New members: get your first 7 days of ITTutorPro Premium for free! Join for free

CEH (v11) - Certified Ethical Hacking Course

Course Description

Learn advanced processes in this Certified Ethical Hacking (CEH) course. In this online ethical hacking training, you will master advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers.

Ethical Hacking Course Overview

Simplilearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. This ethical hacking course is aligned with the latest CEH v11 by EC-Council and will adequately prepare you to increase your blue team skills.

CEH Course Key Features

  • 100% Money Back Guarantee
  • 40 hours of blended learning
  • Accredited training partner of EC-Council
  • 6 months free access to CEHv11 iLabs
  • Study material by EC-Council (e-kit)
  • 20 current security domains
  • Covers 340 attack technologies

Benefits

This ethical hacking certification verifies the skills required to thrive in the information security domain. Many IT departments have made CEH compulsory for security-related posts. CEH certified ethical hacker professionals earn 44-percent higher salaries than non-certified professionals.

Ethical Hacking Course Curriculum

Eligibility

This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.

Pre-requisites

There are no prerequisites to take up this ethical hacking certification training course.

Share on:

Course Syllabus

Course Content

Module 01- Introduction to Ethical Hacking
Lesson 01 – Information Security Overview22:30
1 Demo of Aspen and iLabs22:30
2 Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
3 Essential Terminology
4 Elements of Information Security
5 The Security, Functionality, and Usability Triangle
Lesson 02 – Information Security Threats and Attack Vectors01:56
1 Motives, Goals, and Objectives of Information Security Attacks
2 Top Information Security Attack Vectors
3 Information Security Threat Categories
4 Types of Attacks on a System01:56
5 Information Warfare
Lesson 06 – Penetration Testing Concepts
1 Penetration Testing
2 Why Penetration Testing
3 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
4 Blue Teaming/Red Teaming
5 Types of Penetration Testing
6 Phases of Penetration Testing
7 Security Testing Methodology
Lesson 03 – Hacking Concepts01:29
1 What is Hacking01:29
2 Who is a Hacker?
3 Hacker Classes
4 Hacking Phases
Lesson 04 – Ethical Hacking Concepts
1 What is Ethical Hacking?
2 Why Ethical Hacking is Necessary
3 Scope and Limitations of Ethical Hacking
4 Skills of an Ethical Hacker
Lesson 05 – Information Security Controls
1 Information Assurance (IA)
2 Information Security Management Program
4 Enterprise Information Security Architecture (EISA)
5 Network Security Zoning
6 Defense in Depth
7 Information Security Policies
8 Physical Security
10 What is Risk?
11 Threat Modeling
12 Incident Management
13 Security Incident and Event Management (SIEM)
14 User Behavior Analytics (UBA)
15 Network Security Controls
16 Identity and Access Management (IAM)
17 Data Leakage
18 Data Backup
19 Data Recovery
20 Role of AI/ML in Cyber Security
Lesson 07 – Information Security Laws and Standards
1 Payment Card Industry Data Security Standard (PCI-DSS)
2 ISO/IEC 27001:2013
3 Health Insurance Portability and Accountability Act (HIPAA)
4 Sarbanes Oxley Act (SOX)
5 The Digital Millennium Copyright Act (DMCA)
6 Federal Information Security Management Act (FISMA)
7 Cyber Law in Different Countries
Module 02- Footprinting and ReconnaissancePreview
Module 03- Scanning NetworksPreview
Module 04- EnumerationPreview
Module 05- Vulnerability AnalysisPreview
Module 06- System HackingPreview
Module 07- Malware ThreatsPreview
Module 08- SniffingPreview
Module 09- Social EngineeringPreview
Module 10- Denial-of-ServicePreview
Module 11- Session HijackingPreview
Module 12 – Evading IDS, Firewalls, and HoneypotsPreview
Module 13- Hacking Web ServersPreview
Module 14- Hacking Web ApplicationsPreview
Module 15- SQL InjectionPreview
Module 16- Hacking Wireless NetworksPreview
Module 17- Hacking Mobile PlatformsPreview
Module 18- IoT HackingPreview
Module 19- Cloud ComputingPreview
Module 20- CryptographyPreview

$1,995.00

  • Vast selection of courses and labs Access
  • Unlimited access from all devices
  • Learn from industry expert instructors
  • Assessment quizzes and monitor progress
  • Vast selection of courses and labs Access
  • Blended Learning with Virtual Classes
  • Access to new courses every quarter
  • 100% satisfaction guarantee

You Will Get Certification After Completetion This Course.

Instructor Led Lectures
All IT Tutor Pro Formerly It Nuggets Courses replicate a live class experience with an instructor on screen delivering the course’s theories and concepts.These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast forwarded.
Visual Demonstrations, Educational Games & Flashcards
IT Tutor Pro Formerly It Nuggets recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we delivery our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Practice Quizzes And Exams
IT Tutor Pro Formerly It Nuggets Online’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
IT Tutor Pro Formerly It Nuggets provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.

Frequently Asked Questions

How does online education work on a day-to-day basis?
Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.
Is online education as effective as face-to-face instruction?
Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.
Do employers accept online degrees?
All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.
Is online education more conducive to cheating?
The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.
How do I know if online education is right for me?
Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
What technical skills do online students need?
Our platform typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.
preloader