Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses

Certified Ethical Hacker - CEH v12

CEH v12 is the latest version of Certified Ethical Hacker, an industry-standard certification in the field of ethical hacking and cybersecurity.

Rated : 4.9 9589 views Duration :5 Days Level : Intemediate
Last Updated: 2023-04-25 06:04:13 English Delivery Format: Live Training
Live Training
$585 $90035% off
5 days left at this price!
Next Batch Starting on:

May 22 - May 26

10:30 AM to 01:30 PM EST

30-Day Money-Back Guarantee

It Includes

  • 5 Days training program
  • Live Virtual Training
  • Learn on any PC/Mobile/Tablet
  • Unlimited Doubt Sessions
  • Online Labs (if applicable)
  • Official Courseware & Kits
  • Get Recording after session
  • Get Certificate of Completion
  • Mock Tests & Exam Preps
  • Classroom Training (Optional)

Training 2 or more people?

Get a custom quote for group training, Onsite & classroom options.

Request a Quote

Course Overview

COURSE OBJECTIVE

A Certified Ethical Hacker(CEH) professional is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH recognizes attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike black hat hackers, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty analysts are expert ethical hackers who use their attack skills to reveal vulnerabilities in the systems.

The Certified Ethical Hacker- CEH v12 Training Program certification is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired and demanding information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is considered as a standard within the information security community.

Who Should Attend?

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Pre-requisites

    • Participants should have good knowledge and understanding of OS, TCP/IP and Network.
    • Basic understanding of network essentials, core concepts including server and network components.

Course Outline

  • Introduction to Ethical Hacking

    Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

  • Foot Printing and Reconnaissance

    Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.

  • Scanning Networks

    Learn different network scanning techniques and countermeasures.

  • Enumeration

    Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.

  • Vulnerability Analysis

    Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools.

  • System Hacking

    Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities.

  • Malware Threats

    Learn different types of malware (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures.

  • Sniffing

    Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

  • Social Engineering

    Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

  • Denial-of-Service

    Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

  • Session Hijacking

    Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

  • Evading IDS, Firewalls, and Honeypots

    Get introduced to firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

  • Hacking Web Servers

    Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

  • Hacking Web Applications

    Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

  • SQL Injection

    Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures.

  • Hacking Wireless Networks

    Understand different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi sedcurity tools, and countermeasures.

  • Hacking Mobile Platforms

    Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

  • IoT and OT Hacking

    Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.

  • Cloud Computing

    Learn different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.

  • Cryptography

    Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

EC-Council’s sole purpose is to build and refine the cybersecurity profession globally. We help individuals, organizations, educators, and governments address global workforce problems by developing and curating world-class cybersecurity education programs and their corresponding certifications.

EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program, followed by a variety of other cyber programs, including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.

View More...

Frequently Asked Questions

  • How long does it take to become a certified ethical hacker?

    Certified Ethical Hacker (CEH v12) course certification, which typically involves five days of training, is also available. Those who complete this certification will learn about the latest cybersecurity threats and develop the practical hacking skills needed to work as an ethical hacker.
  • What do certified ethical hackers do?

    A certified ethical hacker is a skilled individual who uses the same knowledge and tools as a malicious hacker, but who does so in a lawful and legitimate manner to assess the security risks of a network or system.
  • Is it hard to be a hacker?

    Hacking is a difficult skill that takes quite a while to develop and is almost impossible to master, but the puzzle of it will captivate you forever.
  • Are ethical hackers in demand?

    One of the most in-demand positions in this field is that of an ethical hacker—an IT professional who purposefully penetrates networks and systems to find and fix potential vulnerabilities. If you are looking to put on your “white hat” and infiltrate systems for good, this position can be a great career opportunity.
  • How does Live Training works?

    Live training, also known as online training, is a method of delivering training in real-time over the internet. The trainer and the trainees are connected through video conferencing software, allowing for interactive communication and collaboration. During live training, the trainer can present materials, lead discussions, answer questions, and engage with the trainees in real-time.
  • Does Learnfly offer Classroom & Onsite training as well?

    Yes. We Do! We do offer classroom, onsite, group sessions & 1 on 1 training for selective courses. Contact our support team and our team will assist you with the process.
  • Do you provide certification and exam assistance?

    Yes! We provide assistance in scheduling & preparing for your exam after a successful training completion. Once you successfully pass your exam, you will be awarded with a certification.
  • What if I miss my scheduled class or want to reschedule?

    No worries. You can simply request for the next date as per your availability.
  • Can I change the trainer if not satisfied?

    We only provide highly qualified and certified trainers with 100% satisfaction rate. However, if you are not satisfied with the trainer, you can request for a free replacement.
  • Do I get a lab access with the course?

    Yes! If your training require a lab access, then it will be included in the price.
  • Is Learnfly accredited?

    Yes! Learnfly is accredited with many renowned vendors like Microsoft, ISACA, VMWare, PECB, EC Council. Cisco and many more.
  • Are Learnfly Instructor's Certified?

    Yes. We only provide training via Certified Instructors.
  • Where is Learnfly Located?

    Learnfly is a global training provider with locations in India, United States, United Kingdom, UAE, Australia & Africa.
  • Does Learnfly offer after training support?

    Yes. We offer 1 month free support after your training completion for any queries related to your course, examination etc.
  • What is Learnfly Platform?

    Learnfly Platform is an omnnichannel Learning Management System that allows you to access thousands of self paced courses, attend live classes, track certifications, access interactive quizzes & assignments, Online labs, connect with Instructors & do much more. Join the platform to know more.
  • Do you offer a demo live session with an instructor?

    Yes! If you need a demo session to get a feel of live training or to evaluate an instructor, then you can request for a 15 minutes free live session. Connect with our training team for more info.
  • Can I get a refund if not satisfied?

    All of our training comes with 30 days money back guarantee. Refunds are only applicable on instructor training. Exam, labs are non-refundable.
  • How can I make a payment for my training?

    We accept all major payment methods like debit/credit card, PayPal and Bank Wire transfer. For bank transfer, please contact us at support@learnfly.com
  • How can i get started?

    Super! Simply click on "Book Now" button on this page to reserve your seat and make a payment. You can choose from available schedules or provide your own. For anything else like quotation, purchase order, bank wire details etc, please contact our training team at support@learnfly.com. See you learning with us soon!
How it Works?
01
Choose your live class topic
Browse from 250+ live class sessions and topics on Learnfly platform. Learn from the comfort of your home or office.
02
Book and Schedule your class
Book online & reserve your seat for the live class. You can select from available schedule or provide your preferred dates and time during signup process.
03
Make online payment
Make payment for the live class with debit/credit card or paypal. Pay in your preferred currency & with easy EMI* option. EMI option is available in selected countries.
04
Check for Confirmation
Once you make successful payment, your live class will be confirmed and details will be available on your dashboard. We will also send you an email with confirmation with other details.

Certification Partners

Meet our official certification partners. Get Certified with internationally recognised names.

Earn International recognition and certification

Earn International recognition and certification

Get Certified : Get Ahead

Get your own personalized Certificate of Completion, once you successfully complete the training with Learnfly. Showcase your certifcation on Linkedin & more.

250k+ Students and growing.

Listen what they say about Learnfly Courses

More in Tech & IT

$900
Enquire Now

Students learning on Learnfly works with Fortune 500 companies around the globe.

Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Reset Password
Enter your email address and we'll send you a link to reset your password.