MEET YOUR INSTRUCTORS FOR THIS CLASS

SCHEDULE: SEPTEMBER - OCTOBER 2020, / PRIVATE CORPORATE TRAINING

Certified Ethical Hacker v10

If you are viewing this page, then you have probably already made the decision to attend the CEH class and you are shopping for prices and locations. You'll not find a better price in the United States for the on-ground instructor led CEH training. If you do, we will match it plus take off an additional 100.00. Take a look at our quarantee and be sure to check out your instructors.

The following comes standard with your class tuition:

Best Price Guarantee Test Pass Guarantee
5 Days of Instructor Led Training Lifetime Retakes
Access to the Latest Hacking Tools and Exploits Official EC-Council CEH Curriculum Manuals
CEH Certification Test - Take When You Are Ready Study Guide
Hundreds of Exam Practice Questions Access to iLabs online hacking environment included!

Course Description:

The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.

Arguably the CEH is the most popular information security related certification today, and is part of the DoD 8570 Directive.

Who Should Attend:

  • Computer Forensics/Digital Forensics Professionals
  • Incident Response Personnel
  • Information Security Professionals
  • IT Managers
  • Law Enforcement Personnel
  • Legal Professionals
  • Network Administrators and Architects
  • System Administrators

Topics Covered

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography