The Certified Ethical Hacker (CEH) course offers a comprehensive insight into ethical hacking stages, different attack methods, and ways to prevent them. By learning how hackers operate, you can enhance your ability to establish a secure infrastructure and shield against cyber threats. Understanding system flaws and vulnerabilities through the CEH program equips students to safeguard their organizations and bolster security measures to reduce the chances of a cyber attack.
Contact us to find out how to SAVE extra money on your CEH training.
The Certified Ethical Hacker (CEH) Course Outline
20 Modules designed to help you excel in the basics of Ethical Hacking and get ready to take on the challenge of the CEH certification exam.
Module 1: Introduction to Ethical Hacking | Module 11: Session Highjacking |
Module 2: Foot Printing and Reconnaissance | Module 12: Evading IDS, Firewalls, and Honeypots |
Module 3: Scanning Networks | Module 13: Hacking Web Servers |
Module 4: Enumeration | Module 14: Hacking Web Applications |
Module 5: Vulnerability Analysis | Module 15: SQL Injection |
Module 6: System Hacking | Module 16: Hacking Wireless Networks |
Module 7: Malware Threats | Module 17: Hacking Mobile Platforms |
Module 8: Sniffing | Module 18: IoT and OT Hacking |
Module 9: Social Engineering | Module 19: Cloud Computing |
Module 10: Denial-of-Service | Module 20: Cryptography |