Certified Ethical Hacker – CEH v9

Instructor Led Course – 20 Hours

Center Benefits

Corporate Venue: Onsite or at NLP Tech
EC Council Accredited Training Center
EC Council Official CEH Curriculum
EC Council Certified Trainers
CEH Certificate of Attendance from EC Council
Computer Labs: 1 PC for each student
Exams: CEH exams available (fees included)

Course Overview
The course would ensure a positive and interactive environment to its students in order to get familiar with the tools and techniques to scan, test, hack and secure their own systems. The lab intensive environment would provide each student with complete in-depth knowledge and practical experience with the current essential security systems. The course will help the candidates in understanding operations of perimeter defenses and then will lead into scanning and attacking their own networks, no real network is harmed. Candidates will get the basics of how intruders escalate privileges and what steps can be taken to secure a system and will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Who Should Attend
This course is designed and will be of high value for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Exam Preparation
The Certified Ethical Hacker exam may be taken on the last day of the training (optional). Candidates are required to pass the online Pro-metric exam to receive CEH certification.

Legal Agreement
The major purpose for the Ethical Hacking and Countermeasures course is to educate, introduce and demonstrate hacking tools and techniques to the candidates for penetration testing purposes only. Before the joining of the course, the candidates are required to sign an agreement stating that shall never use the newly acquired skills for illegal or malicious attacks shall never make use of such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.
Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

Course Outline
CEHv9 Curriculum consists of instructor led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class.

  1. Introduction to Ethical Hacking
  2. Foot-printing and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Malware Threats
  7. Sniffing
  8. Social Engineering
  9. Denial-of-Service
  10. Session Hijacking
  11. Hacking Web servers
  12. Hacking Web Applications
  13. SQL Injection
  14. Hacking Wireless Networks
  15. Hacking Mobile Platforms
  16. Evading IDS, Firewalls, and Honeypots
  17. Cloud Computing 18. Cryptography

Have a Question or
Need Information?