CEH Training

parallax background

A few words about

CEH v11 Course

Mentor: Arefin Sajib, 9 years of experience


C|EH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals. Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

Who is this for?


The Certified Ethical Hacking training course will significantly benefit Ethical Hackers, Information Security Analyst/ Administrator, Information Assurance(IA) Security Officers, information Security Managers/ Specialist, Information System Security Engineer/ Manager, Information Security Professionals/ Officers, Information Security & IT auditors, Risk / Threat/ Vulnerability Analyst, System Administrators, Network Administrators and Engineers and anyone who is concerned about the integrity of the network infrastructure.

 

Main features:


40 hours Online Course

Live Lab Session

Software & Course Materials

Questions Bank for Exam

What is New in CEH Version 11 Course


The newly updated CEH V11 course now includes a library of the latest tools required by security practitioners and pen testers across the world.

It is mapped rigorously to important specialty areas under the NIST/ NICE framework’s protect and defend (PR) job role category. CEH has updated cloud and IoT modules to incorporate CSPs, Container Technologies(e.g. Docker, Kubernetes), as well as cloud computing threats and a number of IOT hacking tools such as shikra, Bus pirate, Facedancer21 and more.

The program has new operating Systems including windows Server-2019, Windows Server-2016, and windows 10 configured with domain controller, firewalls, and vulnerable web applications for practicing and improving hacking skills. Includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware and more.

More than 50% of the CEH V11 course is dedicated to practical skills.

Course Topics of CEH V11

40 Hours Training Program
Module Course Topic
#1 Introduction to Ethical Hacking
#2 Footprinting and Reconnaissance
#3 Scanning Networks
#4 Enumeration
#5 Vulnerability Analysis
#6 System Hacking
#7 Malware Threats
#8 Sniffing
#9 Social Engineering
#10 Denial-of-Service
#11 Session Hijacking
#12 Evading IDS, Firewalls, and Honeypots
#13 Hacking Web Servers
#14 Hacking Web Applications
#15 SQL Injection
#16 Hacking Wireless Networks
#17 Hacking Mobile Platforms
#18 IoT Hacking
#19 Cloud Computing
#20 Cryptography
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.
This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Registration