Skip to content

Certified Ethical Hacker V10

Classroom exam prep course


Training Deals

Summary

Price
Enquire to get more info on pricing
Finance options

Online

PO Booking

Telephone

E-Commerce

Study method
Classroom
Duration
5 days · Full-time
Certification
Certified Ethical Hacker (CEH)
Professional certification What's this?
Additional info
  • Exam(s) / assessment(s) not included in price, and must be purchased separately
  • Tutor is available to students

Location & dates

Location
Address
Union Street
Ardwick
MANCHESTER
Lancashire
M124JD
United Kingdom
Address
Thomas More Street
LONDON
London
E1W1YZ
United Kingdom

Overview

Module 1: Introduction to Ethical Hacking

Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds

  • Information Security Overview
  • Case Studies - eBay Data Breach & Google Play Hack
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Motives, Goals and Objectives of IS Attacks
  • Information Security Controls
  • Physical Security
  • Incident Management
  • What is Vulnerability Assessment?
  • Penetration Testing
  • Information Security Laws and Standards

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • What is Footprinting?
  • Footprinting Methodology
  • Collect Location Information
  • Detemrining the Oepratinig System
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Module 3 : Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology
  • TCP Communication Flags
  • Creating Custom Packet Using TCP Flags

Module 4: Enumeration

  • Enumeration Concepts
  • What is Enumeration?
  • NetBIOS Enumeration
  • SNMP Enumeration
  • SNMP Enumeration Tools
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Module 5: System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Module 6: Malware Threats

  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

Module 7: Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARPPoisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Tool: Wireshark
  • Follow TCP Stream in Wireshark
  • Display Filters in Wireshark
  • Additional Wireshark Filters
  • Packet Sniffing Tool: Capsa Network Analyzer
  • Network Packet Analyzer
  • Counter measures
  • Sniffing Detection
  • Sniffing Pen Testing

Module 8: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

Module 9: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

Module 10: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Module 11: Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Module 12: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing
  • Web Application Pen Testing Framework

Module 13: SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

Module 14: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

Module 15: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools

Certification

Certified Ethical Hacker (CEH)

Awarded by EC-Council

Course media

Description

As the world's largest cyber-security training provider, our proven interactive training methods ensure that your business's systems are secure, responsive, and impenetrable.

Our market-leading EC-Council accredited course includes interactive lab testing environments and hands-on system deployments to fully equip skilled professionals to instinctively diagnose and overcome system weaknesses.

System hacks are becoming more and more frequent - hence the requirement for businesses to transform their security platforms has never been more paramount. This detailed, meticulous, and world-leading course educates Certified Ethical Hackers on how to enhance their structural capability to protect against malicious intrusions. Upon the completion of this course, professionals will be fully prepared to adapt vulnerable and weak systems into digital-forensic market leaders.

This Certified Ethical Hacker v10 course transmits the most up-to-date system protection information. CEH v10 is the updated version of CEH v9, providing delegates with the most current and necessary material that allows them to secure against system intrusions and costly breaches. Individuals will be launched into the world of hacking, by applying mechanisms and methods used by illegal hackers for the enhancement of security.

CEH v10 will teach delegates about the different types of hacking, and how to implement ethical hacking techniques to prohibit the assaults of illegal hackers via unauthorised system infrastructures. Delegates will learn how to scan, test, hack, and defend their security systems from infiltration. In addition, individuals will learn about the five domains of ethical hacking, which act as a basis for their activities.

Adopting the mentality of an illegal hacker is valuable in identifying weaknesses within security systems and becoming aware of the areas illegal hackers may target. Certified Ethical Hacker v10 is taught within an interactive environment, to provide individuals with essential practical skills to improve security and prevent intrusions.

Who is this course for?

Certified Ethical Hacker v10 is designed for:

  • Security Officers
  • Security Professionals
  • Auditors, Site Administrators
  • Professionals involved in network infrastructure stability

Requirements

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of:

  • Network Security Administration,
  • MCSE (Microsoft Certified Systems Engineer)
  • CCNA (Cisco Certified Network Associate)

Due to the intensity of the Certified Ethical Hacker v10 training course, delegates may need to engage in self-study each evening to ensure they are comfortable with the knowledge they acquire in the day.

Questions and answers

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.