Ethical Hacking Course (CEH v10) Training & Certification

Overview

TOP

The Ethical Hacking Course has been the most-pursued program in IT to this date. This official, innovative, most demanding course imparts you the best skills and knowledge required in information security. The course curriculum is designed in such a way that it would effectively trains you in an ethical hacking and defending the system by detecting the vulnerabilities, potential threats and security breaches. Just get trained in a lawful and legitimate, systematic ethical hacking process becoming a skilled certified ethical hacker CEH).

Join the CEH v10 certification training at SSDN Technologies, a leading CEH training institute in Gurgaon and an EC-Council partner, to give a meaning to your career. Become a Certi­fied Ethical Hacker and make the stable footprints in the IT industry.

What Will You Learn in Ethical Hacking Course

TOP

Successful completion Ethical Hacking course will increase your competency and lets you learn the following – 

  • Various key issues that hampers management process, information security and penetration testing
  • Different types of footprinting and the related tools, and countermeasures
  • Network scanning techniques, System hacking methodology, Trojans, working of viruses and their analysis, Packeting techniques, Social Engineering techniques, and identify theft
  • Session hijacking techniques, DoS/DDoS attack techniques, tools and countermeasures
  • Webserver attacks, their methodology, and countermeasures
    SQL injection attacks and the detection tools
  • Firewall, IDS, and honeypot evasion techniques, tools, and countermeasures
  • Wireless Encryption, hacking methodology, and tools
  • Various security vulnerabilities in mobile platforms
  • Various cloud computing concepts, threats, attacks, and countermeasures
  • Cryptography ciphers, Public Key Infrastructure (PKI) and cryptanalysis tools

  
  

Module 01: Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts 
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards

Module 02: Foot printing and Reconnaissance

  • Foot printing Concepts
  • Foot printing through Search Engines
  • Foot printing through Web Services
  • Foot printing through Social Networking Sites
  • Website Foot printing
  • Email Foot printing
  • Competitive Intelligence
  • Who is Foot printing
  • DNS Foot printing
  • Network Foot printing
  • Foot printing through Social Engineering
  • Foot printing Tools
  • Countermeasures
  • Foot printing Pen Testing

Module 03: Scanning Networks

  • Network Scanning Concepts

  • Scanning Tools
  • Scanning Techniques
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing

Module 04: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures

Module 05: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

Module 06: System Hacking

  • System Hacking Concepts
  • Cracking Passwords
  • Executing Applications
  • Hiding Files
  • Penetration Testing

Module 07: Malware Threats

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing

Module 08: Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Module 09: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Countermeasures

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Countermeasures
  • Penetration Testing

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading Firewalls 
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Patch Management
  • Web Server Security Tools
  • Web Server Pen Testing

Module 14: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing

Module 15: SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • Evasion Techniques
  • Countermeasures

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking iOS
  • Mobile Spyware 
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Module 18: IoT Hacking

  • IoT Concepts
  • IoT Attacks
  • IoT Pen Testing

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

Module 20: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

What will you get

TOP

  • A certificate of successful completion of the course from EC-Council
  • Training from highly experienced trainers
  • EC-Council Official Course content

Upcoming Batches

TOP

11 Mar, 2019

Classroom

Monday, Normal

12:00 PM IST, 02:00 PM IST

start in 20 day(s)

Add to cart

16 Mar, 2019

Classroom

Saturday, Normal

12:00 PM IST, 02:00 PM IST

start in 25 day(s)

Add to cart

25 Mar, 2019

29 Mar, 2019

Classroom

Monday, Fast

start in 34 day(s)

Add to cart

Mode of Training

TOP

Instructor Led Trainingab

Classroom  

  • Group Training Group Training
  • 1-on-1 training at Additional Cost 1-on-1 training at Additional Cost
  • Instructor-led live interactive Training Instructor-led live interactive Training
  • Intensive Hands-on Exposure Intensive Hands-on Exposure
  • Lab Access Lab Access
  • Course Completion Certificate Course Completion Certificate
  • Courseware Courseware
  • Exam Voucher Exam Voucher
Online Training

Virtual Training  

  • Group Training Group Training
  • 1-on-1 training at Additional Cost 1-on-1 training at Additional Cost
  • Instructor-led live interactive Training Instructor-led live interactive Training
  • Intensive Hands-on Exposure Intensive Hands-on Exposure
  • Lab Access Lab Access
  • Course Completion Certificate Course Completion Certificate
  • Courseware Courseware
  • Exam Voucher Exam Voucher
Boot camp

Boot Camp  

  • Group Training Group Training
  • 1-on-1 training at Additional Cost 1-on-1 training at Additional Cost
  • Instructor-led live interactive Training Instructor-led live interactive Training
  • Intensive Hands-on Exposure Intensive Hands-on Exposure
  • Lab Access Lab Access
  • Course Completion Certificate Course Completion Certificate
  • Courseware Courseware

Training on Demand  

  • Group Training Group Training
  • 1-on-1 training at Additional Cost 1-on-1 training at Additional Cost
  • Instructor-led live interactive Training Instructor-led live interactive Training
  • Intensive Hands-on Exposure Intensive Hands-on Exposure
  • Lab Access Lab Access
  • Course Completion Certificate Course Completion Certificate
  • Courseware Courseware
  • Exam Voucher Exam Voucher

Pre-requisite

TOP

  • There are no such specific requirements for the course, but it is recommended that the participants should be familiar with network environment.

Target Audience

TOP

  • The course is suitable for security professionals, site administrators, security officers, auditors,
  • In general, anyone who is concerned about the integrity of the network infrastructure will find the course best-suited for them

Why Choose SSDN

TOP

  • Certified Ethical Hacker (CEH) program is a product of EC-Council and SSDN is an authorized training partner of EC-Council
  • Availability of course in various delivery mode
  • A knowledge delivery is critical to the successful completion of the course and SSDN boasts of its highly experienced trainers for the purpose
  • Well-equipped labs at SSDN makes the whole learning environment innovative and motivating
  • The participants to the course get involved in live projects which elevate the overall experience to a practical level
  • At SSDN, the work ethics and values are moulded in such a way that inspires to grow and the participants learn something new valuable apart from the curriculum
  • Standard methodology of training would please and instill confidence in you

Testimonials

TOP

FAQ

TOP

If you are asking about Certified Ethical Hacking course duration, SSDN Technologies delivers three types of training Weekdays - 40hr (2hr per day),  weekend- 40hr (8hr sat & sun), Fast Track - 5 days.

CEH (Certified Ethical Hacker) is one of the best Certification in hacking. After this certification training you have gained hands-on experience with hacking tools. Nowadays CEH Certified professionals are highly demanded in the cyber - security industry.

Feedback

TOP

5
18 ratings
5 Star
83%
4 Star
17%
3 Star
0%
2 Star
0%
1 Star
0%
Leave Comments
Your email will not be published. Required field are marked*

 

Enquiry Form