Training & Certifications

The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH is the first part of a 3-part EC-Council Information Security Track which helps you master hacking technologies. As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies, or pieces of equipment.

This program was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. This program will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.

By the end of the program, participants will be able to:

  • Learn the key issues plaguing the information security world, incident management processes, and penetration testing;
  • Know the footprinting, footprinting tools, Network scanning techniques and enumeration techniques countermeasures;
  • Explain system hacking methodology, steganography, steganalysis attacks, and the processes involved in covering tracks;
  • Understand Trojans, Trojan analysis, and Trojan countermeasures and working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures;
  • Use Packet sniffing techniques and how to defend against sniffing;
  • Apply social engineering techniques, identify theft, and social engineering countermeasures;
  • Identify DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures and apply session hijacking techniques and countermeasures;
  • Apply webserver attacks, attack methodology, and countermeasures; web application attacks, web application hacking methodology, and countermeasures; SQL injection attacks and injection detection tools;
  • Know wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools;
  • Understand mobile platform attack vectors, android vulnerabilities, mobile security guidelines, and tools; Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures;
  • Explain the cloud computing concepts, threats, attacks, and security techniques and tools; Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools;
  • Apply penetration testing, security audit, vulnerability assessment, and the penetration testing roadmap; Vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems; and
  • Familiarize on threats to IoT platforms and how to defend IoT devices

This program will significantly bene¬fit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.

This program is a 5-day intensive training class.

The Certi¬fied Ethical Hacker exam 312-50 is assessed to get the certification. Participants will have to complete the exam consisting of 125 questions in 4 hours. The minimum score to get the certification is 70%.

Participants who have successfully passed the exam will be given CEH certification from EC-Council.

Scroll to Top