Catalog > All Topics

Certified Ethical Hacker (CEH)

  • Course Summary
  • Schedule
5 Days
Download Course Outline
$3,495.00
Request a Quote
Credit not applicable
Share
Schedule
Export to CSV
  • No schedule events found for this course.
      • PC
        Private Class
        Privately train a group of your employees at your facility, virtually, or any of our locations.
    Request
  • LCLive Classroom
    Live Classroom
    Learn and interact with your instructor and peers in-person in our classrooms.
  • VCVirtual Classroom
    Virtual Classroom
    Attend any of our instructor-led classes virtually regardless of your physical location.
  • PCPrivate Class
    Private Class
    Privately train a group of your employees at your facility, virtually, or any of our locations.
  • GTRGuaranteed to Run
    Guaranteed to Run
    GTR classes are guaranteed to run as promised and delivered.
Course Summary
Show All

Description

The goal of this course is to help you master an ethical hacking methodology that can be used in penetration testing to lawfully assess the security of a system. This course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker certification exam (312-50) from EC-Council.

EC Council security experts have designed over 140 labs, which mimic real-time scenarios to help you “live” through an attack as if it were real. You’ll also be given access to over 2,200 commonly used hacking tools to immerse you into the hacker world.

 

Objectives

  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS attacks
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing
  • Hacking challenges on steroids
  • Emerging attack vectors
  • Malware reverse engineering
  • Operation technology
  • WPA3

Prerequisites

  • At least two years of IT security experience
  • A strong working knowledge of TCP/IP

Who Should Attend

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Penetration testers
  • Individuals concerned about the integrity of network infrastructure

Outline

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

​Labs

  1. Footprinting and Reconnaissance
  2. Scanning Networks 
  3. Enumberation
  4. Syatem Hacking
  5. Malware Threats
  6. Sniffing
  7. (Export)
  8. Social Engineering
  9. Denial of Service
  10. Syatem Hijacking
  11. Hacking Web Application
  12. SQL Injection
  13. Hacking Wireless Networks
  14. Hacking Mobile Platforms
  15. Evading IDS Firewalls and Honeypots

 

 

 

 

 

POPULAR LINKS
  • Course Catalog
  • Guaranteed to Run
  • Special Offers
  • Services
  • Student Services
  • Solutions
ABOUT
  • Company
  • News
  • Events
  • Contact Us
Skyline ATS
Corporate Headquarters
2148 Bering Drive
San Jose, CA 95131
  • 408-340-9800
  • 408-340-9800
Connect With Us
©2026 Skyline Advanced Technology Service
  • Policies
  • Privacy