4 out of 5
4
6 reviews

CERTIFIED ETHICAL HACKER | CEH v11 Certification

Live Instructor Training
40 Hours of Live Instructor Training

Assessments
Each class will be followed by a Practice Test to evaluate your learning.

Lifetime Access
You will get lifetime access to class recordings, quizzes, presentations, and installation guides.

24 x 7 Expert Technical Support
We have a 24×7 lifetime online technical support team, via a ticket-based tracking system, to resolve all your technical queries.

Forum
For our learners, we have a community forum that further promotes learning through peer participation and knowledge sharing.

Certification
On successful completion of your online project, you will be certified as an Certified Ethical Hacker.

34 students enrolled

The Certified Ethical Hacker (CEH) v11 Certification training is one of the globally recognized cybersecurity courses for professionals worldwide. This CEH Certification course is suitable for professionals who handle IT security aspects of physical, cloud, and hybrid environments over infrastructure. This Certified Ethical Hacking course is also perfect for professionals who want to join the cybersecurity sector or who are interested in clearing their CEH v11 examination.

Why should you opt for a Certified Ethical Hacking course online?

  • Glassdoor – The average salary of Ethical Hackers in India is Rs. 655k per annum.
  • LinkedIn – The United States offers 4000+ CEH jobs for certified professionals.
  • Indeed – Major companies, like Citibank, Deloitte, Accenture, IBM, Oracle, etc., are mass hiring professionals in Ethical Hacking.

Features

Live Instructor Training

40 Hours of Live Instructor Training

Assessments

Each class will be followed by a Practice Test to evaluate your learning.

Lifetime Access

You will get lifetime access to class recordings, quizzes, presentations, and installation guides.

24 x 7 Expert Technical Support

We have a 24×7 lifetime online technical support team, via a ticket-based tracking system, to resolve all your technical queries.

Forum

For our learners, we have a community forum that further promotes learning through peer participation and knowledge sharing.

Certification

On successful completion of your online project, you will be certified as an Certified Ethical Hacker.

Course Curriculum

1
Introduction to Ethical Hacking

Learning Objective – Learn the issues, including plaguing the information security world, ethical hacking, information security controls, laws, and standards.

Topic:

  • Information Security Overview 
  • Information Security Threats and Attack Vectors 
  • Penetration Testing Concept 
  • Hacking Concepts 
  • Ethical Hacking Concepts 
  • Information Security Controls 
  • Information Security Laws and Standards 


2
Footprinting and Reconnaissance

Learning Objective – To perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.

Topic:

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • DNS Footprinting
  • Network Footprinting
  • Footprinting Tools


3
Scanning Networks

Learning Objective – Perform network scanning techniques and scanning countermeasures.

Topic:

  • Network Scanning Concepts
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams


4
Enumeration

Learning Objective – Learning about enumeration techniques and enumeration countermeasures.

Topic:

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • Enumeration Countermeasures


5
Vulnerability Analysis

Learning Objective – Vulnerability analysis is used to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.

Topic:

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools


6
System Hacking

Learning Objective – Learn about System Hacking methodology and cover tracks to discover system and network vulnerabilities.

Topic:

  • System Hacking Concepts
  • Cracking Passwords
  • Executing Applications
  • Penetration Testing


7
Malware Threats

Learning Objective – To study the various types of malware (Virus, Worms, Trojan, etc.), malware analysis, system auditing for malware attacks, and countermeasures.

Topic:

  • Malware Concepts
  • Trojan Concepts
  • Malware Analysis
  • Countermeasures


8
Sniffing

Learning Objective – Find out about packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.

Topic:

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: Spoofing Attacks


9
Social Engineering

Learning Objective – Learning about Social Engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and suggest social engineering countermeasures.

Topic:

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Identity Theft


10
Denial-of-Service (DoS)

Learning Objective – Acquire knowledge about DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.

Topic:

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Technique
  • DoS/DDoS Attack Tools
  • Countermeasures


11
Session Hijacking

Learning Objective – To learn about session hijacking techniques implemented by hackers and to discover network-level session management, authentication, authorization, cryptographic weakness, and countermeasures.

Topic:

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures


12
Evading IDS, Firewalls, and Honeypots
13
Hacking Web Servers

Learning Objective – Learning how to avoid web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.

Topic:

  • Web Server Concepts
  • Web Server Attacks
  • Patch Management


14
Hacking Wireless Networks

Learning Objective –Study in detail about wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

Topic:

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats


15
IoT and OT Hacking

Learning Objective – Learning about countering threats to IoT and OT platforms and learning how to defend IoT and OT devices securely.

Topic:

  • IoT Concepts
  • IoT Attack
  • IoT Hacking Methodology


16
Cloud Computing

Learning Objective – Acquiring knowledge about Cloud Computing concepts (Container technology, serverless computing), various threats and attacks, and security techniques and tools.

Topic:

  • Cloud Computing Concepts
  • Cloud Computing Attacks
  • Cloud Computing Threats


17
Cryptography

Learning Objective – Finding out more about cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptography tools.

Topic:

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools


You get lifetime access to our expert technical support team, who are available 24x7 to resolve any of your queries.
With Procertnow’s CEH Certification, you are given access instantly post-enrollment and this access will be available for a lifetime even after completion of your course.

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


4
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
Get course
30-Day Money-Back Guarantee

Includes

9 hours
Full lifetime access
Access on mobile and TV

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Layer 1
× How can I help you?