4 out of 5
4
6 reviews

CERTIFIED ETHICAL HACKER | CEH v11 Certification

The Certified Ethical Hacker (CEH) v11 Certification training is one of the globally recognized cybersecurity courses for professionals worldwide. This CEH Certification course is suitable for professionals who handle IT security aspects of physical, cloud, and hybrid environments over infrastructure. This Certified Ethical Hacking course is also perfect for professionals who want to join the cybersecurity sector or who are interested in clearing their CEH v11 examination.

34 students enrolled

The Certified Ethical Hacker (CEH) v11 Certification training is one of the globally recognized cybersecurity courses for professionals worldwide. This CEH Certification course is suitable for professionals who handle IT security aspects of physical, cloud, and hybrid environments over infrastructure. This Certified Ethical Hacking course is also perfect for professionals who want to join the cybersecurity sector or who are interested in clearing their CEH v11 examination.

Why should you opt for a Certified Ethical Hacking course online?

  • Glassdoor – The average salary of Ethical Hackers in India is Rs. 655k per annum.
  • LinkedIn – The United States offers 4000+ CEH jobs for certified professionals.
  • Indeed – Major companies, like Citibank, Deloitte, Accenture, IBM, Oracle, etc., are mass hiring professionals in Ethical Hacking.
  • Achieve Hollywood best quality visuals out of the box.
  • With complete C++ source code access, you can study.
  • Comes with designer-friendly Blueprint visual scripting.
  • Unreal Engine provides Robust Multiplayer Framework.
  • The built-in Cascade visual effects editor enables particles.
  • Unreal Engine 4’s Material Editor makes use of physically-based.

Features

Live Instructor Training

40 Hours of Live Instructor Training

Assessments

Each class will be followed by a Practice Test to evaluate your learning.

Lifetime Access

You will get lifetime access to class recordings, quizzes, presentations, and installation guides.

24 x 7 Expert Technical Support

We have a 24×7 lifetime online technical support team, via a ticket-based tracking system, to resolve all your technical queries.

Forum

For our learners, we have a community forum that further promotes learning through peer participation and knowledge sharing.

Certification

On successful completion of your online project, you will be certified as an Certified Ethical Hacker.

Introduction to Ethical Hacking

1
Learn the issues, including plaguing the information security world, ethical hacking, information security controls, laws, and standards.

Topic:

  • Information Security Overview 
  • Information Security Threats and Attack Vectors 
  • Penetration Testing Concept 
  • Hacking Concepts 
  • Ethical Hacking Concepts 
  • Information Security Controls 
  • Information Security Laws and Standards 


Footprinting and Reconnaissance

1
To perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.

Topic:

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • DNS Footprinting
  • Network Footprinting
  • Footprinting Tools


Scanning Networks

1
Perform network scanning techniques and scanning countermeasures.

Topic:

  • Network Scanning Concepts
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams


Enumeration

1
Learning about enumeration techniques and enumeration countermeasures.

Topic:

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • Enumeration Countermeasures


Vulnerability Analysis

1
Vulnerability analysis is used to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.

Topic:

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools


System Hacking

1
Learn about System Hacking methodology and cover tracks to discover system and network vulnerabilities.

Topic:

  • System Hacking Concepts
  • Cracking Passwords
  • Executing Applications
  • Penetration Testing


Malware Threats

1
To study the various types of malware (Virus, Worms, Trojan, etc.), malware analysis, system auditing for malware attacks, and countermeasures.

Topic:

  • Malware Concepts
  • Trojan Concepts
  • Malware Analysis
  • Countermeasures


Malware Threats

1
To study the various types of malware (Virus, Worms, Trojan, etc.), malware analysis, system auditing for malware attacks, and countermeasures.

Topic:

  • Malware Concepts
  • Trojan Concepts
  • Malware Analysis
  • Countermeasures


Sniffing

1
Find out about packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.

Topic:

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: Spoofing Attacks


Social Engineering

1
Learning about Social Engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and suggest social engineering countermeasures.

Topic:

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Identity Theft


Denial-of-Service (DoS)

1
Acquire knowledge about DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.

Topic:

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Technique
  • DoS/DDoS Attack Tools
  • Countermeasures


Session Hijacking

1
To learn about session hijacking techniques implemented by hackers and to discover network-level session management, authentication, authorization, cryptographic weakness, and countermeasures.

Topic:

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures


Evading IDS

Firewalls

and Honeypots

1
Find out more about the IDS, Firewall, and Honeypot evasion techniques, evasion tools, and techniques to audit a network perimeter for weakness and countermeasures.

Topic:

  • IDS, Firewall and Honeypot Concepts
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots


Hacking Web Servers

1
Learning how to avoid web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.

Topic:

  • Web Server Concepts
  • Web Server Attacks
  • Patch Management


Hacking Web Applications

1
Grasp the concepts related to web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.

Topic:

  • Web App Concepts
  • Web App Threats
  • Hacking Methodology


SQL Injection

1
Studying SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures to avoid them.

Topic:

  • SQL Injection Concepts
  • Types of SQL Injection
  • Evasion Techniques


Hacking Wireless Networks

1
Study in detail about wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

Topic:

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats


Hacking Mobile Platforms

1
Finding out about mobile platform attack vectors, android vulnerability exploitations, and mobile security guidelines and tools.

Topic:

  • Mobile Platform Attack Vectors
  • Hacking iOS
  • Mobile Spyware


IoT and OT Hacking

1
Learning about countering threats to IoT and OT platforms and learning how to defend IoT and OT devices securely.

Topic:

  • IoT Concepts
  • IoT Attack
  • IoT Hacking Methodology


Penetration Testing

1
Studying various concepts involved with penetration testing security audit, vulnerability assessment, and penetration testing roadmap.

Cloud Computing

1
Acquiring knowledge about Cloud Computing concepts (Container technology, serverless computing), various threats and attacks, and security techniques and tools.

Topic:

  • Cloud Computing Concepts
  • Cloud Computing Attacks
  • Cloud Computing Threats


Cryptography

1
Finding out more about cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptography tools.

Topic:

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools


You get lifetime access to our expert technical support team, who are available 24x7 to resolve any of your queries.
With Procertnow’s CEH Certification, you are given access instantly post-enrollment and this access will be available for a lifetime even after completion of your course.

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


4
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
Get course
30-Day Money-Back Guarantee

Includes

9 hours
Full lifetime access
Access on mobile and TV

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Layer 1
× How can I help you?