The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”
This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
Curriculum
- 2 Sections
- 22 Lessons
- 10 Weeks
- What is New in CEH Version 1020
- 1.1Module 01: Introduction to Ethical Hacking
- 1.2Module 02: Footprinting and Reconnaissance
- 1.3Module 03: Scanning Networks
- 1.4Module 04: Enumeration
- 1.5Module 05: Vulnerability Analysis
- 1.6Module 06: System Hacking
- 1.7Module 07: Malware Threats
- 1.8Module 08: Sniffing
- 1.9Module 09: Social Engineering
- 1.10Module 10: Denial-of-Service
- 1.11Module 11: Session Hijacking
- 1.12Module 12: Evading IDS, Firewalls, and Honeypots
- 1.13Module 13: Hacking Web Servers
- 1.14Module 14: Hacking Web Applications
- 1.15Module 15: SQL Injection
- 1.16Module 16: Hacking Wireless Networks
- 1.17Module 17: Hacking Mobile Platforms
- 1.18Module 18: IoT Hacking
- 1.19Module 19: Cloud Computing
- 1.20Module 20: Cryptography
- 2

