About This Course
Learn advanced processes in this (CEH)Certified Ethical Hacking course. In this online ethical hacking certification training, you will master advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers.
Ethical Hacking Course Overview
Intelligence Gateway’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. This ethical hacking course is aligned with the latest CEH v11 by EC-Council and will adequately prepare you to increase your blue team skills.
This ethical hacking certification verifies the skills required to thrive in the information security domain. Many IT departments have made CEH compulsory for security-related posts. CEH certified ethical hacker professionals earn 44-percent higher salaries than non-certified professionals.
Ethical Hacking Course Curriculum
This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.
There are no prerequisites to take up this ethical hacking certification training course.
Module 01- Introduction to Ethical Hacking
Lesson 01 – Information Security Overview22:30Preview
Lesson 02 – Information Security Threats and Attack Vectors01:56Preview
Lesson 06 – Penetration Testing Concepts
Lesson 03 – Hacking Concepts01:29Preview
Lesson 04 – Ethical Hacking Concepts
Lesson 05 – Information Security Controls
Lesson 07 – Information Security Laws and Standards
Module 02- Footprinting and Reconnaissance
Lesson 01 – Footprinting Concepts01:04Preview
Lesson 02 – Footprinting through Search Engines18:51Preview
Lesson 03 – Footprinting through Web Services08:37
Lesson 04 – Footprinting through Social Networking Sites
Lesson 05 – Website Footprinting08:21
Lesson 06- Email Footprinting37:01
Lesson 07- Competitive Intelligence00:50
Lesson 08- Whois Footprinting42:37Preview
Lesson 09- DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11- Footprinting through Social Engineering09:17
Lesson 12- Footprinting Tools
Lesson 13- Countermeasures00:57
Lesson 14- Footprinting Pen Testing
Module 03- Scanning Networks
Lesson 01 – Network Scanning Concepts
Lesson 02 – Scanning Tools
Lesson 03- Scanning Techniques
Lesson 04- Scanning Beyond IDS and Firewall
Lesson 05- Banner Grabbing06:25Preview
Lesson 06- Draw Network Diagrams
Lesson 07- Scanning Pen Testing
Module 04- Enumeration
Lesson 01 – Enumeration Concepts
Lesson 02 – NetBIOS Enumeration14:40Preview
Lesson 03 – SNMP Enumeration06:20Preview
Lesson 04 – LDAP Enumeration05:45Preview
Lesson 05 – NTP Enumeration03:59
Lesson 06 – SMTP Enumeration and DNS Enumeration17:21Preview
Lesson 07 – Other Enumeration Techniques
Lesson 08 – Enumeration Countermeasures
Lesson 09 – Enumeration Pen Testing
Module 05- Vulnerability Analysis
Lesson 01- Vulnerability Assessment Concepts
Lesson 02- Vulnerability Assessment Solutions
Lesson 03- Vulnerability Scoring Systems
Lesson 04- Vulnerability Assessment Tools
Lesson 05- Vulnerability Assessment Reports
Module 06- System Hacking
Lesson 01- System Hacking Concepts
Lesson 02- Cracking Passwords
Lesson 03- Escalating Privileges
Lesson 04- Executing Applications
Lesson 05- Hiding Files
Lesson 06- Covering Tracks
Lesson 07- Penetration Testing
Module 07- Malware Threats
Lesson 01- Malware Concepts
Lesson 02- Trojan Concepts
Lesson 03- Virus and Worm Concepts
Lesson 04- Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware Software
Lesson 07- Malware Penetration Testing
Module 08- Sniffing
Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing
Module 09- Social Engineering
Lesson 01 – Social Engineering Concepts
Lesson 02 – Social Engineering Techniques
Lesson 04 – Impersonation on Social Networking Sites
Lesson 05 – Identity Theft
Lesson 06 – Countermeasures
Lesson 07 – Social Engineering Penetration Testing
Lesson 03- Insider Threats
Module 10- Denial-of-Service
Lesson 01 – DoS/DDoS Concepts
Lesson 02 – DoS/DDoS Attack Techniques
Lesson 03 – Botnets
Lesson 04 – DDoS Case Study
Lesson 05 – DoS/DDoS Attack Tools
Lesson 06 – Countermeasures
Lesson 07 – DoS/DDoS Protection Tools
Lesson 08 – DoS/DDoS Attack Penetration Testing
Module 11- Session Hijacking
Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing
Module 12 – Evading IDS, Firewalls, and Honeypots
Lesson 01- IDS, Firewall and Honeypot Concepts
Lesson 02- IDS, Firewall and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots
Lesson 07- IDS/Firewall Evasion Countermeasures
Lesson 08- Penetration Testing
Module 13- Hacking Web Servers
Lesson 01- Web Server Concepts
Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing
Module 14- Hacking Web Applications
Lesson 01 – Web App Concepts
Lesson 02 – Web App Threats
Lesson 03 – Hacking Methodology
Lesson 04 – Web Application Hacking Tools
Lesson 05 – Countermeasures
Lesson 06 – Web App Security Testing Tools
Lesson 07 – Web App Pen Testing
Module 15- SQL Injection
Lesson 01 – SQL Injection Concepts
Lesson 02 – Types of SQL Injection
Lesson 03 – SQL Injection Methodology
Lesson 04 – SQL Injection Tools
Lesson 05 – Evasion Techniques
Lesson 06 – Countermeasures
Module 16- Hacking Wireless Networks
Lesson 01 – Wireless Concepts
Lesson 02 – Wireless Encryption
Lesson 03 – Wireless Threats
Lesson 04 – Wireless Hacking Methodology
Lesson 05 – Wireless Hacking Tools
Lesson 06 – Bluetooth Hacking
Lesson 07 – Countermeasures
Lesson 08 – Wireless Security Tools
Lesson 09 – Wi-Fi Pen Testing
Module 17- Hacking Mobile Platforms
Lesson 01- Mobile Platform Attack Vectors
Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools
Lesson 07- Mobile Pen Testing
Module 18- IoT Hacking
Lesson 01- IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing
Module 19- Cloud Computing
Lesson 01 – Cloud Computing Concepts
Lesson 02 – Cloud Computing Threats
Lesson 03 – Cloud Computing Attacks
Lesson 04 – Cloud Security
Lesson 05 – Cloud Security Tools
Lesson 06 – Cloud Penetration Testing
Module 20- Cryptography
Lesson 01- Cryptography Concepts
Lesson 02- Encryption Algorithms
Lesson 03- Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)
Lesson 05- Email Encryption
Lesson 06- Disk Encryption
Lesson 07- Cryptanalysis
Lesson 08- Countermeasures
Ethical Hacking Training FAQs
Is CEH a good certification?
To be precise, yes. If you are interested in having a career in cybersecurity or want to become an ethical hacker, CEH certification is the best way to move forward. Issued by the EC-Council, the CEH certification is a testament to the fact that you are well-versed with all the nuances of penetration testing and ethical hacking.
How are the Labs conducted?
Labs are conducted on EC Council-designed iLabs. The access period is for six months.
Will CEH get me a job?
Yes, a certified CEH professional has a greater chance of getting a good job when compared to his/her non-certified counterpart. In fact, a CEH certification can basically provide you a stepping stone into the cybersecurity domain to a wide range of top-tier positions in various industries and organizations that require ethical hacking skills.
How can an online ethical hacking training help me learn about ethical hacking?
Online ethical hacking training is essential to gain valuable insights into the major concepts of ethical hacking and gives you an edge over non-certified individuals. With the help of Intelligence Gateway’s ethical hacking course, you will gain proficiency in penetrating network systems to protect against hacking. This ethical hacking course is aligned to the latest CEH v11 by EC-Council. It equips you with skills like Trojans, backdoors, and countermeasures; IDS firewalls and honeypots, advanced hacking concepts, network packet analysis, mobile and web technologies, and advanced log management. Additionally, the course provides you with 6-months of free access to CEH v11 iLabs, allowing you to practice your ethical hacking skills.
What tools do I need to attend the training sessions?
The tools you’ll need to attend the Ethical Hacking Course are:
Windows: Windows XP SP3 or higher
Mac: OSX 10.6 or higher
Internet speed: Preferably 512 Kbps or higher
Headset, speakers and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.
Is it legal to learn ethical hacking?
Yes, it’s legal to learn ethical hacking if you are not using your skills for the wrong purpose and doing it with the permission of the owner of the system or network. Learning ethical hacking will help you test the security vulnerabilities in a system and help organizations protect their data better. A few companies hire ethical hackers separately to safeguard their data, but ethical hackers work independently as security consultants too.
Which companies hire ethical hackers?
Here are some of the companies hiring Ethical Hackers:
I am not able to access the online course. Who can help me?
Contact us using the form on the right side of any page on the Intelligence Gateway website, select the Live Chat link or contact Help & Support.
How do I become a CEH certified professional?
To become a certified ethical hacker, you’ll want to follow these steps:
Register for the Intelligence Gateway CEH training
Complete the online classroom training program
Practice your techniques on the EC-Council designed ILabs platform
Take the ethical hacking certification exam online
Once you complete the course work and pass the exam, you will become a certified ethical hacking professional.
How long is the CEH certification valid for?
The CEH certification is valid for three years. You must earn 120 ECE credits to maintain the certification.
How much time will I have to complete the CEH exam?
The exam duration is four hours.
Am I required to sign any agreement prior to the exam?
Yes, EC-Council has developed a number of policies to support the goals of the EC-Council certification program, including:
1. The non-disclosure agreement (NDA)
2. EC-Council Certification Agreement
3. Security and Integrity Policy.
How long do I need to wait for my EC-Council certificate after I take the exam?
Your digital certificate will be available to download between 7-10 days from the date of certification in your Aspen account.
How much does a Certified Ethical Hacker make?
CEH professionals on an average make $92,000 in the U.S.
What are the differences between CEH v10 and CEH v11?
In the 11th version, CEH has evolved with the latest operating systems, tools, tactics, exploits, and technologies. Some of the crucial updates from CEH v10 include incorporating Parrot OS, enhanced IoT, cloud security and OT modules, modern malware analysis, increased lab time, and more.
Can I take the CEH exam online?
The CEH exam (312-50) is available at the ECC Exam Centre and Pearson VUE testing centers. You can visit https://www.vue.com/eccouncil/ to know more.
What comes after CEH?
Achieving a CEH certification offers you many career benefits. However, you shouldn’t stop upskilling yourself as the world of cybersecurity is quite dynamic. Here are some of the courses you can consider taking after becoming CEH certified:
CISSP Certification Training Course
CISA Certification Training
Cyber Security Expert Master’s Program
Post Graduate Program in Cyber Security
How can I get CEH certification fast?
Aspirants need to have a thorough knowledge of ethical hacking concepts to achieve ethical hacking certification. This ceh course gives you all the theoretical and practical knowledge to quickly prepare you for the CEH exam and pass it in a single try.
How do I start a ethical hacking certification course?
This CEH course first gives you a complete overview of information security, its elements, and the essential terminology. You’ll then start with information security threats and get introduced to ethical hacking.
Is the CEH certification course difficult?
The trainers at Intelligence Gateway have extensive teaching experience and understand various learner’s needs. So, the concepts covered in this CEH course are explained in simple language so even beginners can follow them easily.
How much programming knowledge is required for ethical hacking?
What is Ethical Hacking used for?
Ethical hacking aims to protect an organization’s computer systems and networks from cyberattacks by identifying and addressing the vulnerabilities and loopholes before they can be exploited. Ethical hackers think just like malicious hackers but intrude on the system with permission and intend to protect it rather than causing any harm. This ethical hacking course can help demonstrate your skills in this promising career field.
Is Ethical Hacking a good career option?
With the ongoing digital transformation, there has never been more need for skilled cybersecurity professionals to protect the digital assets of an organization. The number of cyberattacks is increasing at an alarming rate and ethical hackers are required urgently to deal with them. With our CEH certification, you can step into the world of ethical hacking and watch your career flourishing.
How do beginners learn Ethical Hacking?
Ethical hacking is an interesting yet difficult area of study and one needs to have specialized skills to start a career as an ethical hacker. So, beginners are recommended to go through an in-depth training course to learn all the concepts from scratch. Our CEH training is one of the best options you have to gain job-ready ethical hacking skills.
Is a CEH certification worth it?
The CEH certification is a pioneer in setting a global standard for ethical hacking. The EC-Council works to deliver only the latest technologies such as container technology, OTT technology, and involves hands-on hacking challenges as well. The credential is trusted by many Fortune 500 companies like Cisco, Ford Motors, IBM, Microsoft, Verizon, Citi bank, and more. Take our CEH training to add this globally recognized credential to your portfolio and become a successful ethical hacker.
What are the job roles available after getting a CEH certification?
The CEH certification is the best credential you can achieve in your ethical hacking career. The certification opens your doors to a number of job opportunities like cybersecurity consultant, security analyst, cyber defense analyst, information security administrator, network security engineer, and more.
What does an Ethical hacker do?
Ethical hackers are primarily responsible for identifying weak points and vulnerabilities in an organization’s systems and rectifying them before any potential attack. They identify and fix sniffing networks, evade intrusion prevention systems, check for any cracked wireless encryption or hijacked web servers so as to take proper corrective measures and strengthen the defenses of the organization. A CEH certification is all you need to demonstrate your capability of working as an ethical hacker.
What skills should an Ethical Hacker Possess?
Professionals starting a career as an ethical hacker are recommended to have a bachelor’s degree in computer science, information technology, or related field. They should have good coding skills, advanced knowledge of networking systems and security software, various ethical hacking tools, and technical expertise in routers, firewalls, encryption, and virtualization. You can develop these skills and more with our CEH certification program.
What industries use Ethical Hacking most?
Almost all industrial sectors are undergoing digital transformation and store sensitive information over the web. So, ethical hackers are required in all major areas like information technology, banking and finance, government agencies, healthcare, stock market, and eCommerce. This ethical hacking course is useful if you want to enter any of these sectors.
- Trojans backdoors and countermeasures
- IDS firewalls and honeypots
- Advanced hacking concepts
- Network packet analysis
- Mobile and web technologies
- Advanced log management