Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Certified Ethical Hacker v9

Prepare for the CEH certification while learning the latest ethical hacking techniques.

GK# 3617

Course Overview

TOP

If you're concerned about the integrity of your network's infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network's defenses. You'll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you'll also learn how intruders operate and the steps to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

 

This course includes one exam voucher for the Certified Ethical Hacker (CEH) v9 exam.

What You'll Learn

TOP
  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing

Outline

TOP
Viewing outline for:

Classroom Live Outline

1. Introduction to Ethical Hacking

2. Footprinting and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Malware Threats

7. Sniffing

8. Social Engineering

9. Denial of Service

10. Session Hijacking

11. Hacking Webservers

12. Hacking Web Applications

13. SQL Injection

14. Hacking Wireless Networks

15. Hacking Mobile Platforms

16. Evading IDS, Firewalls, and Honeypots

17. Cloud Computing

18. Cryptography

Labs

TOP
Viewing labs for:

Classroom Live Labs

1. Footprinting and Reconnaissance
2. Scanning Networks
3. Enumberation
4. System Hacking
5. Malware Threats
6. Sniffing
7. (Export)
8. Social Engineering
9. Denial of Service
10. System Hijacking
11. Hacking Web Application
12. SQL Injection
13. Hacking Wireless Networks
14. Hacking Mobile Platforms
15. Evading IDS, Firewalls, and Honeypots

Prerequisites

TOP
  • At least two years of IT security experience
  • A strong working knowledge of TCP/IP
  • Security+ Prep Course is highly recommended

Who Should Attend

TOP
  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 5 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

Request this course in a different delivery format.
Enroll