Certified Ethical Hacker (CEH) Certification Overview
Certified Ethical Hacker Course Outline
Module 1: Introduction to Ethical Hacking
- Elements of Information Security
- Cyber Kill Chain Methodology
- MITRE ATT&CK Framework
- Hacker Classes
- Ethical Hacking
- Information Assurance (IA)
- Risk Management
- Incident Management
- PCI DSS
- HIPPA
- SOX
- GDPR
Module 2: Foot Printing and Reconnaissance
- Foot printing
- Advanced Google Hacking Techniques
- Deep and Dark Web Foot printing
- Competitive Intelligence Gathering
- Website Foot printing
- Website Mirroring
- Email Foot printing
- Whose Lookup
- DNS Foot printing
- Traceroute Analysis
- Foot printing Tools
Module 3: Scanning Networks
- Network Scanning
- Host Discovery Techniques
- Port Scanning Techniques
- Service Version Discovery
- OS Discovery
- Banner Grabbing
- OS Fingerprinting
- Packet Fragmentation
- Source Routing
- IP Address Spoofing
- Scanning Tools
Module 4: Enumeration
- Enumeration
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- NFS Enumeration
- SMTP Enumeration
- DNS Cache Snooping
- DNSSEC Zone Walking
- IPsec Enumeration
- VoIP Enumeration
- RPC Enumeration
- Unix/Linux User Enumeration
- Enumeration Tools
Module 5: Vulnerability Analysis
- Enumeration
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- NFS Enumeration
- SMTP Enumeration
- DNS Cache Snooping
- DNSSEC Zone Walking
- IPsec Enumeration
- VoIP Enumeration
- RPC Enumeration
- Unix/Linux User Enumeration
- Enumeration Tools
Module 6: System Hacking
- Password Cracking
- Password Attacks
- Wire Sniffing
- Password-Cracking Tools
- Vulnerability Exploitation
- Buffer Overflow
- Privilege Escalation
- Privilege Escalation Tools
- Keylogger
- Spyware
- Anti-Keyloggers
- Anti-Spyware
- Rootkits
- Anti-Rootkits
- Steganography
- Steganography Tools
- Steganalysis
- Steganography Detection Tools
- Maintaining Persistence
- Post Exploitation
- Clearing Logs
- Covering Tracks
- Track-Covering Tools
Module 7: Malware Threats
- Malware
- Components of Malware
- APT
- Trojan
- Types of Trojans
- Exploit Kits
- Virus
- Virus Lifecycle
- Types of Viruses
- Ransomware
- Computer Worms
- File less Malware
- Malware Analysis
- Static Malware Analysis
- Dynamic Malware Analysis
- Virus Detection Methods
- Trojan Analysis
- Virus Analysis
- File less Malware Analysis
- Anti-Trojan Software
- Antivirus Software
- File less Malware Detection Tools
Module 8: Sniffing
- Network Sniffing
- Wiretapping
- MAC Flooding
- DHCP Starvation Attack
- ARP Spoofing Attack
- ARP Poisoning
- ARP Poisoning Tools
- MAC Spoofing
- STP Attack
- DNS Poisoning
- DNS Poisoning Tools
- Sniffing Tools
- Sniffer Detection Techniques
- Promiscuous Detection Tools
Module 9: Social Engineering
- Social Engineering
- Types of Social Engineering
- Phishing
- Phishing Tools
- Insider Threats/Insider Attacks
- Identity Theft
Module 10: Denial-of-Service
- DoS Attack
- DDoS Attack
- Botnets
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Tools
- DoS/DDoS Attack Detection Techniques
- DoS/DDoS Protection Tools
Module 11: Session High jacking
- Session Hijacking
- Types of Session Hijacking
- Spoofing
- Application-Level Session Hijacking
- Man-in-the-Browser Attack
- Client-side Attacks
- Session Replay Attacks
- Session Fixation Attack
- CRIME Attack
- Network Level Session Hijacking
- TCP/IP Hijacking
- Session Hijacking Tools
- Session Hijacking Detection Methods
- Session Hijacking Prevention Tools
Module 12: Evading IDS, Firewalls, and Honeypots
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Firewall
- Types of Firewalls
- Honeypot
- Intrusion Detection Tools
- Intrusion Prevention Tools
- IDS Evasion Techniques
- Firewall Evasion Techniques
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Honeypot Detection Tools
Module 13: Hacking Web Servers
- Web Server Operations
- Web Server Attacks
- DNS Server Hijacking
- Website Defacement
- Web Cache Poisoning Attack
- Web Server Attack Methodology
- Web Server Attack Tools
- Web Server Security Tools
- Patch Management
- Patch Management Tools
Module 14: Hacking Web Applications
- Web Application Architecture
- Web Application Threats
- OWASP Top 10 Application Security Risks – 2021
- Web Application Hacking Methodology
- Web API
- Webhooks
- Web Shell
- Web API Hacking Methodology
- Web Application Security
Module 15: SQL Injection
- SQL Injection
- Types of SQL injection
- Blind SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Signature Evasion Techniques
- SQL Injection Detection Tools
Module 16: Hacking Wireless Networks
- Wireless Terminology
- Wireless Networks
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wi-Fi Encryption Cracking
- WEP/WPA/WPA2 Cracking Tools
- Bluetooth Hacking
- Bluetooth Threats
- Wi-Fi Security Auditing Tools
- Bluetooth Security Tools
Module 17: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- OWASP Top 10 Mobile Risks
- App Sandboxing
- SMS Phishing Attack (SMiShing)
- Android Rooting
- Hacking Android Devices
- Android Security Tools
- Jailbreaking iOS
- Hacking iOS Devices
- iOS Device Security Tools
- Mobile Device Management (MDM)
- OWASP Top 10 Mobile Controls
- Mobile Security Tools
Module 18: IoT and OT Hacking
- IoT Architecture
- IoT Communication Models
- OWASP Top 10 IoT Threats
- IoT Vulnerabilities
- IoT Hacking Methodology
- IoT Hacking Tools
- IoT Security Tools
- IT/OT Convergence (IIOT)
- ICS/SCADA
- OT Vulnerabilities
- OT Attacks
- OT Hacking Methodology
- OT Hacking Tools
- OT Security Tools
Module 19: Cloud Computing
- Cloud Computing
- Types of Cloud Computing Services
- Cloud Deployment Models
- Fog and Edge Computing
- Cloud Service Providers
- Container
- Docker
- Kubernetes
- Serverless Computing
- OWASP Top 10 Cloud Security Risks
- Container and Kubernetes Vulnerabilities
- Cloud Attacks
- Cloud Hacking
- Cloud Network Security
- Cloud Security Controls
- Cloud Security Tools
Module 20: Cryptography
- Cryptography
- Encryption Algorithms
- MD5 and MD6 Hash Calculators
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Cryptography Attacks
- Key Stretching
Who should attend this Certified Ethical Hacker Certification Course?
This CEH Course is ideal for individuals aiming to deepen their understanding and practical skills in the art of ethical hacking. It is particularly beneficial for the following professionals:
- Cyber Red Team Operator
- System Administrators
- Cybersecurity Analysts
- IT Managers and Directors
- Information Security Engineer
- Network Architects
- CND Cyber Analyst
Prerequisites of the Certified Ethical Hacker Certification Course
There are no formal prerequisites to attend this CEH Course.
Certified Ethical Hacker Certification Course Overview
An Ethical Hacker is a skilled professional who understands how to look for weaknesses in target systems and use that knowledge to assess the security posture of a target system. The importance of Ethical Hackers continue to grow as they provide an essential service in securing systems from nefarious activities.
IT professionals such as Network Administrators, Cybersecurity Analysts, and Security Consultants can greatly benefit from attending this C|EH Training. By gaining advanced Ethical Hacking skills, these professionals can better identify and mitigate security vulnerabilities within their organisations.
The Knowledge Academy’s 5-day Certified Ethical Hacker Course will help delegates learn the skills required to perform effective Ethical Hacking operations. This Certified Ethical Hacker Course will be conducted by our highly professional and skilled trainer, who has years of experience in teaching.
Course Objectives
- To understand the latest hacking tools, techniques, and methodologies used by cybercriminals
- To conduct comprehensive network scanning and enumeration
- To analyse vulnerabilities and perform effective Ethical Hacking
- To identify and mitigate malware and other malicious software
- To understand and apply ethical hacking to mobile and IoT devices
- To develop skills in evading IDS, firewalls, and honeypots
After attending this Certified Ethical Hacker Course, delegates will be equipped with the knowledge to identify vulnerabilities across a variety of operating systems and effectively exploit these vulnerabilities to test system defences.
What’s included in this Certified Ethical Hacker Course?
- Certified Ethical Hacker Certification Examination [312-50 (ECC EXAM), 312-50 (VUE)]
- We provide 1-year lab access and access to eBooks as part of the course package.
- World-Class Training Sessions from Experienced Instructors
- Certified Ethical Hacker (CEH) Certificate
- Digital Delegate Pack
Certified Ethical Hacker Certification Exam Information
The Certified Ethical Hacker (C|EH) exam evaluates a candidate proficiency in Ethical Hacking techniques and cybersecurity principles. The exam format is as follows:
- Type of Questions: Multiple Choice
- Total Questions: 125
- Duration: 4 Hours
Why choose us
Ways to take this course
Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Ethical Hacker (CEH) Certification. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.
Live classes
Join a scheduled class with a live instructor and other delegates.
Interactive
Engage in activities, and communicate with your trainer and peers.
Global Pool of the Best Trainers
We handpick from a global pool of expert trainers for our Online Instructor-led courses.
Expertise
With 10+ years of quality, instructor-led training, we equip professionals with lasting skills for success.
Global Reach
With classes running in all timezones, access any of our courses and course material from anywhere, anytime.
Unlock your potential with The Knowledge Academy's Certified Ethical Hacker (CEH) Certification, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.
Unlock your potential with The Knowledge Academy's Certified Ethical Hacker (CEH) Certification, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.
Experience the most sought-after learning style with The Knowledge Academy's Certified Ethical Hacker (CEH) Certification. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Certified Ethical Hacker (CEH) Certification sessions.
Highly experienced trainers
Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience
State of the art training venues
We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible
Small class sizes
Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment
Great value for money
Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value
Streamline large-scale training requirements with The Knowledge Academy’s In-house/Onsite Certified Ethical Hacker (CEH) Certification at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.
Tailored learning experience
Leverage benefits offered from a certification that fits your unique business or project needs
Maximise your training budget
Cut unnecessary costs and focus your entire budget on what really matters, the training.
Team building opportunity
Our Certified Ethical Hacker (CEH) Certification offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings
Monitor employees progress
The course know-how will help you track and evaluate your employees' progression and performance with relative ease
What our customers are saying
Certified Ethical Hacker (CEH) Certification FAQs
What is the cost/training fees for Certified Ethical Hacker (CEH) Certification in Papua New Guinea?
Why choose us
Best price in the industry
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
Many delivery methods
Flexible delivery methods are available depending on your learning style.
High quality resources
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water
Certified Ethical Hacker (CEH) Certification in Papua New Guinea
Loading ....
Complete Cybersecurity Package
Save upto 30%Total without package: $14585
Package price: $10195 (Save $4390)