Certified Ethical Hacker (CEH) Training

Level: Intermediate
Rating: 4.7/5 4.67/5 Based on 360 Reviews

In this award-winning Certified Ethical Hacker (CEH) training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your course tuition is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

Key Features of this Certified Ethical Hacker Training:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition
  • After-course instructor coaching benefit
  • After-course computing sandbox included

You Will Learn How To:

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyze your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Certifications/Credits:

EC-Council Logo CompTIA CPE 29 Credits

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

ON DEMAND

On Demand + Instructor Coaching

  • On-demand CEH training modules (1-year access)
  • 2 hours of one-on-one after-course instructor coaching
  • Pre-configured EC-Council iLabs (6-month access)
  • Exam voucher included
View Course Details

Standard $1899

Government $1899

ADD TO CART

PRODUCT #2031

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 5-day instructor-led training course
  • Earn 29 NASBA credits (live, in-class training only)
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $3664

Government $3664

RESERVE SEAT

PRODUCT #2031

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

On Demand + Instructor Coaching

Certified Ethical Hacker On-Demand Course Information

Certified Ethical Hacker On-Demand Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analyzing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analyzing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

In Class & Live, Online Training

  • Feb 25 - Mar 1 ( 5 Days)
    9:00 AM - 4:30 PM MST
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Apr 29 - May 3 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • May 13 - 17 ( 5 Days)
    9:00 AM - 4:30 PM MDT
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Jun 3 - 7 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jun 24 - 28 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Jul 22 - 26 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Toronto / Online (AnyWare) Toronto / Online (AnyWare) Reserve Your Seat

  • Aug 12 - 16 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Sep 9 - 13 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

  • Sep 16 - 20 ( 5 Days)
    9:00 AM - 4:30 PM MDT
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Oct 28 - Nov 1 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Nov 18 - 22 ( 5 Days)
    9:00 AM - 4:30 PM MST
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Dec 2 - 6 ( 5 Days)
    9:00 AM - 4:30 PM EST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jan 13 - 17 ( 5 Days)
    9:00 AM - 4:30 PM EST
    Toronto / Online (AnyWare) Toronto / Online (AnyWare) Reserve Your Seat

  • Feb 3 - 7 ( 5 Days)
    9:00 AM - 4:30 PM EST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Certified Ethical Hacker Course Information

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • You can request your voucher from Learning Tree at any time after you complete the course
  • Certification Information

Certified Ethical Hacker Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analyzing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analyzing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

Team Training

Certified Ethical Hacker Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Denver / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Denver / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Toronto / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Ottawa / Online (AnyWare)
Denver / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Denver / Online (AnyWare)
New York / Online (AnyWare)
Toronto / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français