoofing prevention)
  • Packet sniffing for passwords and data
  • Social engineering techniques
  • Phishing attacks
  • Spear phishing
  • Social engineering countermeasures
  • DoS and DDoS attacks
  • DoS attack techniques (flood attacks, amplification attacks)
  • DoS attack tools
  • DoS attack prevention and mitigation
  • Session hijacking techniques (session fixation, session sidejacking)
  • Man-in-the-middle (MITM) attacks
  • Session hijacking countermeasures
  • HTTPS and secure session management
  • IDS evasion techniques
  • IDS detection mechanisms
  • IDS evasion tools
  • Evading IPS (Intrusion Prevention Systems)
  • Firewall types and configurations
  • Firewall evasion techniques
  • Honeypot concepts and deployment
  • Detecting and responding to honeypot attacks
  • Web server architecture and vulnerabilities
  • Web server attack techniques (directory traversal, HTTP methods)
  • Web server hardening techniques
  • Web server security tools
  • Web application architecture and security
  • Web application attack vectors (XSS, CSRF, etc.)
  • SQL injection attacks
  • Web application security testing tools
  • SQL injection concepts and techniques
  • Types of SQL injection attacks (blind SQLi, error-based SQLi)
  • SQL injection detection and prevention
  • SQL injection tools
  • Wireless network security fundamentals
  • Wireless network encryption standards (WEP, WPA, WPA2)
  • Wireless cracking techniques (WPS attacks, packet capture)
  • Wireless security tools
  • Mobile platform security fundamentals b. Mobile device management (MDM) c. Mobile application security d. Mobile exploitation techniques
  • IoT security challenges
  • IoT attack vectors
  • IoT device exploitation techniques
  • IoT security best practices
  • Cloud computing fundamentals
  • Cloud security considerations
  • Cloud deployment models (public, private, hybrid)
  • Cloud security tools and services
  • Cryptography fundamentals
  • Symmetric and asymmetric encryption
  • Hashing algorithms
  • Digital signatures and certificates
$ 2,500