Ethical Hacking and Countermeasures 9 Course Outline
This is the world's most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.
Real Life Scenario
Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor.
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.
This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Who Needs to Attend
Individuals concerned about the integrity of the network infrastructure
At least two years of IT security experience
A strong working knowledge of TCP/IP
Security+ Prep Course (SY0-401)
Certification Exam Vouchers Included (A $500value!)
Our Certified Ethical Hacking (CEH) course comes with a CEH exam voucher ($500 retail value) for an on-line proctored exam.
EC Council has partnered with ProctorU to offer the CEH certification exam on-line. Candidates can take their CEH exam from their own location provided they have a computer equipped with a webcam and microphone plus reliable Internet connectivity. Students schedule their exam time directly with a proctor via the ECC Exam Center (https://www.eccexam.com/).
Certification Programs and Certificate Tracks
This course is part of the following programs or tracks:
CEH - Certified Ethical Hacker
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
5. System Hacking
6. Malware Threats
8. Social Engineering
9. Denial of Service
10. Session Hijacking
11. Hacking Webservers
12. Hacking Web Applications
13. SQL Injection
14. Hacking Wireless Networks
15. Hacking Mobile Platforms
16. Evading IDS, Firewalls, and Honeypots
17. Cloud Computing
Hands-on labs covering 270 attack technologies commonly used by hackers are interspersed throughout this course.
View outline in Word
Attend hands-on, instructor-led Ethical Hacking and Countermeasures 9 training classes at ONLC's more than 300 locations.
Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.
For additional training options, check out our list of CEH Courses and select the one that's right for you.