Wecome to the new and updated CEH v11. Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
Your course package is designed to provide maximum learning and convenience. This is included in the price of your course:
Your expert instructor will get you ready for the following exam and certification, which are included in your course package and covered by the Certification guarantee.
You´ll have the perfect starting point for your training with these prerequisites:
To make sure you have the best possible chances of benefitting from the course, we are available for you to discuss your goals and general expectations to your learning and results.
Generally though, before attending your CEH training course, you should ideally have at least two years' IT experience, a strong working knowledge of TCP/IP, Windows Server (NT, 2000, 2003, 2008) and a basic familiarity with Linux and/or Unix.
Using our engaging learning methodology using a variety of tools, we’ll cover the entire curriculum.
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
This class will immerse you into an interactive environment where you will learn how to scan, test, hack and secure your own systems. The intensive environment will give you in-depth knowledge and practical experience with the current essential security systems.
You will begin by understanding how perimeter defences work, and then move into scanning and attacking your own networks - no real network is harmed. You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
The CEH certification includes an exclusive section for countermeasures against different attacks, with detailed explanation of how to implement these countermeasures in real life.
The Virtual Classroom is an online forum, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.
Your prereading sits in your personal space at readynez.com: My Readynez. Simply log in, find your course and start your preparations.
Your exam voucher is usually included in your virtual training package. When you´re ready to sit your exam, you just book it. You can sit most exams from home or at a local test centre. We’re here to help you with that process.