SlideShare a Scribd company logo
CRAW Security
CRAW Security
Course Description
The Certified Ethical Hacker (CEH) program is the core of the most desired information
security training system any information security professional will ever want to be in.
The CEH, is the rest part of a 3 part EC-Council Information Security. Track which helps
you master hacking technologies. You will become a hacker, but an ethical one! As the
security mind-set in any organization must not be limited to the silos of a certain
vendor, technologies or pieces of equipment. This course was designed to provide you
with the tools and techniques used by hackers and information security professionals
alike to break into an organization. As we put it, “To beat a hacker, you need to think
like a hacker”. This course will immerse you into the Hacker Mind-set so that you will
be able to defend against future attacks. It puts you in the driver’s seat of a hands-on
environment with a systematic ethical hacking process. Here, you will be exposed to
an entirely daren't way of achieving optimal information security posture in their
organization; by hacking it! You will scan, test, hack and secure your own systems.
CRAW Security
Here, you will be exposed to an entirely daren't way of achieving optimal information
security posture in their organization; by hacking it! You will scan, test, hack and
secure your own systems. You will be thought the Five Phases of Ethical Hacking and
thought how you can approach your target and succeed at breaking in every time! The
phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access,
and covering your tracks.
The tools and techniques in each of these have phases are provided in detail in an
encyclopaedic approach to help you identify when an attack has been used against
your own targets. Why then is this training called the Certified Ethical Hacker Course?
This is because by using the same techniques as the bad guys, you can assess the
security posture of an organization with the same approach these malicious hackers
use, identify weaknesses and x the problems before they are dented by the enemy,
causing what could potentially be a catastrophic damage to your respective
organization. Throughout the CEH course, you will be immersed in a hacker's mind-set,
evaluating not just logical, but physical security.
Course Description
CRAW Security
Target to Audience
Individuals
 School Students
 College Students
 IT Professionals
 IT Officers
 IT and LAW Officers
Corporates
 IT Training Firms
 IT Consultants
 IT Experts
 IT Officers
 IT Institutions & Colleges
 IT Graduated or Computer Science
Students
CRAW Security
Duration of Program
 1 Month (2 Hours per Day )
 15 Days (4 Hours per Day)
 8 Days (5-6 Hours per Day)
 5 Days (8 Hours per Day)
CRAW Security
Certification
The Certified Ethical Hacker Exam (CEH V9) 312-50 may be taken on the last day of the
training (optional). Students need to pass the online exam to receive CEH Cortication.
Learning Track
CRAW Security
Exam Details
CRAW Security
What we try to Give
We try to give you real industry standards with best possible quality to all our
customers and clients. We focus on Various sections of Society and running a national
level campaign to literate Students from all parts of company who can’t Afford “Basic
IT Computer Training”. We wish we could teach as many students from all over the
world and make it a beautiful place to work. We work on minimum gross margins to
strength the Indian It infrastructure.
CRAW Security
CEHv9 Recognition/
Endorsement/Mapping
CRAW Security
What is New in the CEHV9
Course
This is the worlds most advanced ethical hacking course with 18 of the most current
security domains any ethical hacker will ever want to know when they are planning to
beef up the information security posture of their organization. In 18 comprehensive
modules, the course covers over 270 attack technologies, commonly used by hackers.
Our security experts have designed Online Training and Testing Labs which mimic real
time scenarios in the course to help you “live” through an attack as if it were real and
provide you with access to over 2200 commonly used hacking tools to immerse you
into the hacker world. As “a picture tells a thousand words”, our developers have all
this and more for you in over 2200 graphically rich, specially designed slides to help
you grasp complex security concepts in depth which will be presented to you in 1
Month, 15 Days, 8 Days and 5 Days hands on class by our Certified Instructor. The goal
of this course is to help you master an Ethical Hacking methodology that can be used
in a Penetration Testing or Ethical Hacking situation.
CRAW Security
Course Outline V9
CRAW Security
What will you learn?
1. Introduction to Ethical Hacking
2. Foot printing and reconnaissance
3. Scanning Networks
4. Enumeration
5. System Networks
6. Malware Threats(Virus, Trojan, Worms)
7. Sniffing
8. Social Engineering
9. Denial-of-Service
10. Session Hacking
CRAW Security
1. Hacking Web servers
2. Hacking Web Applications
3. SQL Injection
4. Hacking Wireless Networks
5. Hacking Mobile Platforms
6. Evading IDS, Firewalls, and Honeypots
7. Cloud Computing
8. Cryptography
9. Kali-Linux Hands-On Training
10. Penetration Testing
CRAW Security
What will you learn?
Contact Us
CRAW Security
1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab,
Saket Metro Station, New Delhi- 110030
Call Us
011-40394315 | +91-9650202445 | +91-9650677445
Mails Us
training@craw.in
Visit Us
www.crawsecurity.com | www.craw.in
CRAW Security
CRAW Security
THANK YOU
IT HAS BEEN A PLEASURE!

More Related Content

What's hot

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
Rashid Khatmey
 
CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?
Mercury Solutions Limited
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
Cybereason
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have Changed
MITRE - ATT&CKcon
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
Sanjoy Debnath
 
Cybersecurity career options & Getting started
Cybersecurity career options & Getting started  Cybersecurity career options & Getting started
Cybersecurity career options & Getting started
Balaji Rajasekaran
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
Captain898
 
30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro 30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro
Paula Januszkiewicz
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple Team
Priyanka Aash
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
ProtectWise
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
Paulo R
 
Practical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} HackathonPractical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} Hackathon
Stefan Streichsbier
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
What's a MITRE with your Security?
What's a MITRE with your Security?What's a MITRE with your Security?
What's a MITRE with your Security?
MITRE - ATT&CKcon
 

What's hot (20)

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have Changed
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
 
Sanjoy_Debnath_Resume
Sanjoy_Debnath_ResumeSanjoy_Debnath_Resume
Sanjoy_Debnath_Resume
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
Cybersecurity career options & Getting started
Cybersecurity career options & Getting started  Cybersecurity career options & Getting started
Cybersecurity career options & Getting started
 
assign3.docx
assign3.docxassign3.docx
assign3.docx
 
30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro 30 Cybersecurity Skills You Need To Become a Windows Security Pro
30 Cybersecurity Skills You Need To Become a Windows Security Pro
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple Team
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
 
Practical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} HackathonPractical Secure Coding Workshop - {DECIPHER} Hackathon
Practical Secure Coding Workshop - {DECIPHER} Hackathon
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
What's a MITRE with your Security?
What's a MITRE with your Security?What's a MITRE with your Security?
What's a MITRE with your Security?
 

Similar to Certified Ethical Hacking (CEH V9) Course Details | EC-Council

7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
CCNMumbai
 
Ceh3
Ceh3Ceh3
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
InfosecTrain Education
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
priyanshamadhwal2
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
infosec train
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
infosecTrain
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
Infosec train
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
FloydCarrasquillo
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
Skillogic Solutions
 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad January
Skillogic Solutions
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
Skillogic Solutions
 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptx
Skillogic Solutions
 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai January
Skillogic Solutions
 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024
Skillogic Solutions
 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024
Skillogic Solutions
 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai February
Skillogic Solutions
 
Ethical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxEthical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptx
Skillogic Solutions
 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
Skillogic Solutions
 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
Skillogic Solutions
 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
Skillogic Solutions
 

Similar to Certified Ethical Hacking (CEH V9) Course Details | EC-Council (20)

7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
 
Ceh3
Ceh3Ceh3
Ceh3
 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad January
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptx
 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai January
 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024
 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024
 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai February
 
Ethical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptxEthical Hacking Course in Chennai January.pptx
Ethical Hacking Course in Chennai January.pptx
 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
 

More from CRAW CYBER SECURITY PVT LTD

Oracle summer internship training in Delhi
Oracle summer internship training in DelhiOracle summer internship training in Delhi
Oracle summer internship training in Delhi
CRAW CYBER SECURITY PVT LTD
 
Android Development Summer Internship in Delhi
Android Development Summer Internship in DelhiAndroid Development Summer Internship in Delhi
Android Development Summer Internship in Delhi
CRAW CYBER SECURITY PVT LTD
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
CRAW CYBER SECURITY PVT LTD
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
CRAW CYBER SECURITY PVT LTD
 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltails
CRAW CYBER SECURITY PVT LTD
 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
CRAW CYBER SECURITY PVT LTD
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
CRAW CYBER SECURITY PVT LTD
 

More from CRAW CYBER SECURITY PVT LTD (7)

Oracle summer internship training in Delhi
Oracle summer internship training in DelhiOracle summer internship training in Delhi
Oracle summer internship training in Delhi
 
Android Development Summer Internship in Delhi
Android Development Summer Internship in DelhiAndroid Development Summer Internship in Delhi
Android Development Summer Internship in Delhi
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltails
 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 

Recently uploaded

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Certified Ethical Hacking (CEH V9) Course Details | EC-Council

  • 2. Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the rest part of a 3 part EC-Council Information Security. Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mind-set in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mind-set so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely daren't way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. CRAW Security
  • 3. Here, you will be exposed to an entirely daren't way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these have phases are provided in detail in an encyclopaedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and x the problems before they are dented by the enemy, causing what could potentially be a catastrophic damage to your respective organization. Throughout the CEH course, you will be immersed in a hacker's mind-set, evaluating not just logical, but physical security. Course Description CRAW Security
  • 4. Target to Audience Individuals  School Students  College Students  IT Professionals  IT Officers  IT and LAW Officers Corporates  IT Training Firms  IT Consultants  IT Experts  IT Officers  IT Institutions & Colleges  IT Graduated or Computer Science Students CRAW Security
  • 5. Duration of Program  1 Month (2 Hours per Day )  15 Days (4 Hours per Day)  8 Days (5-6 Hours per Day)  5 Days (8 Hours per Day) CRAW Security
  • 6. Certification The Certified Ethical Hacker Exam (CEH V9) 312-50 may be taken on the last day of the training (optional). Students need to pass the online exam to receive CEH Cortication. Learning Track CRAW Security
  • 8. What we try to Give We try to give you real industry standards with best possible quality to all our customers and clients. We focus on Various sections of Society and running a national level campaign to literate Students from all parts of company who can’t Afford “Basic IT Computer Training”. We wish we could teach as many students from all over the world and make it a beautiful place to work. We work on minimum gross margins to strength the Indian It infrastructure. CRAW Security
  • 10. What is New in the CEHV9 Course This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed Online Training and Testing Labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As “a picture tells a thousand words”, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 1 Month, 15 Days, 8 Days and 5 Days hands on class by our Certified Instructor. The goal of this course is to help you master an Ethical Hacking methodology that can be used in a Penetration Testing or Ethical Hacking situation. CRAW Security
  • 12. What will you learn? 1. Introduction to Ethical Hacking 2. Foot printing and reconnaissance 3. Scanning Networks 4. Enumeration 5. System Networks 6. Malware Threats(Virus, Trojan, Worms) 7. Sniffing 8. Social Engineering 9. Denial-of-Service 10. Session Hacking CRAW Security
  • 13. 1. Hacking Web servers 2. Hacking Web Applications 3. SQL Injection 4. Hacking Wireless Networks 5. Hacking Mobile Platforms 6. Evading IDS, Firewalls, and Honeypots 7. Cloud Computing 8. Cryptography 9. Kali-Linux Hands-On Training 10. Penetration Testing CRAW Security What will you learn?
  • 14. Contact Us CRAW Security 1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab, Saket Metro Station, New Delhi- 110030 Call Us 011-40394315 | +91-9650202445 | +91-9650677445 Mails Us training@craw.in Visit Us www.crawsecurity.com | www.craw.in CRAW Security
  • 15. CRAW Security THANK YOU IT HAS BEEN A PLEASURE!