SlideShare a Scribd company logo
1 of 1
Download to read offline
KnowledgeHut is an Authorized Training Partner (ATP) 
and Accredited Training Center (ATC) for EC-Council. 
Duration: 5 Days 
Format: Instructor-led Classroom Training 
Certied Ethical Hacker 
Description 
Prerequisites 
There are no prerequisites to attend this 
training course, and anyone interested in IT 
security can attend. 
This course prepares you for the 
EC-Council Certied Ethical Hacker Exam, 
and is a prerequisite to apply for the exam. 
Students are required to clear the online 
Pro-metric exam to receive the CEH 
Certication. 
There are 125 Multiple choice Questions on 
the test, to be completed in 4 hours, and 
candidates must receive a passing score of 
70%. 
Certication 
To learn more about the CEH certification 
process, please refer the 
Application/Eligibility Process information on 
the EC-Council website. 
http://cert.eccouncil.org/application-proces 
s-eligibility.html 
Who can attend? 
This Certied Ethical Hacking course will 
signicantly benet security ocers, 
auditors, security professionals, site 
administrators, and anyone who is 
concerned about the integrity of the 
network infrastructure. 
(CEH) V8 
Security is a serious issue in the IT industry across the globe, especially with the IT 
market booming despite the prevailing economic uncertainties. While following 
best practices and security policies are very important, they cannot guarantee that 
your data safety will not be compromised. Ethical hacking and countermeasures 
serve to test and evaluate the security of the corporate environment in the real 
world, using real-world hacking tools and methodologies. 
Our comprehensive 5 day program on CEH V8 will address security threats to the 
latest operating systems, mobile platforms, tablet computers, and counter mea-sures 
to secure all these domains. Concepts are presented in an easily comprehen-sible 
manner, with simplied advanced technical courseware that covers vulnera-bility 
assessment, risk assessment, penetration testing and system protection. 
Learn to think like a hacker, and use it for ethical purposes - gain credibility as a Cer-ti 
ed Ethical Hacker with the EC-Council CEH certication under your belt. 
Course Structure 
โ€ข Introduction to Ethical Hacking 
โ€ข Foot Printing  Reconnaissance 
โ€ข Scanning Networks 
โ€ข Enumeration 
โ€ข System Hacking 
โ€ข Trojans  Backdoors 
โ€ข Viruses  Worms 
โ€ข Sniffers 
โ€ข Social Engineering 
โ€ข Denial of Service 
โ€ข Session Hijacking 
โ€ข Hijacking Web servers 
โ€ข Hacking Web Applications 
โ€ข SQL Injection 
โ€ข Hacking Wireless Networks 
โ€ข Hacking Mobile Platforms 
โ€ข Evading IDS, Firewalls  Honey pots 
โ€ข Buffer Overflow 
โ€ข Cryptography 
โ€ข Penetration Testing 
Course Benets 
From the Course: 
Students undergoing CEH training will learn: 
โ€ข Key issues plaguing the information security world, incident management 
process, and penetration testing 
โ€ข Various types of footprinting, footprinting tools, and countermeasures 
โ€ข Network scanning techniques and scanning countermeasures 
โ€ข Enumeration techniques and enumeration countermeasures 
โ€ข System hacking methodology, steganography, steganalysis attacks, and 
covering tracks 
โ€ข Dierent types of Trojans, Trojan analysis, and Trojan countermeasures 
โ€ข Working of viruses, virus analysis, computer worms, malware analysis 
procedure, and countermeasures 
โ€ข Packet sning techniques and how to defend against sning 
โ€ข Social Engineering techniques, identify theft, and social engineering 
countermeasures 
โ€ข DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS 
countermeasures 
โ€ข Session hijacking techniques and countermeasures 
โ€ข Dierent types of webserver attacks, attack methodology, and countermeasures 
โ€ข Dierent types of web application attacks, web application hacking 
methodology, and countermeasures 
โ€ข SQL injection attacks and injection detection tools 
โ€ข Wireless Encryption, wireless hacking methodology, wireless hacking tools, 
and wi- security tools 
โ€ข Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows 
phone 8 vulnerabilities, mobile security guidelines, and tools 
โ€ข Firewall, IDS and honeypot evasion techniques, evasion tools, and 
countermeasures 
โ€ข Various types of buer overows, how to mutate a buer overow exploit, 
buer overow detection tools, and countermeasures 
โ€ข Dierent types of cryptography ciphers, Public Key Infrastructure (PKI), 
cryptography attacks, and cryptanalysis tools 
โ€ข Various types of penetration testing, security audit, vulnerability assessment, 
and penetration testing roadmap 
From the Workshop: 
โ€ข Instructor -Led Classroom Training (5 Days)by Certified EC-Council expert 
instructors 
โ€ข Hands-on workshop 
โ€ข Course Fee includes Certification Exam Fee 
โ€ข Well organized DVD-ROM content - 6 DVD sets of approximately 24GBs of the 
latest hacking and security tools 
โ€ข A result oriented, descriptive, and analytical lab manual - the labs showcased in 
the courseware are tested against the latest Operating Systems (including all 
patches and hot fixes applied) 
โ€ข Free 6 months CEH V8 iLabs access โ€“ this is a virtual cloud-based Lab 
environment 
โ€ข Hard copy of the courseware 
To know more about the next available workshop in your country, please visit this 
link: http://www.knowledgehut.com/short?v=BBJvRzwY 
www.knowledgehut.com support@knowledgehut.com

More Related Content

What's hot

Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hackerkeriann70
ย 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
ย 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Rishabh Upadhyay
ย 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
ย 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Joel Aleburu
ย 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
ย 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar sasikalaD3
ย 
A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingEC-Council
ย 
SIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibilitySIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibilityAlienVault
ย 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
ย 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
ย 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
ย 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
ย 
What is pentest
What is pentestWhat is pentest
What is pentestitissolutions
ย 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
ย 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspectiveDr. Anish Cheriyan (PhD)
ย 
Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554TISA
ย 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
ย 
Ethical Hacking / Penetration Testing Training & Coaching
Ethical Hacking / Penetration Testing Training & CoachingEthical Hacking / Penetration Testing Training & Coaching
Ethical Hacking / Penetration Testing Training & CoachingCyber 51 LLC
ย 

What's hot (20)

Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
ย 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
ย 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
ย 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
ย 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
ย 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
ย 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar
ย 
A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration Testing
ย 
SIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibilitySIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibility
ย 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
ย 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
ย 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
ย 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
ย 
SOC Analyst Course
SOC Analyst CourseSOC Analyst Course
SOC Analyst Course
ย 
What is pentest
What is pentestWhat is pentest
What is pentest
ย 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
ย 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
ย 
Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554
ย 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
ย 
Ethical Hacking / Penetration Testing Training & Coaching
Ethical Hacking / Penetration Testing Training & CoachingEthical Hacking / Penetration Testing Training & Coaching
Ethical Hacking / Penetration Testing Training & Coaching
ย 

Similar to Certied Ethical Hacker

mille2.pptx
mille2.pptxmille2.pptx
mille2.pptxyehyaibrahem2
ย 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdfkaouthermejri
ย 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxCS50Bootcamp
ย 
How to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdfHow to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdftsaaroacademy
ย 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
ย 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptxssuserf9358d
ย 
Karthik raja r task 7 i
Karthik raja r task 7 iKarthik raja r task 7 i
Karthik raja r task 7 ikarthikraja90173
ย 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
ย 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security TrainingBryan Len
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfInfosec train
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfpriyanshamadhwal2
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆInfosec train
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆpriyanshamadhwal2
ย 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfinfosecTrain
ย 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseInfosecTrain Education
ย 
CEH Trailblazers of Jaipur: Your Gateway to Cyber Mastery
CEH Trailblazers of Jaipur: Your Gateway to Cyber MasteryCEH Trailblazers of Jaipur: Your Gateway to Cyber Mastery
CEH Trailblazers of Jaipur: Your Gateway to Cyber Masteryccasociety1
ย 
Unlocking the World of Cybersecurity.pdf
Unlocking the World of Cybersecurity.pdfUnlocking the World of Cybersecurity.pdf
Unlocking the World of Cybersecurity.pdfVeronica Joseph
ย 
Introduction to CEHv12..pptx
Introduction to CEHv12..pptxIntroduction to CEHv12..pptx
Introduction to CEHv12..pptxIPSpecialist
ย 

Similar to Certied Ethical Hacker (20)

mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
ย 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
ย 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptx
ย 
How to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdfHow to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdf
ย 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
ย 
MyResume.pdf
MyResume.pdfMyResume.pdf
MyResume.pdf
ย 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx
ย 
Karthik raja r task 7 i
Karthik raja r task 7 iKarthik raja r task 7 i
Karthik raja r task 7 i
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
ย 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
ย 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
ย 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
ย 
CEH Trailblazers of Jaipur: Your Gateway to Cyber Mastery
CEH Trailblazers of Jaipur: Your Gateway to Cyber MasteryCEH Trailblazers of Jaipur: Your Gateway to Cyber Mastery
CEH Trailblazers of Jaipur: Your Gateway to Cyber Mastery
ย 
Unlocking the World of Cybersecurity.pdf
Unlocking the World of Cybersecurity.pdfUnlocking the World of Cybersecurity.pdf
Unlocking the World of Cybersecurity.pdf
ย 
Introduction to CEHv12..pptx
Introduction to CEHv12..pptxIntroduction to CEHv12..pptx
Introduction to CEHv12..pptx
ย 

More from Knowledgehut

Capm brochure
Capm brochureCapm brochure
Capm brochureKnowledgehut
ย 
Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)Knowledgehut
ย 
Prince2 foundation-certification
Prince2 foundation-certificationPrince2 foundation-certification
Prince2 foundation-certificationKnowledgehut
ย 
Python 101
Python 101Python 101
Python 101Knowledgehut
ย 
Python in-the-enterprise-brochure
Python in-the-enterprise-brochurePython in-the-enterprise-brochure
Python in-the-enterprise-brochureKnowledgehut
ย 
Web frameworks in python
Web frameworks in pythonWeb frameworks in python
Web frameworks in pythonKnowledgehut
ย 
PCI DSS brochure
PCI DSS brochurePCI DSS brochure
PCI DSS brochureKnowledgehut
ย 
Cobit5 brochure
Cobit5 brochureCobit5 brochure
Cobit5 brochureKnowledgehut
ย 
Finance for non finance managers
Finance for non finance managersFinance for non finance managers
Finance for non finance managersKnowledgehut
ย 
Ifpug fpa and snap
Ifpug fpa and snapIfpug fpa and snap
Ifpug fpa and snapKnowledgehut
ย 
Certied Associate of Software Quality
Certied Associate of Software QualityCertied Associate of Software Quality
Certied Associate of Software QualityKnowledgehut
ย 
Six sigma black belt brochure
Six sigma black belt brochureSix sigma black belt brochure
Six sigma black belt brochureKnowledgehut
ย 
Six sigma yellow belt brochure
Six sigma yellow belt brochureSix sigma yellow belt brochure
Six sigma yellow belt brochureKnowledgehut
ย 
PMI ACP - Certification
PMI ACP - CertificationPMI ACP - Certification
PMI ACP - CertificationKnowledgehut
ย 
PMP Certification Brochure
PMP Certification BrochurePMP Certification Brochure
PMP Certification BrochureKnowledgehut
ย 
SAFe agilist_brochure
SAFe agilist_brochureSAFe agilist_brochure
SAFe agilist_brochureKnowledgehut
ย 
Big data analytics_using_hadoop
Big data analytics_using_hadoopBig data analytics_using_hadoop
Big data analytics_using_hadoopKnowledgehut
ย 
PgMP programme-management-professional
PgMP programme-management-professionalPgMP programme-management-professional
PgMP programme-management-professionalKnowledgehut
ย 
Agile PMP
Agile PMPAgile PMP
Agile PMPKnowledgehut
ย 
Apache hadoop-administrator-training
Apache hadoop-administrator-trainingApache hadoop-administrator-training
Apache hadoop-administrator-trainingKnowledgehut
ย 

More from Knowledgehut (20)

Capm brochure
Capm brochureCapm brochure
Capm brochure
ย 
Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)Prince2 certification-india(foundation+practitioner)
Prince2 certification-india(foundation+practitioner)
ย 
Prince2 foundation-certification
Prince2 foundation-certificationPrince2 foundation-certification
Prince2 foundation-certification
ย 
Python 101
Python 101Python 101
Python 101
ย 
Python in-the-enterprise-brochure
Python in-the-enterprise-brochurePython in-the-enterprise-brochure
Python in-the-enterprise-brochure
ย 
Web frameworks in python
Web frameworks in pythonWeb frameworks in python
Web frameworks in python
ย 
PCI DSS brochure
PCI DSS brochurePCI DSS brochure
PCI DSS brochure
ย 
Cobit5 brochure
Cobit5 brochureCobit5 brochure
Cobit5 brochure
ย 
Finance for non finance managers
Finance for non finance managersFinance for non finance managers
Finance for non finance managers
ย 
Ifpug fpa and snap
Ifpug fpa and snapIfpug fpa and snap
Ifpug fpa and snap
ย 
Certied Associate of Software Quality
Certied Associate of Software QualityCertied Associate of Software Quality
Certied Associate of Software Quality
ย 
Six sigma black belt brochure
Six sigma black belt brochureSix sigma black belt brochure
Six sigma black belt brochure
ย 
Six sigma yellow belt brochure
Six sigma yellow belt brochureSix sigma yellow belt brochure
Six sigma yellow belt brochure
ย 
PMI ACP - Certification
PMI ACP - CertificationPMI ACP - Certification
PMI ACP - Certification
ย 
PMP Certification Brochure
PMP Certification BrochurePMP Certification Brochure
PMP Certification Brochure
ย 
SAFe agilist_brochure
SAFe agilist_brochureSAFe agilist_brochure
SAFe agilist_brochure
ย 
Big data analytics_using_hadoop
Big data analytics_using_hadoopBig data analytics_using_hadoop
Big data analytics_using_hadoop
ย 
PgMP programme-management-professional
PgMP programme-management-professionalPgMP programme-management-professional
PgMP programme-management-professional
ย 
Agile PMP
Agile PMPAgile PMP
Agile PMP
ย 
Apache hadoop-administrator-training
Apache hadoop-administrator-trainingApache hadoop-administrator-training
Apache hadoop-administrator-training
ย 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
ย 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
ย 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
ย 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
ย 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
ย 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
ย 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
ย 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
ย 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
ย 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
ย 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
ย 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
ย 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
ย 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
ย 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
ย 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
ย 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
ย 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)โ€”โ€”โ€”โ€”IMP.OF KSHARA ...
ย 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
ย 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
ย 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
ย 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
ย 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
ย 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
ย 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
ย 
Cรณdigo Creativo y Arte de Software | Unidad 1
Cรณdigo Creativo y Arte de Software | Unidad 1Cรณdigo Creativo y Arte de Software | Unidad 1
Cรณdigo Creativo y Arte de Software | Unidad 1
ย 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
ย 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
ย 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
ย 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
ย 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
ย 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
ย 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
ย 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
ย 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
ย 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
ย 

Certied Ethical Hacker

  • 1. KnowledgeHut is an Authorized Training Partner (ATP) and Accredited Training Center (ATC) for EC-Council. Duration: 5 Days Format: Instructor-led Classroom Training Certied Ethical Hacker Description Prerequisites There are no prerequisites to attend this training course, and anyone interested in IT security can attend. This course prepares you for the EC-Council Certied Ethical Hacker Exam, and is a prerequisite to apply for the exam. Students are required to clear the online Pro-metric exam to receive the CEH Certication. There are 125 Multiple choice Questions on the test, to be completed in 4 hours, and candidates must receive a passing score of 70%. Certication To learn more about the CEH certification process, please refer the Application/Eligibility Process information on the EC-Council website. http://cert.eccouncil.org/application-proces s-eligibility.html Who can attend? This Certied Ethical Hacking course will signicantly benet security ocers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. (CEH) V8 Security is a serious issue in the IT industry across the globe, especially with the IT market booming despite the prevailing economic uncertainties. While following best practices and security policies are very important, they cannot guarantee that your data safety will not be compromised. Ethical hacking and countermeasures serve to test and evaluate the security of the corporate environment in the real world, using real-world hacking tools and methodologies. Our comprehensive 5 day program on CEH V8 will address security threats to the latest operating systems, mobile platforms, tablet computers, and counter mea-sures to secure all these domains. Concepts are presented in an easily comprehen-sible manner, with simplied advanced technical courseware that covers vulnera-bility assessment, risk assessment, penetration testing and system protection. Learn to think like a hacker, and use it for ethical purposes - gain credibility as a Cer-ti ed Ethical Hacker with the EC-Council CEH certication under your belt. Course Structure โ€ข Introduction to Ethical Hacking โ€ข Foot Printing Reconnaissance โ€ข Scanning Networks โ€ข Enumeration โ€ข System Hacking โ€ข Trojans Backdoors โ€ข Viruses Worms โ€ข Sniffers โ€ข Social Engineering โ€ข Denial of Service โ€ข Session Hijacking โ€ข Hijacking Web servers โ€ข Hacking Web Applications โ€ข SQL Injection โ€ข Hacking Wireless Networks โ€ข Hacking Mobile Platforms โ€ข Evading IDS, Firewalls Honey pots โ€ข Buffer Overflow โ€ข Cryptography โ€ข Penetration Testing Course Benets From the Course: Students undergoing CEH training will learn: โ€ข Key issues plaguing the information security world, incident management process, and penetration testing โ€ข Various types of footprinting, footprinting tools, and countermeasures โ€ข Network scanning techniques and scanning countermeasures โ€ข Enumeration techniques and enumeration countermeasures โ€ข System hacking methodology, steganography, steganalysis attacks, and covering tracks โ€ข Dierent types of Trojans, Trojan analysis, and Trojan countermeasures โ€ข Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures โ€ข Packet sning techniques and how to defend against sning โ€ข Social Engineering techniques, identify theft, and social engineering countermeasures โ€ข DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures โ€ข Session hijacking techniques and countermeasures โ€ข Dierent types of webserver attacks, attack methodology, and countermeasures โ€ข Dierent types of web application attacks, web application hacking methodology, and countermeasures โ€ข SQL injection attacks and injection detection tools โ€ข Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools โ€ข Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools โ€ข Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures โ€ข Various types of buer overows, how to mutate a buer overow exploit, buer overow detection tools, and countermeasures โ€ข Dierent types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools โ€ข Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap From the Workshop: โ€ข Instructor -Led Classroom Training (5 Days)by Certified EC-Council expert instructors โ€ข Hands-on workshop โ€ข Course Fee includes Certification Exam Fee โ€ข Well organized DVD-ROM content - 6 DVD sets of approximately 24GBs of the latest hacking and security tools โ€ข A result oriented, descriptive, and analytical lab manual - the labs showcased in the courseware are tested against the latest Operating Systems (including all patches and hot fixes applied) โ€ข Free 6 months CEH V8 iLabs access โ€“ this is a virtual cloud-based Lab environment โ€ข Hard copy of the courseware To know more about the next available workshop in your country, please visit this link: http://www.knowledgehut.com/short?v=BBJvRzwY www.knowledgehut.com support@knowledgehut.com