SlideShare a Scribd company logo
1 of 15
Download to read offline
CRAW Security
CRAW Security
Course Description
The Certified Ethical Hacker (CEH) program is the core of the most desired information
security training system any information security professional will ever want to be in.
The CEH, is the rest part of a 3 part EC-Council Information Security. Track which helps
you master hacking technologies. You will become a hacker, but an ethical one! As the
security mind-set in any organization must not be limited to the silos of a certain
vendor, technologies or pieces of equipment. This course was designed to provide you
with the tools and techniques used by hackers and information security professionals
alike to break into an organization. As we put it, โ€œTo beat a hacker, you need to think
like a hackerโ€. This course will immerse you into the Hacker Mind-set so that you will
be able to defend against future attacks. It puts you in the driverโ€™s seat of a hands-on
environment with a systematic ethical hacking process. Here, you will be exposed to
an entirely daren't way of achieving optimal information security posture in their
organization; by hacking it! You will scan, test, hack and secure your own systems.
CRAW Security
Here, you will be exposed to an entirely daren't way of achieving optimal information
security posture in their organization; by hacking it! You will scan, test, hack and
secure your own systems. You will be thought the Five Phases of Ethical Hacking and
thought how you can approach your target and succeed at breaking in every time! The
phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access,
and covering your tracks.
The tools and techniques in each of these have phases are provided in detail in an
encyclopaedic approach to help you identify when an attack has been used against
your own targets. Why then is this training called the Certified Ethical Hacker Course?
This is because by using the same techniques as the bad guys, you can assess the
security posture of an organization with the same approach these malicious hackers
use, identify weaknesses and x the problems before they are dented by the enemy,
causing what could potentially be a catastrophic damage to your respective
organization. Throughout the CEH course, you will be immersed in a hacker's mind-set,
evaluating not just logical, but physical security.
Course Description
CRAW Security
Target to Audience
Individuals
๏ฑ School Students
๏ฑ College Students
๏ฑ IT Professionals
๏ฑ IT Officers
๏ฑ IT and LAW Officers
Corporates
๏ฑ IT Training Firms
๏ฑ IT Consultants
๏ฑ IT Experts
๏ฑ IT Officers
๏ฑ IT Institutions & Colleges
๏ฑ IT Graduated or Computer Science
Students
CRAW Security
Duration of Program
๏ฑ 1 Month (2 Hours per Day )
๏ฑ 15 Days (4 Hours per Day)
๏ฑ 8 Days (5-6 Hours per Day)
๏ฑ 5 Days (8 Hours per Day)
CRAW Security
Certification
The Certified Ethical Hacker Exam (CEH V9) 312-50 may be taken on the last day of the
training (optional). Students need to pass the online exam to receive CEH Cortication.
Learning Track
CRAW Security
Exam Details
CRAW Security
What we try to Give
We try to give you real industry standards with best possible quality to all our
customers and clients. We focus on Various sections of Society and running a national
level campaign to literate Students from all parts of company who canโ€™t Afford โ€œBasic
IT Computer Trainingโ€. We wish we could teach as many students from all over the
world and make it a beautiful place to work. We work on minimum gross margins to
strength the Indian It infrastructure.
CRAW Security
CEHv9 Recognition/
Endorsement/Mapping
CRAW Security
What is New in the CEHV9
Course
This is the worlds most advanced ethical hacking course with 18 of the most current
security domains any ethical hacker will ever want to know when they are planning to
beef up the information security posture of their organization. In 18 comprehensive
modules, the course covers over 270 attack technologies, commonly used by hackers.
Our security experts have designed Online Training and Testing Labs which mimic real
time scenarios in the course to help you โ€œliveโ€ through an attack as if it were real and
provide you with access to over 2200 commonly used hacking tools to immerse you
into the hacker world. As โ€œa picture tells a thousand wordsโ€, our developers have all
this and more for you in over 2200 graphically rich, specially designed slides to help
you grasp complex security concepts in depth which will be presented to you in 1
Month, 15 Days, 8 Days and 5 Days hands on class by our Certified Instructor. The goal
of this course is to help you master an Ethical Hacking methodology that can be used
in a Penetration Testing or Ethical Hacking situation.
CRAW Security
Course Outline V9
CRAW Security
What will you learn?
1. Introduction to Ethical Hacking
2. Foot printing and reconnaissance
3. Scanning Networks
4. Enumeration
5. System Networks
6. Malware Threats(Virus, Trojan, Worms)
7. Sniffing
8. Social Engineering
9. Denial-of-Service
10. Session Hacking
CRAW Security
1. Hacking Web servers
2. Hacking Web Applications
3. SQL Injection
4. Hacking Wireless Networks
5. Hacking Mobile Platforms
6. Evading IDS, Firewalls, and Honeypots
7. Cloud Computing
8. Cryptography
9. Kali-Linux Hands-On Training
10. Penetration Testing
CRAW Security
What will you learn?
Contact Us
CRAW Security
1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab,
Saket Metro Station, New Delhi- 110030
Call Us
011-40394315 | +91-9650202445 | +91-9650677445
Mails Us
training@craw.in
Visit Us
www.crawsecurity.com | www.craw.in
CRAW Security
CRAW Security
THANK YOU
IT HAS BEEN A PLEASURE!

More Related Content

What's hot

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentationRashid Khatmey
ย 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsCybereason
ย 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedMITRE - ATT&CKcon
ย 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
ย 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resumeSanjoy Debnath
ย 
Sanjoy_Debnath_Resume
Sanjoy_Debnath_ResumeSanjoy_Debnath_Resume
Sanjoy_Debnath_ResumeSanjoy Debnath
ย 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software EngineeringRohitha Liyanagama
ย 
Cybersecurity career options & Getting started
Cybersecurity career options & Getting started  Cybersecurity career options & Getting started
Cybersecurity career options & Getting started Balaji Rajasekaran
ย 
assign3.docx
assign3.docxassign3.docx
assign3.docxCaptain898
ย 
30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro 30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro Paula Januszkiewicz
ย 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
ย 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple TeamPriyanka Aash
ย 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
ย 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
ย 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudProtectWise
ย 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionPaulo R
ย 
Practical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} HackathonPractical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} HackathonStefan Streichsbier
ย 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory RealmShawn Tuma
ย 
What's a MITRE with your Security?
What's a MITRE with your Security?What's a MITRE with your Security?
What's a MITRE with your Security?MITRE - ATT&CKcon
ย 

What's hot (20)

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
ย 
CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?
ย 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
ย 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have Changed
ย 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
ย 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
ย 
Sanjoy_Debnath_Resume
Sanjoy_Debnath_ResumeSanjoy_Debnath_Resume
Sanjoy_Debnath_Resume
ย 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
ย 
Cybersecurity career options & Getting started
Cybersecurity career options & Getting started  Cybersecurity career options & Getting started
Cybersecurity career options & Getting started
ย 
assign3.docx
assign3.docxassign3.docx
assign3.docx
ย 
30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro 30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro
ย 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
ย 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple Team
ย 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
ย 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
ย 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
ย 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
ย 
Practical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} HackathonPractical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} Hackathon
ย 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
ย 
What's a MITRE with your Security?
What's a MITRE with your Security?What's a MITRE with your Security?
What's a MITRE with your Security?
ย 

Similar to Certified Ethical Hacking (CEH V9) Course Details | EC-Council

7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptxCCNMumbai
ย 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfinfosecTrain
ย 
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡Infosec train
ย 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ priyanshamadhwal2
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfinfosec train
ย 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHInfosecTrain Education
ย 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
ย 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruarySkillogic Solutions
ย 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuarySkillogic Solutions
ย 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruarySkillogic Solutions
ย 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxSkillogic Solutions
ย 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuarySkillogic Solutions
ย 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Skillogic Solutions
ย 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Skillogic Solutions
ย 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruarySkillogic Solutions
ย 
Ethical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxEthical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxSkillogic Solutions
ย 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruarySkillogic Solutions
ย 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Skillogic Solutions
ย 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Skillogic Solutions
ย 

Similar to Certified Ethical Hacking (CEH V9) Course Details | EC-Council (20)

7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
ย 
Ceh3
Ceh3Ceh3
Ceh3
ย 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
ย 
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
๐˜๐จ๐ฎ๐ซ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐Ÿ‘‡
ย 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ ๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
๐…๐‘๐„๐„ ๐†๐ฎ๐ข๐๐ž ๐“๐จ ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐ 
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
ย 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
ย 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
ย 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
ย 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad January
ย 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
ย 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptx
ย 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai January
ย 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024
ย 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024
ย 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai February
ย 
Ethical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxEthical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptx
ย 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
ย 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
ย 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
ย 

More from CRAW CYBER SECURITY PVT LTD

Oracle summer internship training in Delhi
Oracle summer internship training in DelhiOracle summer internship training in Delhi
Oracle summer internship training in DelhiCRAW CYBER SECURITY PVT LTD
ย 
Android Development Summer Internship in Delhi
Android Development Summer Internship in DelhiAndroid Development Summer Internship in Delhi
Android Development Summer Internship in DelhiCRAW CYBER SECURITY PVT LTD
ย 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiCRAW CYBER SECURITY PVT LTD
ย 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiCRAW CYBER SECURITY PVT LTD
ย 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCRAW CYBER SECURITY PVT LTD
ย 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCRAW CYBER SECURITY PVT LTD
ย 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...CRAW CYBER SECURITY PVT LTD
ย 

More from CRAW CYBER SECURITY PVT LTD (7)

Oracle summer internship training in Delhi
Oracle summer internship training in DelhiOracle summer internship training in Delhi
Oracle summer internship training in Delhi
ย 
Android Development Summer Internship in Delhi
Android Development Summer Internship in DelhiAndroid Development Summer Internship in Delhi
Android Development Summer Internship in Delhi
ย 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
ย 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
ย 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltails
ย 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
ย 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
ย 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
ย 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
ย 
โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
ย 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
ย 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
ย 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
ย 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
ย 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
ย 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
ย 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
ย 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
ย 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
ย 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
ย 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
ย 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
ย 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
ย 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
ย 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
ย 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
ย 
โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
โ€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ย 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
ย 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
ย 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
ย 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
ย 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
ย 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
ย 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
ย 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
ย 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
ย 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
ย 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
ย 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
ย 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
ย 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
ย 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
ย 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
ย 

Certified Ethical Hacking (CEH V9) Course Details | EC-Council

  • 2. Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the rest part of a 3 part EC-Council Information Security. Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mind-set in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, โ€œTo beat a hacker, you need to think like a hackerโ€. This course will immerse you into the Hacker Mind-set so that you will be able to defend against future attacks. It puts you in the driverโ€™s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely daren't way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. CRAW Security
  • 3. Here, you will be exposed to an entirely daren't way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these have phases are provided in detail in an encyclopaedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and x the problems before they are dented by the enemy, causing what could potentially be a catastrophic damage to your respective organization. Throughout the CEH course, you will be immersed in a hacker's mind-set, evaluating not just logical, but physical security. Course Description CRAW Security
  • 4. Target to Audience Individuals ๏ฑ School Students ๏ฑ College Students ๏ฑ IT Professionals ๏ฑ IT Officers ๏ฑ IT and LAW Officers Corporates ๏ฑ IT Training Firms ๏ฑ IT Consultants ๏ฑ IT Experts ๏ฑ IT Officers ๏ฑ IT Institutions & Colleges ๏ฑ IT Graduated or Computer Science Students CRAW Security
  • 5. Duration of Program ๏ฑ 1 Month (2 Hours per Day ) ๏ฑ 15 Days (4 Hours per Day) ๏ฑ 8 Days (5-6 Hours per Day) ๏ฑ 5 Days (8 Hours per Day) CRAW Security
  • 6. Certification The Certified Ethical Hacker Exam (CEH V9) 312-50 may be taken on the last day of the training (optional). Students need to pass the online exam to receive CEH Cortication. Learning Track CRAW Security
  • 8. What we try to Give We try to give you real industry standards with best possible quality to all our customers and clients. We focus on Various sections of Society and running a national level campaign to literate Students from all parts of company who canโ€™t Afford โ€œBasic IT Computer Trainingโ€. We wish we could teach as many students from all over the world and make it a beautiful place to work. We work on minimum gross margins to strength the Indian It infrastructure. CRAW Security
  • 10. What is New in the CEHV9 Course This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed Online Training and Testing Labs which mimic real time scenarios in the course to help you โ€œliveโ€ through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As โ€œa picture tells a thousand wordsโ€, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 1 Month, 15 Days, 8 Days and 5 Days hands on class by our Certified Instructor. The goal of this course is to help you master an Ethical Hacking methodology that can be used in a Penetration Testing or Ethical Hacking situation. CRAW Security
  • 12. What will you learn? 1. Introduction to Ethical Hacking 2. Foot printing and reconnaissance 3. Scanning Networks 4. Enumeration 5. System Networks 6. Malware Threats(Virus, Trojan, Worms) 7. Sniffing 8. Social Engineering 9. Denial-of-Service 10. Session Hacking CRAW Security
  • 13. 1. Hacking Web servers 2. Hacking Web Applications 3. SQL Injection 4. Hacking Wireless Networks 5. Hacking Mobile Platforms 6. Evading IDS, Firewalls, and Honeypots 7. Cloud Computing 8. Cryptography 9. Kali-Linux Hands-On Training 10. Penetration Testing CRAW Security What will you learn?
  • 14. Contact Us CRAW Security 1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab, Saket Metro Station, New Delhi- 110030 Call Us 011-40394315 | +91-9650202445 | +91-9650677445 Mails Us training@craw.in Visit Us www.crawsecurity.com | www.craw.in CRAW Security
  • 15. CRAW Security THANK YOU IT HAS BEEN A PLEASURE!