Course information

Certified Ethical Hacker Course Outline

Module 1: Introduction to Ethical Hacking

  • Elements of Information Security
  • Cyber Kill Chain Methodology
  • MITRE ATT&CK Framework
  • Hacker Classes
  • Ethical Hacking
  • Information Assurance (IA)
  • Risk Management
  • Incident Management
  • PCI DSS
  • HIPPA
  • SOX
  • GDPR

Module 2: Foot Printing and Reconnaissance

  • Foot printing
  • Advanced Google Hacking Techniques
  • Deep and Dark Web Foot printing
  • Competitive Intelligence Gathering
  • Website Foot printing
  • Website Mirroring
  • Email Foot printing
  • Whose Lookup
  • DNS Foot printing
  • Traceroute Analysis
  • Foot printing Tools

Module 3: Scanning Networks

  • Network Scanning
  • Host Discovery Techniques
  • Port Scanning Techniques
  • Service Version Discovery
  • OS Discovery
  • Banner Grabbing
  • OS Fingerprinting
  • Packet Fragmentation
  • Source Routing
  • IP Address Spoofing
  • Scanning Tools

Module 4: Enumeration

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • Enumeration Tools

Module 5: Vulnerability Analysis

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • Enumeration Tools

Module 6: System Hacking

  • Password Cracking
  • Password Attacks
  • Wire Sniffing
  • Password-Cracking Tools
  • Vulnerability Exploitation
  • Buffer Overflow
  • Privilege Escalation
  • Privilege Escalation Tools
  • Keylogger
  • Spyware
  • Anti-Keyloggers
  • Anti-Spyware
  • Rootkits
  • Anti-Rootkits
  • Steganography
  • Steganography Tools
  • Steganalysis
  • Steganography Detection Tools
  • Maintaining Persistence
  • Post Exploitation
  • Clearing Logs
  • Covering Tracks
  • Track-Covering Tools

Module 7: Malware Threats

  • Malware
  • Components of Malware
  • APT
  • Trojan
  • Types of Trojans
  • Exploit Kits
  • Virus
  • Virus Lifecycle
  • Types of Viruses
  • Ransomware
  • Computer Worms
  • File less Malware
  • Malware Analysis
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Virus Detection Methods
  • Trojan Analysis
  • Virus Analysis
  • File less Malware Analysis
  • Anti-Trojan Software
  • Antivirus Software
  • File less Malware Detection Tools

Module 8: Sniffing

  • Network Sniffing
  • Wiretapping
  • MAC Flooding
  • DHCP Starvation Attack
  • ARP Spoofing Attack
  • ARP Poisoning
  • ARP Poisoning Tools
  • MAC Spoofing
  • STP Attack
  • DNS Poisoning
  • DNS Poisoning Tools
  • Sniffing Tools
  • Sniffer Detection Techniques
  • Promiscuous Detection Tools

Module 9: Social Engineering

  • Social Engineering
  • Types of Social Engineering
  • Phishing
  • Phishing Tools
  • Insider Threats/Insider Attacks
  • Identity Theft

Module 10: Denial-of-Service

  • DoS Attack
  • DDoS Attack
  • Botnets
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Tools
  • DoS/DDoS Attack Detection Techniques
  • DoS/DDoS Protection Tools

Module 11: Session High jacking

  • Session Hijacking
  • Types of Session Hijacking
  • Spoofing
  • Application-Level Session Hijacking
  • Man-in-the-Browser Attack
  • Client-side Attacks
  • Session Replay Attacks
  • Session Fixation Attack
  • CRIME Attack
  • Network Level Session Hijacking
  • TCP/IP Hijacking
  • Session Hijacking Tools
  • Session Hijacking Detection Methods
  • Session Hijacking Prevention Tools

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection System (IDS)
  • Intrusion Prevention System (IPS)
  • Firewall
  • Types of Firewalls
  • Honeypot
  • Intrusion Detection Tools
  • Intrusion Prevention Tools
  • IDS Evasion Techniques
  • Firewall Evasion Techniques
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Detection Tools

Module 13: Hacking Web Servers

  • Web Server Operations
  • Web Server Attacks
  • DNS Server Hijacking
  • Website Defacement
  • Web Cache Poisoning Attack
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Web Server Security Tools
  • Patch Management
  • Patch Management Tools

Module 14: Hacking Web Applications

  • Web Application Architecture
  • Web Application Threats
  • OWASP Top 10 Application Security Risks – 2021
  • Web Application Hacking Methodology
  • Web API
  • Webhooks
  • Web Shell
  • Web API Hacking Methodology
  • Web Application Security

Module 15: SQL Injection

  • SQL Injection
  • Types of SQL injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Signature Evasion Techniques
  • SQL Injection Detection Tools

Module 16: Hacking Wireless Networks

  • Wireless Terminology
  • Wireless Networks
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Encryption Cracking
  • WEP/WPA/WPA2 Cracking Tools
  • Bluetooth Hacking
  • Bluetooth Threats
  • Wi-Fi Security Auditing Tools
  • Bluetooth Security Tools

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • OWASP Top 10 Mobile Risks
  • App Sandboxing
  • SMS Phishing Attack (SMiShing)
  • Android Rooting
  • Hacking Android Devices
  • Android Security Tools
  • Jailbreaking iOS
  • Hacking iOS Devices
  • iOS Device Security Tools
  • Mobile Device Management (MDM)
  • OWASP Top 10 Mobile Controls
  • Mobile Security Tools

Module 18: IoT and OT Hacking

  • IoT Architecture
  • IoT Communication Models
  • OWASP Top 10 IoT Threats
  • IoT Vulnerabilities
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Security Tools
  • IT/OT Convergence (IIOT)
  • ICS/SCADA
  • OT Vulnerabilities
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • OT Security Tools

Module 19: Cloud Computing

  • Cloud Computing
  • Types of Cloud Computing Services
  • Cloud Deployment Models
  • Fog and Edge Computing
  • Cloud Service Providers
  • Container
  • Docker
  • Kubernetes
  • Serverless Computing
  • OWASP Top 10 Cloud Security Risks
  • Container and Kubernetes Vulnerabilities
  • Cloud Attacks
  • Cloud Hacking
  • Cloud Network Security
  • Cloud Security Controls
  • Cloud Security Tools

Module 20: Cryptography

  • Cryptography
  • Encryption Algorithms
  • MD5 and MD6 Hash Calculators
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attacks
  • Key Stretching

Show moredowndown

Who should attend this Certified Ethical Hacker Certification Course?

This CEH Course is ideal for individuals aiming to deepen their understanding and practical skills in the art of ethical hacking. It is particularly beneficial for the following professionals:

  • Cyber Red Team Operator
  • System Administrators
  • Cybersecurity Analysts
  • IT Managers and Directors
  • Information Security Engineer
  • Network Architects
  • CND Cyber Analyst

Prerequisites of the Certified Ethical Hacker Certification Course

There are no formal prerequisites to attend this CEH Course. 

Certified Ethical Hacker Certification Course Overview

An Ethical Hacker is a skilled professional who understands how to look for weaknesses in target systems and use that knowledge to assess the security posture of a target system. The importance of Ethical Hackers continue to grow as they provide an essential service in securing systems from nefarious activities.

IT professionals such as Network Administrators, Cybersecurity Analysts, and Security Consultants can greatly benefit from attending this C|EH Training. By gaining advanced Ethical Hacking skills, these professionals can better identify and mitigate security vulnerabilities within their organisations.

The Knowledge Academy’s 5-day Certified Ethical Hacker Course will help delegates learn the skills required to perform effective Ethical Hacking operations. This Certified Ethical Hacker Course will be conducted by our highly professional and skilled trainer, who has years of experience in teaching.

Course Objectives

  • To understand the latest hacking tools, techniques, and methodologies used by cybercriminals
  • To conduct comprehensive network scanning and enumeration
  • To analyse vulnerabilities and perform effective Ethical Hacking
  • To identify and mitigate malware and other malicious software
  • To understand and apply ethical hacking to mobile and IoT devices
  • To develop skills in evading IDS, firewalls, and honeypots

After attending this Certified Ethical Hacker Course, delegates will be equipped with the knowledge to identify vulnerabilities across a variety of operating systems and effectively exploit these vulnerabilities to test system defences.

Show moredowndown

What’s included in this Certified Ethical Hacker Course?

  • Certified Ethical Hacker Certification Examination [312-50 (ECC EXAM), 312-50 (VUE)]
  • World-Class Training Sessions from Experienced Instructors
  • Certified Ethical Hacker (CEH) Certificate
  • Digital Delegate Pack

Certified Ethical Hacker Certification Exam Information

The Certified Ethical Hacker (C|EH) exam evaluates a candidate proficiency in Ethical Hacking techniques and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 125
  • Duration: 4 Hours

Why choose us

Our Regina venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

Regina, the capital city of the Canadian province of Saskatchewan, has an average population of roughly 193,100 spread across 56.2 square miles of land.  At The Knowledge Academy, we offer 50,000 classroom based training courses throughout the different areas of Regina, in order to enhance people’s learning in an array of subject areas.  Education in Canada is generally funded by federal, provincial, and local governments; the system is divided into primary, secondary and post-secondary education and is operated under provincial jurisdiction.  On the whole, there are 190 days in a school year, starting in September and ending towards the last Friday of June.  Some popular and highly regarded universities in Canada include: the University of Toronto (notable alumni including: William Lyon Mackenzie King, Vincent Massey, Donald Sutherland and Lesra Martin), the University of British Columbia (notable alumni including: Eddie Peng, Justin Trudeau and Nardwuar the Human Serviette), and the University of Alberta (notable alumni including: Dayo Wong, George Stanley and Beverley McLachlin). 

Show moredown

Address

Royal Bank Building
2010 – 11th Avenue
7th Floor
Regina
Saskatchewan
S4P 0J3

T: +1 6474932992

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Ethical Hacker Certification Course in Regina. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Certified Ethical Hacker Certification Course in Regina, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Streamline large-scale training requirements with The Knowledge Academy's In-house/Onsite at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Certified Ethical Hacker Certification Course in Regina FAQs

The Certified Ethical Hacker (CEH) is a professional certification that validates skills in identifying and addressing security vulnerabilities in networks and systems using ethical hacking techniques.
The CEH exam assesses skills in network security, penetration testing, malware threats, hacking techniques, and ethical hacking tools and methodologies.
There are no formal prerequisites to attend this Certified Ethical Hacker Course.
The CEH Training covers topics such as network security, cryptography, malware analysis, penetration testing, social engineering, and hacking tools.
The Certified Ethical Hacker Course lasts for 5 days, providing intensive, hands-on learning.
Candidates often face challenges with mastering complex hacking techniques, managing extensive study materials, and balancing exam preparation with work.
Certified Ethical Hackers can pursue careers as penetration testers, security analysts, cybersecurity consultants, and IT security managers.
The CEH course emphasises practical hacking skills and real-world scenarios, setting it apart from more theoretical network security certifications.
CEH Certification enhances credibility by demonstrating advanced ethical hacking skills, commitment to cybersecurity, and proficiency in identifying and mitigating security threats.
Recommended resources include EC-Council's official study guides, practice exams, online training courses, forums, and cybersecurity textbooks.
Candidates can access official study guides, practice exams, and online forums to aid their CEH exam preparation.
The Knowledge Academy stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking Certified Ethical Hacker Course.
The training fees for Certified Ethical Hacker Certificationin Regina starts from CAD9995
The Knowledge Academy is the Leading global training provider for Certified Ethical Hacker Certification.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on EC – Council Certification Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +1 6474932992 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
BLACK FRIDAY SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.