Certified Ethical Hacker (CEH) Training

Course 2031

  • Duration: 5 days
  • Exam Voucher: Yes
  • Language: English
  • 29 CompTIA CEUs
  • 29 NASBA CPE Credits (live, in-class training only)
  • Level: Intermediate
Get This Course $3,664
  • One-on-one after-course instructor coaching
  • After-course computing sandbox included
  • Self-paced lecture videos
  • Pre-configured EC-Council iLabs
  • Exam Voucher included
  • CyberQ Exam Prep
#70H5

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic real-life scenarios.

CEH Training Delivery Methods

  • In-Person

  • Online

CEH Training Benefits

  • Successfully prepare for the Certified Ethical Hacker (CEH v11) Certification Exam

  • Apply countermeasures to secure your system against threats

  • Test system security and data access using real-world hacking techniques

  • Employ complex tools to identify and analyze your company's risks and weaknesses

  • Find vulnerabilities in a network infrastructure

  • Work with official EC-Council curriculum

  • Gain access to hundreds of exam prep questions

  • CEH exam voucher included in the course tuition

  • Leverage continued support with after-course one-on-one instructor coaching and computing sandbox

CEH Training Outline

Considering the effects of hacking

  • Reviewing the elements of information security
  • Learning the security, functionality, and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code, and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Using Simple Network Management Protocol (SNMP) enumeration

System hacking

  • Applying CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analyzing Trojan activity

Dissecting viruses, worms, and sniffers

  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Learning about targets, intrusion tactics, and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Hacking web applications and wireless networks

  • Cross-Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls, and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

CEH Training On-Demand Bundle

You get access to:

  • On-demand CEH training modules (1-year access)
  • Pre-configured EC-Council iLabs (6-month access)
  • This course prepares you to take the CEH exam via ProctorU
  • Exam voucher is supplied by EC-Council

Whenever you're ready, we'll connect you with one of our SMEs so you can get one-on-one assistance with a practicing expert.

Considering the effects of hacking

  • Reviewing the elements of information security
  • Learning the security, functionality, and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code, and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Using Simple Network Management Protocol (SNMP) enumeration

System hacking

  • Applying CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analyzing Trojan activity

Dissecting viruses, worms, and sniffers

  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Learning about targets, intrusion tactics, and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Hacking web applications and wireless networks

  • Cross-Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls, and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

CEH Unlimited Access Premium Training

This product offers the most complete CEH training available on the market today.

You will receive annual access to:

  • On-demand CEH training modules (1-year access)
  • Pre-configured EC-Council iLabs (6-month access)
  • After-course computing sandbox included with instructor-led events
  • After-course coaching available included with instructor-led events
  • Self-paced lecture videos
  • CyberQ Exam Prep
  • Exam voucher is supplied by EC-Council

You have everything you need to have a successful learning experience and pass the CEH certification exam.

Considering the effects of hacking

  • Reviewing the elements of information security
  • Learning the security, functionality, and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code, and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Using Simple Network Management Protocol (SNMP) enumeration

System hacking

  • Applying CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analyzing Trojan activity

Dissecting viruses, worms, and sniffers

  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Learning about targets, intrusion tactics, and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Hacking web applications and wireless networks

  • Cross-Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls, and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

CEH Training FAQs

To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.

No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.

Yes, and it's EC-Council official content!

Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.

An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.

You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.

CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.

Once payment is received, you will receive details for your Unlimited Access Training Bundle via email. At that time, you may call or email our customer service team for assistance in enrolling in the event date of your choice.

This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

Chat With Us