SlideShare a Scribd company logo
1 of 11
Download to read offline
C EH
TM
Certified Ethical Hacker
EC-Council
Certified Ethical Hacker
Program Brochure
The Certified Ethical Hacker (CEH) program is the core of the
most desired information security training system any
information security professional will ever want to be in. The
CEH, is the first part of a 3 part EC-Council Information Security
Track which helps you master hacking technologies. You will
become a hacker, but an ethical one!
As the security mindset in any organization must not be
limited to the silos of a certain vendor, technologies or pieces
of equipment,
This course was desgined to provide you with the tools and
techniques used by hackers and information security
professionals alike to break into an organization. As we put it,
โ€œTo beat a hacker, you need to think like a hackerโ€. This course
will immerse you into the Hacker Mindset so that you will be
able to defend against future attacks. It puts you in the driverโ€™s
seat of a hands-on environment with a systematic ethical
hacking process.
Here, you will be exposed to an entirely different way of
achieving optimal information security posture in their
organization; by hacking it! You will scan, test, hack and secure
your own systems. You will be thought the Five Phases of
Ethical Hacking and thought how you can approach your
target and succeed at breaking in every time! The five phases
include Reconnaissance, Gaining Access, Enumeration,
Maintaining Access, and covering your tracks.
The tools and techniques in each of these five phases are
provided in detail in an encyclopedic approach to help you
identify when an attack has been used against your own
targets. Why then is this training called the Certified Ethical
Hacker Course? This is because by using the same techniques
as the bad guys, you can assess the security posture of an
organization with the same approach these malicious hackers
use, identify weaknesses and fix the problems before they are
identified by the enemy, causing what could potentially be a
catastrophic damage to your respective organization.
Throughout the CEH course, you will be immersed in a hacker's
mindset, evaluating not just logical, but physical security.
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
Course Description
This course will
significantly benefit
security officers, auditors,
security professionals, site
administrators, and
anyone who is concerned
about the integrity of
their network
infrastructure.
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
Target Audience
The Certified Ethical
Hacker exam 312-50 may
be taken on the last day
of the training (optional).
Students need to pass
the online exam to
receive CEH certification.
Certification
5 days (9:00 โ€“ 5:00)
Duration
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
Exam Details
Exam Title: Certified Ethical Hacker (ANSI)
Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
Availability: Prometric Prime / VUE / ECCEXAM
Test Format: Multiple Choice
Passing Score: 70%
Duration: 4 hours
Number of Questions: 125
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
Legal Agreement
Ethical Hacking and Countermeasures course
mission is to educate, introduce and demonstrate
hacking tools for penetration testing purposes
only. Prior to attending this course, you will be
asked to sign an agreement stating that you will
not use the newly acquired skills for illegal or
malicious attacks and you will not use such tools
in an attempt to compromise any computer
system, and to indemnify EC-Council with respect
to the use or misuse of these tools, regardless of
intent.
Not anyone can be a student - the Accredited
Training Centers (ATC) will make sure the
applicants work for legitimate companies.
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
CEHv9 Recognition / Endorsement / Mapping
The National Initiative for
Cybersecurity Education (NICE)
United States Department of
Defense (DoD)
American National
Standards Institute (ANSI)
Committee on National Security
Systems (CNSS)
National Infocomm Competency
Framework (NICF)
KOMLEK
Department of Veterans Affairs
MSC
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
What is New in the CEHV9 Course
This is the worlds most advanced ethical hacking course with 18 of the most current security
domains any ethical hacker will ever want to know when they are planning to beef up the
information security posture of their organization. In 18 comprehensive modules, the course
covers over 270 attack technologies, commonly used by hackers.
Our security experts have designed over 140 labs which mimic real time scenarios in the course
to help youโ€œliveโ€through an attack as if it were real and provide you with access to over 2200
commonly used hacking tools to immerse you into the hacker world.
Asโ€œa picture tells a thousand wordsโ€, our developers have all this and more for you in over 2200
graphically rich, specially designed slides to help you grasp complex security concepts in depth
which will be presented to you in 5 day hands on class by our Certified Instructor.
The goal of this course is to help you master an ethical hacking methodology that can be used in
a penetration testing or ethical hacking situation. You walk out the door with ethical hacking
skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker
certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
In short, you walk out the door with hacking skills that are highly in demand, as well as the
internationally recognized Certified Ethical Hacker certification!
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
Course Outline Version 9
CEHv9 consists of 18 core modules designed to facilitate a comprehensive ethical hacking and
penetration testing training.
Introduction to
Ethical Hacking
Footprinting and
Reconnaissance
Scanning
Networks
Enumeration
System Hacking
Malware
Threats
Social
Engineering
Denial of
Service
Session
Hijacking
Hacking Web
Applications
SQL Injection
Hacking Wireless
Networks
Hacking
Web servers
Hacking Mobile
Platforms
Evading IDS,
Firewalls, and
Honeypot
Sniffing
Cloud
Computing
Cryptography
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
What will you learn?
Students going through CEH training will learn:
Key issues plaguing the information security world, incident
management process, and penetration testing
System hacking methodology, steganography, steganalysis
attacks, and covering tracks
Different types of Trojans, Trojan analysis, and Trojan
countermeasures
Working of viruses, virus analysis, computer worms, malware
analysis procedure, and countermeasures
Packet sniffing techniques and how to defend against sniffing
Social Engineering techniques, identify theft, and social
engineering countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and
DoS/DDoS countermeasures
Various types of footprinting, footprinting tools, and
countermeasures
Enumeration techniques and enumeration countermeasures
Network scanning techniques and scanning countermeasures
01
02
03
04
05
06
07
08
09
10
Certified Ethical Hacker
C EH
TM
Certified Ethical Hacker
12
13
14
15
16
17
18
19
20
Session hijacking techniques and countermeasures
Different types of webserver attacks, attack methodology, and
countermeasures
Different types of web application attacks, web application
hacking methodology, and countermeasures
Wireless Encryption, wireless hacking methodology, wireless
hacking tools, and wi-fi security tools
Mobile platform attack vector, android vulnerabilities, jailbreaking
iOS, windows phone 8 vulnerabilities, mobile security guidelines,
and tools
Firewall, IDS and honeypot evasion techniques, evasion tools, and
countermeasures
Various cloud computing concepts, threats, attacks, and security
techniques and tools
Different types of cryptography ciphers, Public Key Infrastructure
(PKI), cryptography attacks, and cryptanalysis tools
Various types of penetration testing, security audit, vulnerability
assessment, and penetration testing roadmap
SQL injection attacks and injection detection tools
11
EC-Council
Mercury Solutions Limited
464, Phase V Udyog Vihar
Gurgaon, DELHI-NCR 122016
INDIA
P : +91 888 2233 777
W : www.mercury.co.in
E : training@mercury.co.in

More Related Content

What's hot

Ethical hacking Course
Ethical hacking CourseEthical hacking Course
Ethical hacking CourseHimanshuPise2
ย 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
ย 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
ย 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAltacit Global
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingMohammad Affan
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingMazenetsolution
ย 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
ย 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hackingNigam Dave
ย 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingVishesh Singhal
ย 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingMissStevenson1
ย 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical HackingViral Parmar
ย 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
ย 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
ย 

What's hot (20)

Ethical hacking Course
Ethical hacking CourseEthical hacking Course
Ethical hacking Course
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ย 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
ย 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
ย 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ย 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
ย 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
ย 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
ย 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
ย 
Hackers
HackersHackers
Hackers
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
ย 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
ย 

Viewers also liked

VMware vSphere 6 Course Content - Mercury Solutions
VMware vSphere 6 Course Content - Mercury SolutionsVMware vSphere 6 Course Content - Mercury Solutions
VMware vSphere 6 Course Content - Mercury SolutionsMercury Solutions Limited
ย 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyE Hacking
ย 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book ReviewTirtha Mal
ย 
Perfil epidemiologico
Perfil epidemiologicoPerfil epidemiologico
Perfil epidemiologicoEzequiel Jimenez
ย 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
ย 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
ย 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingSurachai Chatchalermpun
ย 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
ย 
Network Security
Network SecurityNetwork Security
Network SecurityRaymond Jose
ย 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPTSweta Leena Panda
ย 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
ย 

Viewers also liked (13)

VMware vSphere 6 Course Content - Mercury Solutions
VMware vSphere 6 Course Content - Mercury SolutionsVMware vSphere 6 Course Content - Mercury Solutions
VMware vSphere 6 Course Content - Mercury Solutions
ย 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
ย 
Super1
Super1Super1
Super1
ย 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
ย 
Perfil epidemiologico
Perfil epidemiologicoPerfil epidemiologico
Perfil epidemiologico
ย 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
ย 
CEHV9
CEHV9CEHV9
CEHV9
ย 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
ย 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ย 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
ย 
Network Security
Network SecurityNetwork Security
Network Security
ย 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
ย 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
ย 

Similar to CEH Course Overview

How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...Firojali Laskar
ย 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdfkaouthermejri
ย 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochureHBServices7
ย 
Ce hv10 brochure
Ce hv10 brochureCe hv10 brochure
Ce hv10 brochureMASTERMIND61
ย 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
ย 
Ethical hacking certification training course (1)
Ethical hacking certification training course (1)Ethical hacking certification training course (1)
Ethical hacking certification training course (1)HadiyaSarwath
ย 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfinfosecTrain
ย 
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡Infosec train
ย 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ priyanshamadhwal2
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfinfosec train
ย 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHInfosecTrain Education
ย 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuarySkillogic Solutions
ย 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Skillogic Solutions
ย 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Skillogic Solutions
ย 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruarySkillogic Solutions
ย 
Ethical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxEthical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxSkillogic Solutions
ย 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Skillogic Solutions
ย 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Skillogic Solutions
ย 
Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Skillogic Solutions
ย 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification CourseNovel Vista
ย 

Similar to CEH Course Overview (20)

How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
ย 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
ย 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochure
ย 
Ce hv10 brochure
Ce hv10 brochureCe hv10 brochure
Ce hv10 brochure
ย 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
ย 
Ethical hacking certification training course (1)
Ethical hacking certification training course (1)Ethical hacking certification training course (1)
Ethical hacking certification training course (1)
ย 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
ย 
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
ย 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
ย 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
ย 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai January
ย 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024
ย 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024
ย 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai February
ย 
Ethical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxEthical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptx
ย 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
ย 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
ย 
Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024
ย 
Ethical Hacking Certification Course
Ethical Hacking Certification CourseEthical Hacking Certification Course
Ethical Hacking Certification Course
ย 

More from Mercury Solutions Limited

Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!Mercury Solutions Limited
ย 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
ย 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
ย 
What does it take to Conquer the MCSA
What does it take to Conquer the MCSAWhat does it take to Conquer the MCSA
What does it take to Conquer the MCSAMercury Solutions Limited
ย 
Employee Training is Worth The Investment
Employee Training is Worth The InvestmentEmployee Training is Worth The Investment
Employee Training is Worth The InvestmentMercury Solutions Limited
ย 
Importance of Project Management Training
Importance of Project Management TrainingImportance of Project Management Training
Importance of Project Management TrainingMercury Solutions Limited
ย 

More from Mercury Solutions Limited (8)

Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!
ย 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
ย 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
ย 
How to Pass CISA Exam
How to Pass CISA ExamHow to Pass CISA Exam
How to Pass CISA Exam
ย 
Sql Server 2014 Course Content
Sql Server 2014 Course ContentSql Server 2014 Course Content
Sql Server 2014 Course Content
ย 
What does it take to Conquer the MCSA
What does it take to Conquer the MCSAWhat does it take to Conquer the MCSA
What does it take to Conquer the MCSA
ย 
Employee Training is Worth The Investment
Employee Training is Worth The InvestmentEmployee Training is Worth The Investment
Employee Training is Worth The Investment
ย 
Importance of Project Management Training
Importance of Project Management TrainingImportance of Project Management Training
Importance of Project Management Training
ย 

Recently uploaded

Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)
Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)
Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)lakshayb543
ย 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
ย 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
ย 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
ย 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
ย 
call girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธcall girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
ย 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
ย 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
ย 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
ย 
HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...
HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...
HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...Nguyen Thanh Tu Collection
ย 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
ย 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
ย 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
ย 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
ย 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
ย 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
ย 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
ย 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
ย 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
ย 
Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)
Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)
Visit to a blind student's school๐Ÿง‘โ€๐Ÿฆฏ๐Ÿง‘โ€๐Ÿฆฏ(community medicine)
ย 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
ย 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
ย 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
ย 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ย 
call girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธcall girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Kamla Market (DELHI) ๐Ÿ” >เผ’9953330565๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
ย 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
ย 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
ย 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
ย 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
ย 
HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...
HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...
HแปŒC TแปT TIแบพNG ANH 11 THEO CHฦฏฦ NG TRรŒNH GLOBAL SUCCESS ฤรP รN CHI TIแบพT - Cแบข Nฤ‚...
ย 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
ย 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
ย 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
ย 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
ย 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
ย 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
ย 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
ย 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
ย 

CEH Course Overview

  • 1. C EH TM Certified Ethical Hacker EC-Council Certified Ethical Hacker Program Brochure
  • 2. The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment, This course was desgined to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, โ€œTo beat a hacker, you need to think like a hackerโ€. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driverโ€™s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security. Certified Ethical Hacker C EH TM Certified Ethical Hacker Course Description
  • 3. This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure. Certified Ethical Hacker C EH TM Certified Ethical Hacker Target Audience The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online exam to receive CEH certification. Certification 5 days (9:00 โ€“ 5:00) Duration
  • 4. Certified Ethical Hacker C EH TM Certified Ethical Hacker Exam Details Exam Title: Certified Ethical Hacker (ANSI) Exam Code: 312-50 (ECC EXAM), 312-50 (VUE) Availability: Prometric Prime / VUE / ECCEXAM Test Format: Multiple Choice Passing Score: 70% Duration: 4 hours Number of Questions: 125
  • 5. Certified Ethical Hacker C EH TM Certified Ethical Hacker Legal Agreement Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student - the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.
  • 6. Certified Ethical Hacker C EH TM Certified Ethical Hacker CEHv9 Recognition / Endorsement / Mapping The National Initiative for Cybersecurity Education (NICE) United States Department of Defense (DoD) American National Standards Institute (ANSI) Committee on National Security Systems (CNSS) National Infocomm Competency Framework (NICF) KOMLEK Department of Veterans Affairs MSC
  • 7. Certified Ethical Hacker C EH TM Certified Ethical Hacker What is New in the CEHV9 Course This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help youโ€œliveโ€through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. Asโ€œa picture tells a thousand wordsโ€, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!
  • 8. Certified Ethical Hacker C EH TM Certified Ethical Hacker Course Outline Version 9 CEHv9 consists of 18 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training. Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Malware Threats Social Engineering Denial of Service Session Hijacking Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Web servers Hacking Mobile Platforms Evading IDS, Firewalls, and Honeypot Sniffing Cloud Computing Cryptography
  • 9. Certified Ethical Hacker C EH TM Certified Ethical Hacker What will you learn? Students going through CEH training will learn: Key issues plaguing the information security world, incident management process, and penetration testing System hacking methodology, steganography, steganalysis attacks, and covering tracks Different types of Trojans, Trojan analysis, and Trojan countermeasures Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures Packet sniffing techniques and how to defend against sniffing Social Engineering techniques, identify theft, and social engineering countermeasures DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures Various types of footprinting, footprinting tools, and countermeasures Enumeration techniques and enumeration countermeasures Network scanning techniques and scanning countermeasures 01 02 03 04 05 06 07 08 09 10
  • 10. Certified Ethical Hacker C EH TM Certified Ethical Hacker 12 13 14 15 16 17 18 19 20 Session hijacking techniques and countermeasures Different types of webserver attacks, attack methodology, and countermeasures Different types of web application attacks, web application hacking methodology, and countermeasures Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures Various cloud computing concepts, threats, attacks, and security techniques and tools Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap SQL injection attacks and injection detection tools 11
  • 11. EC-Council Mercury Solutions Limited 464, Phase V Udyog Vihar Gurgaon, DELHI-NCR 122016 INDIA P : +91 888 2233 777 W : www.mercury.co.in E : training@mercury.co.in