Certified Ethical Hacker Pro | CEH v13

Immerse yourself in the life of a real Hacker

Requirements:
  • English language

Beating a Hacker means thinking like a Hacker

EC-Council's Certified Ethical Hacker (C|EH) literally takes you into the deepest hacking techniques. The knowledge gained will help you build cyber security at a level that can withstand the latest hacking techniques and attacks.

Most common graduates:

  • CIO, Security Manager

  • Network security & Site administrators

  • Computer Network Auditor (CNA), Analyst (CNA), Defense (CND)

  • Infrastructure Support, IS/IT Specialist & Manager, Forensic Analyst

What will you learn

More information
  • Learn professional hacking in just 5 days
  • Learn hacking procedures and techniques
  • Master the 20 most important security areas
  • Strengthen security with tools that are used for cyber crimes

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 SOCIAL ENGINEERING
  • Overview
  • Identity theft
  • Techniques, insider threats
  • Impersonation on social sites
  • Social engineering countermeasures
10:30 – 10:45 Coffee break
10:45 – 12:15 DENIAL-OF-SERVICE
  • Attacks
  • Botnet network
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • DoS & DDoS attack techniques, tools
12:15 – 13:15 Lunch break
13:15 – 14:45 SESSION HIJACKING
  • Hijacking concepts
  • Session hijacking tools
  • Application & network level hijacking
14:45 – 15:00 Coffee break
15:00 – 17:00 IDS, FIREWALLS & HONEYPOTS
  • Solutions for
  • IDS, Firewall & Honeypot
  • Techniques to detect honeypots
  • Techniques to bypass IDS, firewalls

2nd Day

09:00 – 10:30 ETHICAL HACKING INTRO
  • Security Trends
  • Information Security Threats. Attack
  • Hacking concepts, types, and phases
10:30 – 10:45 Coffee break
10:45 – 12:15 FOOTPRINTING & RECONNAISSANCE
  • Footprinting concepts, tools
  • Advance google hacking techniques
  • Website, email, social engineering, search engines, network footprinting
12:15 – 13:15 Lunch break
13:15 – 14:45 SCANNING NETWORKS
  • Overview
  • Drawing network diagrams
  • Understanding different techniques
  • Proxies and Anonymizer for attack
  • Vulnerability scanning, IP Spoofing, Pen Testing
14:45 – 15:00 Coffee break
15:00 – 17:00 ENUMERATION
  • Enumeration Concepts
  • Overview of enumeration pen testing
  • NetBIOS, SNMP, LDAP, NTP, SMTP and DNS Enumeration

3rd Day

09:00 – 10:30 HACKING WEB SERVERS
  • Webserver concepts, attacks
  • Webserver attack tools, security tools
  • Overview of Webserver penetration testing
HACKING WEB APPLICATIONS
  • Concepts, threats
  • Hacking methodology
  • Hacking tools, security tools
10:30 – 10:45 Coffee break
10:45 – 12:15 SQL INJECTION
  • Concepts, attacks
  • SQL injection tools
  • SQL injection methodology
  • Different IDS evasion techniques
12:15 – 13:15 Lunch break
13:15 – 14:45 HACKING WIRELESS NETWORKS
  • Concepts, threats
  • Wireless security tools
  • Hacking tools, techniques
  • Wireless encryption algorithms
14:45 – 15:00 Coffee break
15:00 – 17:00 HACKING MOBILE PLATFORMS
  • Attack platform vectors
  • iOS threats & attacks
  • Android threat & attacks
  • Windows Phone OS attacks
  • Blackberry threats and attacks
  • Mobile device management (MDM)
  • Security Guidelines and security tools
  • Overview of Mobile Penetration Testing

4th Day

09:00 – 10:30 VULNERABILITY ANALYSIS
  • Vulnerability life cycle
  • Various approaches to analysis
  • Vulnerability analysis tools & techniques
10:30 – 10:45 Coffee break
10:45 – 12:15 SYSTEM HACKING
  • CEH Hacking Methodology
  • Hide the evidence of compromise
  • Techniques to gain access to the system
  • Understanding privilege escalation techniques
  • Create and maintain remote access to the system
  • Rootkits, Steganograpy, Steganalysis, penetration testing
12:15 – 13:15 Lunch break
13:15 – 14:45 MALWARE THREATS
  • Malware techniques
  • Techniques to detect malware
  • Trojans, how to infect systems
  • Overview of viruses, their types, how they infect files
14:45 – 15:00 Coffee break
15:00 – 17:00 SNIFFING
  • Overview
  • ARP, DNS Poisoning
  • Sniffing tools,Pen Testing
  • Understanding MAC, DHCP attacks
  • Various techniques to detect sniffing

5th Day

09:00 – 10:30 IOT HACKING
  • IoT Attacks
  • IoT Hacking
  • IoT Security Tools
  • Cryptography tools
  • Various IoT threats and attacks
10:30 – 10:45 Coffee break
10:45 – 12:15 CLOUD COMPUTING
  • Concepts
  • Threats & Attacks
  • Cloud Computing Security
  • Cloud computing Security tools
  • Overview of Cloud Penetration testing
12:15 – 13:15 Lunch break
13:15 – 14:45 CRYPTOGRAPHY
  • Concepts
  • Cryptography tools
  • Cryptanalysis tools
  • Encryption algorithms
  • Public Key Infrastructure (PKI)
  • Understanding disk encryption
  • Understanding email encryption
  • Understanding Cryptography attacks
14:45 – 15:00 Coffee break
15:00 – 17:00 Závěr
  • Revize znalostí
  • Komentáře s vysvětlením
  • Informace k certifikační zkoušce
  • Block length 90
  • Teaching hours 40
  • Refreshments Yes
  • Exam Yes

The intensive 5-day course is designed to give you in-depth knowledge and skills through hands-on exercises in a virtualized environment with up-to-date systems, security tools and techniques.

Classes begin with an understanding of external perimeter defense. You will then learn how to scan and attack your own networks. Evaluate the results. We then move into the study of intrusion detection, social engineering, DDos attacks, virus creation. Next, how to use buffer overflow (memory overflow) to reach the server, rewrite code to get into the computer, and other techniques needed to defend against cyber attacks.

Prestigious certification included

Certified Ethical Hacker Pro | C|EH

EC-Council's C|EH certification is accredited by the American National Standards Institute (ANSI). TAYLLORCOX has successfully met these strict accreditation rules and high quality teaching requirements.

Number of questions: 125 in the distribution: Ethics - 3 questions (2%). Security - 31 questions (25%). Background - 5 questions (4%). Regulation / Policy - 5 questions (4%). Analysis / Assessment - 16 questions (13%). Procedures / Methodology - 25 questions (20%). Tools / Systems / Programs - 40 questions (32%).

Certification instructions

Exam format

Time limit: 4 hours

Language: English

Number of attempts: 3

Number of questions: 125

Exam format: multiple-choice

Exam Code C|EH 12: ECC EXAM, VUE. Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Frequently asked questions

All questions

What is EC-Council?

The International Council of E-Commerce Consultants is an international organization specializing in cybersecurity and information technology (IT) certification.

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.

How does the EC-Council final exam and certification work?

As part of the training, you will get access to virtual laboratories and you will receive an exam voucher. The exam can be taken in three ways:

• computer-based at TAYLLORCOX Campus

• computer-based at the Pearson VUE test center

• computer-based with an online proctor

You will get the results right after completing the exam. If you pass your exam, you will receive your EC-Council certificate within 2-3 working days.

Your next career step