Certified Ethical Hacker – CEH v9
Instructor Led Course – 20 Hours
Center Benefits
Corporate Venue: Onsite or at NLP Tech
EC Council Accredited Training Center
EC Council Official CEH Curriculum
EC Council Certified Trainers
CEH Certificate of Attendance from EC Council
Computer Labs: 1 PC for each student
Exams: CEH exams available (fees included)
Course Overview
The course would ensure a positive and interactive environment to its students
in order to get familiar with the tools and techniques to scan, test, hack and
secure their own systems. The lab intensive environment would provide each
student with complete in-depth knowledge and practical experience with the
current essential security systems. The course will help the candidates in
understanding operations of perimeter defenses and then will lead into scanning
and attacking their own networks, no real network is harmed. Candidates will get
the basics of how intruders escalate privileges and what steps can be taken to
secure a system and will also learn about Intrusion Detection, Policy Creation,
Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Who Should Attend
This course is designed and will be of high value for security officers,
auditors, security professionals, site administrators, and anyone who is
concerned about the integrity of the network infrastructure.
Exam Preparation
The Certified Ethical Hacker exam may be taken on the last day of the training
(optional). Candidates are required to pass the online Pro-metric exam to
receive CEH certification.
Legal Agreement
The major purpose for the Ethical Hacking and Countermeasures course is to
educate, introduce and demonstrate hacking tools and techniques to the
candidates for penetration testing purposes only. Before the joining of the
course, the candidates are required to sign an agreement stating that shall
never use the newly acquired skills for illegal or malicious attacks shall never
make use of such tools in an attempt to compromise any computer system, and to
indemnify EC-Council with respect to the use or misuse of these tools,
regardless of intent.
Not anyone can be a student — the Accredited Training Centers (ATC) will make
sure the applicants work for legitimate companies.
Course Outline
CEHv9 Curriculum consists of instructor led training and self-study. The
Instructor will provide the details of self-study modules to the students
beginning of the class.
- Introduction to Ethical Hacking
- Foot-printing and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Hacking Web servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls, and Honeypots
- Cloud Computing 18. Cryptography