CEH (V10) - Certified Ethical Hacker Training

Course

Online

Price on request

Description

  • Type

    Course

  • Level

    Intermediate

  • Methodology

    Online

  • Duration

    Flexible

  • Start date

    Different dates available

  • Online campus

    Yes

  • Delivery of study materials

    Yes

  • Support service

    Yes

  • Virtual classes

    Yes

The CEH (v10) has updated the modules from CEH (v9) on various important aspects of Cybersecurity- Vulnerability analysis, IoT devices, Attack vectors and Malware analysis. There is also added emphasis on penetration testing tools. Throughout the course, you’ll essentially use the same techniques that the “bad guys” use, including social engineering practices and even evaluating physical security to gain access. Gain knowledge in the methodologies that hackers actually use to infiltrate networks and devices; i.e., writing virus codes, and reverse engineering, etc. You will learn to perform vulnerability analysis to identify security loopholes in the networks, communication infrastructure, and end systems.

In addition to the updated modules; there is also the launch of:

The STORM, a mobile security toolkit (Mobile platform attack vector, Android vulnerabilities, Mobile security guidelines, and tools).
The CEH practical, which tests the candidate’s practical skills in applying the Ethical Hacking techniques in 20 real-life situations.
Please note that Greycampus is an EC Council Authorized Training Center across North America, and uses official EC Council courseware for training delivery.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Deeper understanding in the application of vulnerability analysis. Learn about emerging attack vectors on cloud, Machine learning. Be adept at securing networks and systems

Deeper understanding in the application of vulnerability analysis. Learn about emerging attack vectors on cloud, Machine learning. Be adept at securing networks and systems

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Networks
  • Hacker
  • Hacking
  • Systems
  • Engineering
  • WHOIS
  • Lookups
  • DNS
  • Countermeasures
  • Footprinting

Course programme

Course Outline

Footprinting, Reconnaissance

Learn footprinting techniques like WHOIS lookups, DNS information and email footprinting, and how to use tools like Maltego and Recon-ng for footprinting and reconnaissance. Also learn about footprinting countermeasures to implement

Scanning Networks

Learn how to scan and check for live systems, open ports, and vulnerabilities using proxies and anonymizers.

Enumeration

Learn the tools and techniques for NetBIOS, SNMP, LDAP, NTP, and SMTP enumeration, and the countermeasures for enumeration.

System Hacking

Learn a stepwise process to hack systems - password cracking, privilege escalation, executing applications, and installing spyware on the target system. Additionally learn about Rootkits, Steganography, and about covering your tracks after a hacking attempt.

Malware Threats

Learn about malware - trojans, viruses and worms - and how to detect and analyze malware. You’ll also learn about countermeasures and anti-malware software that can be used to secure a system.

CEH (V10) - Certified Ethical Hacker Training

Price on request