Certified Ethical Hacker

Introduction

CEH (Certified Ethical Hacker) v8 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEH courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

Prerequisites

Basic knowledge of using a computer

Who should attend?

  • IT Security Professionals

  • System Administrator

  • System Engineer

  • Security Enthusiasts

Day 1

  • 1

    Introduction to Ethical Hacking

    30 mins
  • 2

    Foot Printing and Reconnaissance

    1 hour 30 mins
  • 3

    Scanning Networks

    2 hours
  • 4

    Enumeration

    2 hours
  • 5

    System Hacking

    2 hours

Day 2

  • 1

    Trojans and Backdoors

    2 hours
  • 2

    Viruses and Worms

    2 hours
  • 3

    Sniffers

    2 hours
  • 4

    Social Engineering

    1 hour
  • 5

    Denial of Service

    1 hour

Day 3

  • 1

    Session Hijacking

    2 hour
  • 2

    Hacking Webservers

    1 hour
  • 3

    Hacking Web Applications

    3 hour
  • 4

    SQL Injection

    1 hour
  • 5

    Hacking Wireless Networks

    1 hour

Day 4

  • 1

    Evading IDS, Firewalls and Honeypots

    2 hours
  • 2

    Buffer Overflow

    2 hours
  • 3

    Cryptography

    2 hours
  • 4

    Penetration Testing

    2 hours

Exam Day

  • #

    125 Questions


    70% Passing Score


    Multiple choice questions

    4 hours

What you will learn

  • Apply countermeasures to secure your system against threats
  • Test access to your data using ethical hacking techniques
  • Implement real–world hacking techniques to test system security
  • Employ complex tools to identify and analyze your company’s risks and weaknesses
  • Find vulnerabilities in a network infrastructure
  • Hands-On Lab experience
  • Hacking a web server by manipulating input
  • Testing for Cross-Site Scripting (XSS) in a web application
  • Detecting intrusions using Snort
  • Encrypting data to prevent unauthorized access