25,000+ Courses Nationwide
0345 4506120

Certified Ethical Hacker v11 Blended Learning

Overview

This Premium course offers both classroom training and video learning to enhance your learning experience. Please see below for full details.

In this award-winning Certified Ethical Hacker (CEH v11) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

This product offers the most complete CEH training availble on the market today. With unlimited annual access to EC Council official videos, exam prep, and labs, and your trusted coach, you have everything you need to have a sucessful learning experience and pass the CEH certification exam.

Key Features of this Certified Ethical Hacker Training:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course instructor coaching benefit
  • After-course computing sandbox included

What's Included

Unlimited annual access to:

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox included
  • Self-paced lecture videos (1 year access)
  • Pre-configured EC-Council iLabs (6 month access)
  • Exam Voucher included
  • CyberQ Exam Prep
  • Test Pass Guarantee

More Information

Pre-requisites

Two years of security-related experience and a strong practical working knowledge of TCP/IP

Learning Objectives

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Course content

Ethical Hacking Fundamentals

Considering the effects of hacking

  • Reviewing the elements of information security
  • The security, functionality and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analysing System Risks and Weaknesses to Apply Countermeasures

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analysing Trojan activity

Dissecting viruses, worms and sniffers

  • Distributing malware on the web
  • Recognising key indicators of a virus attack
  • Analysing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognising symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

  • Cross–Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks

Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

CEH Training FAQs

What background do I need?

Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.

Is the on-demand content the same as the 5-day instructor class?

Yes, and it's EC-Council official content!

What on-demand content will I receive?

An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.

How many labs will I receive?

You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. Labs are valid for 6 months from the time of activation with the option to extend them, if needed.

What is CyberQ Exam Prep?

CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.

What is the "test pass guarantee"?

You will receive one retake exam voucher at no additional cost in the event that you don't pass the exam on the first try.

How will I access my course materials if I choose this method?

Once payment is received, you will receive an email from us with all the links and information you need to get started.

One Day Instructor-Led Review

You'll be able to register for a Training Review Session at any time after you've placed your order.

Exam

  • This course includes a voucher to take the CEH exam via ProctorU
  • Exam voucher is supplied by EC-Council

Related Courses

We work with the best