EC-Council CEH – Certified Ethical Hacker v12 Certification Boot Camp

Our Official EC-Council CEH Certification Boot Camp is a comprehensive review of ethical hacking & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CEH exam. Our CEH Boot Camp represents the culmination of hundreds of hours of instructional design, thousands of hours of exam-focused instruction, and tens of thousands of efficiently and effectively skilled, certified students. -Learn Ethical Hacking in a Structured Setting Across 20 Domains -Build Skills With over 220 Challenge-Based, Hands-On Labs with CyberQ™ Labs -Gain Experience With over 500 Unique Attack Techniques -Learn Commercial-Grade Hacking Tools and Techniques -Engage: “Hack” a Real Organization With CEH Elite to Get Experience -Attain the Most Recognized Credential in the Cybersecurity : CEH This is not only a comprehensive training program designed to prepare you for the certification exam, but also the industry’s most robust, in-depth, hands-on lab experience of any cybersecurity program available. C|EH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organizations.

Retail Price: $2,995.00

Next Date: 12/09/2024

Course Days: 5


Enroll in Next Date

Request Custom Course


Who Should Attend

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

 
You Will Be Able to

•Apply countermeasures to secure your system against threats
•Test system security and data access using real-world hacking techniques
•Employ complex tools to identify and analyze your company’s risks and weaknesses
•Find vulnerabilities in a network infrastructure

 
CEH Exam Pass Guarantee

When you decide to take one of our courses, you are placing trust in us. Our Exam Pass Guarantee was designed to help you reach your goal to pass the certification exam. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.

Our Official CEH training offers unlimited exam retakes, so your success is guaranteed!

 
Official EC-Council Elite Course Bundle

Our Certified Ethical Hacker boot camp provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through EC-Council’s learning framework. This CEH bootcamp inculdes:

  • CEH Digital Courseware Kit (includes e-book 24 months access)
  • CEH CyberQ Lab (6 months unlimited access)
  • Next version e-book
  • CEH Re-Exam Vouchers
  • Updated Ethical Hacking Videos x 10 (1 year access)
  • CEH Engage on CyberQ (1 year access)
  • Global CEH Challenge on CyberQ (1 year access)
  • CEH Mock Exam Prep (1 year access)
  • CEH Practical Exam Voucher (valid for 1 year)

OUTLINE

Introduction to Ethical Hacking

  • Information security overview
  • Information security threats and attack vectors
  • Hacking concepts
  • Ethical hacking concepts
  • Information Security Controls
  • Penetration testing concepts
  • Information security laws and standards

Footprinting and Reconnaissance

  • Footprinting concepts
  • Footprinting through search engines
  • Footprinting through web services
  • Footprinting through social networking sites
  • Website footprinting
  • Email footprinting
  • Competitive Intelligence
  • WHOIS Footprinting
  • DNS footprinting
  • Network footprinting
  • Footprinting through social engineering
  • Footprinting tools
  • Countermeasures
  • Footprinting pen testing

Scanning Networks

  • Network scanning concepts
  • Scanning tools
  • Scanning techniques
  • Scanning beyond IDS and firewall
  • Banner grabbing
  • Draw network diagrams
  • Scanning pen test

Enumeration

  • Enumeration concepts
  • NetBIOS enumeration
  • SNMP enumeration
  • LDAP enumeration
  • NTP enumeration SMTP and DNS enumeration
  • Other enumeration techniques
  • Enumeration countermeasures
  • Enumeration pen testing

Vulnerability Analysis

  • Vulnerability assessment concepts
  • Vulnerability assessment solutions
  • Vulnerability scoring systems
  • Vulnerability assessment tools
  • Vulnerability assessment reports

System Hacking

  • System hacking concepts
  • Cracking passwords
  • Escalating privileges
  • Executing applications
  • Hiding files
  • Covering tracks
  • Penetration testing

Malware Threats

  • Malware concepts
  • Trojan concepts
  • Virus and worm concepts
  • Malware analysis
  • Countermeasures
  • Anti-malware software
  • Malware penetration testing

Sniffing

  • Sniffing concepts
  • Sniffing techniques: MAC attacks
  • Sniffing techniques: DHCP attacks
  • Sniffing techniques: ARP Poisoning
  • Sniffing techniques: Spoofing attacks
  • Sniffing techniques: DNS poisoning
  • Sniffing tools
  • Countermeasures
  • Sniffing detection techniques
  • Sniffing pen testing

Social Engineering

  • Social engineering concepts
  • Social engineering techniques
  • Insider threats
  • Impersonation on social networking sites
  • Identity theft
  • Countermeasures
  • Social engineering pen testing

Denial of Service

  • DoS/DDos Concepts
  • DoS/DDoS attack techniques
  • Botnets
  • DDoS case study
  • DoS/DDoS attack tools
  • Countermeasures
  • DoS/DDos protection tools
  • DoS/DDoS penetration testing

Session Hijacking

  • Session hijacking concepts
  • Application level session hijacking
  • Network level session hijacking
  • Session hijacking tools
  • Countermeasures
  • Penetration testing

Evading IDS, Firewalls, and Honeypots

  • IDS, firewall and honeypot concepts
  • IDS, firewall and honeypot solutions
  • Evading IDS
  • Evading firewalls
  • IDS/firewall evading tools
  • Detecting honeypots
  • IDS/Firewall evasion countermeasures
  • Penetration testing

Hacking Webservers

  • Web server operations
  • Web server attacks
  • Web server  attack methodology
  • Web server attack tools
  • Countermeasures
  • Patch management
  • Web server security tools
  • Web server pen testing

Hacking Web Applications

  • Web app concepts
  • Web app threats
  • Hacking methodology
  • Web app hacking tools
  • Countermeasures
  • Web app security testing tools
  • Web app pen testing

SQL Injection

  • SQL injection concepts
  • Types of SQL injection
  • SQL injection methodology
  • SQL injection tools
  • Evasion techniques
  • Countermeasures

Hacking Wireless Networks

  • Wireless concepts
  • Wireless encryption
  • Wireless threats
  • Wireless hacking methodology
  • Wireless hacking tools
  • Bluetooth hacking
  • Countermeasures
  • Wireless security tools
  • Wireless pen testing

Hacking Mobile Platforms

  • Mobile platform attack vectors
  • Hacking Android OS
  • Hakcing iOS
  • Mobile spyware
  • Mobile device management
  • Mobile security guidelines and tools
  • Mobile pen testing

IoT and OT Hacking

  • IoT and OT concepts
  • IoT and OT attacks
  • IoT  and OT hacking methodology
  • IoT and OT hacking tools
  • Countermeasures
  • IoT  and OT pen testing

Cloud Computing

  • Cloud computing concepts
  • Cloud computing threats
  • Cloud computing attacks
  • Cloud security
  • Cloud security tools
  • Cloud penetration testing

Cryptography

  • Cryptography concepts
  • Encryption algorithms
  • Cryptography tools
  • Public key infrastructure (PKI)
  • Email encryption
  • Disk encryption
  • Cryptanalysis Countermeasures
 
CEH Training Camp Exam Review
  • CEH Exam Structure
  • Exam Registration Process
  • Time Management
  • Topics and Concepts
  • CEH Certification Question Structure
  • Vendor Interpretation Techniques
Course Dates Course Times (EST) Delivery Mode GTR
12/9/2024 - 12/13/2024 11:00 AM - 7:00 PM Virtual Enroll
1/13/2025 - 1/17/2025 9:00 AM - 5:00 PM Virtual Enroll