Certified Ethical Hacker Master

Learn to overcome the challenges of everyday life

Requirements:
  • English

The C|EH Master gives you the opportunity to prove to your employer, your colleagues and most importantly to yourself that you can actually take on and overcome the challenges of everyday life as an ethical hacker.

To prove this, we do not provide you with mock exams. We test your skills with real-world challenges in a real-world, time-constrained environment like you would find in your job.

Target audience:

  • CIO, Security Manager

  • Network security & Site Administrators

  • Computer Network Auditor (CNA), Analyst (CNA), Defense (CND)

  • Infrastructure Support, IS/IT Specialist & Manager, Forensic Analyst

What will you learn

More information
  • Learn to think like a hacker
  • Learn to master ethical hacking methodology
  • Test your skills with real-world challenges in real-world environments
  • Get to know the basics and practical experience that are needed to successfully pass the certification exam

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 SOCIAL ENGINEERING
  • Overview
  • Identity theft
  • Techniques, insider threats
  • Impersonation on social sites
  • Social engineering countermeasures
10:30 – 10:45 Coffee break
10:45 – 12:15 DENIAL-OF-SERVICE
  • Attacks
  • Botnet network
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • DoS & DDoS attack techniques, tools
12:15 – 13:15 Lunch break
13:15 – 14:45 SESSION HIJACKING
  • Hijacking concepts
  • Session hijacking tools
  • Application & network level hijacking
14:45 – 15:00 Coffee break
15:00 – 17:00 IDS, FIREWALLS & HONEYPOTS
  • Solutions for
  • IDS, Firewall & Honeypot
  • Techniques to detect honeypots
  • Techniques to bypass IDS, firewalls

2nd Day

09:00 – 10:30 ETHICAL HACKING INTRO
  • Security Trends
  • Information Security Threats. Attack
  • Hacking concepts, types, and phases
10:30 – 10:45 Coffee break
10:45 – 12:15 FOOTPRINTING & RECONNAISSANCE
  • Footprinting concepts, tools
  • Advance google hacking techniques
  • Website, email, social engineering, search engines, network footprinting
12:15 – 13:15 Lunch break
13:15 – 14:45 SCANNING NETWORKS
  • Overview
  • Drawing network diagrams
  • Understanding different techniques
  • Proxies and Anonymizer for attack
  • Vulnerability scanning, IP Spoofing, Pen Testing
14:45 – 15:00 Coffee break
15:00 – 17:00 ENUMERATION
  • Enumeration Concepts
  • Overview of enumeration pen testing
  • NetBIOS, SNMP, LDAP, NTP, SMTP and DNS Enumeration

3rd Day

09:00 – 10:30 HACKING WEB SERVERS
  • Webserver concepts, attacks
  • Webserver attack tools, security tools
  • Overview of Webserver penetration testing
HACKING WEB APPLICATIONS
  • Concepts, threats
  • Hacking methodology
  • Hacking tools, security tools
10:30 – 10:45 Coffee break
10:45 – 12:15 SQL INJECTION
  • Concepts, attacks
  • SQL injection tools
  • SQL injection methodology
  • Different IDS evasion techniques
12:15 – 13:15 Lunch break
13:15 – 14:45 HACKING WIRELESS NETWORKS
  • Concepts, threats
  • Wireless security tools
  • Hacking tools, techniques
  • Wireless encryption algorithms
14:45 – 15:00 Coffee break
15:00 – 17:00 HACKING MOBILE PLATFORMS
  • Attack platform vectors
  • iOS threats & attacks
  • Android threat & attacks
  • Windows Phone OS attacks
  • Blackberry threats and attacks
  • Mobile device management (MDM)
  • Security Guidelines and security tools
  • Overview of Mobile Penetration Testing

4th Day

09:00 – 10:30 VULNERABILITY ANALYSIS
  • Vulnerability life cycle
  • Various approaches to analysis
  • Vulnerability analysis tools & techniques
10:30 – 10:45 Coffee break
10:45 – 12:15 SYSTEM HACKING
  • CEH Hacking Methodology
  • Hide the evidence of compromise
  • Techniques to gain access to the system
  • Understanding privilege escalation techniques
  • Create and maintain remote access to the system
  • Rootkits, Steganograpy, Steganalysis, penetration testing
12:15 – 13:15 Lunch break
13:15 – 14:45 MALWARE THREATS
  • Malware techniques
  • Techniques to detect malware
  • Trojans, how to infect systems
  • Overview of viruses, their types, how they infect files
14:45 – 15:00 Coffee break
15:00 – 17:00 SNIFFING
  • Overview
  • ARP, DNS Poisoning
  • Sniffing tools,Pen Testing
  • Understanding MAC, DHCP attacks
  • Various techniques to detect sniffing

5th Day

09:00 – 10:30 IOT HACKING
  • IoT Attacks
  • IoT Hacking
  • IoT Security Tools
  • Cryptography tools
  • Various IoT threats and attacks
10:30 – 10:45 Coffee break
10:45 – 12:15 CLOUD COMPUTING
  • Concepts
  • Threats & Attacks
  • Cloud Computing Security
  • Cloud computing Security tools
  • Overview of Cloud Penetration testing
12:15 – 13:15 Lunch break
13:15 – 14:45 CRYPTOGRAPHY
  • Concepts
  • Cryptography tools
  • Cryptanalysis tools
  • Encryption algorithms
  • Public Key Infrastructure (PKI)
  • Understanding disk encryption
  • Understanding email encryption
  • Understanding Cryptography attacks
14:45 – 15:00 Coffee break
15:00 – 17:00 Závěr
  • Revize znalostí
  • Komentáře s vysvětlením
  • Informace k certifikační zkoušce
  • Block length 90
  • Teaching hours 40
  • Refreshments Yes
  • Exam Yes

The intensive 5-day course is designed to give you in-depth knowledge and skills through hands-on exercises in a virtualized environment with up-to-date systems, security tools and techniques.

Classes begin with an understanding of external perimeter defense. You will then learn how to scan and attack your own networks. Evaluate the results. Then we move into the study of intrusion detection, social engineering, DDos attacks, virus creation. Next, how to use buffer overflow (memory overflow) to reach the server, rewrite code to get into the computer, and other techniques needed to defend against cyber attacks.

Prestigious certification included

C|EH Practical

EC-Council's C|EH certification is accredited by the American National Standards Institute (ANSI). TAYLLORCOX has successfully met these strict accreditation rules and high quality teaching requirements.

The C|EH Master exam consists of two parts. First, you must try and pass the exam with the option to choose from a more than proven C|EH Certified Ethical Hacker. Once you have completed this first step, you can move on to the second part of earning the C|EH Master designation, the C|EH practical exam.

Certification instructions

Exam format

C|EH Exam

Questions: 125

Time limit: 4 hours

Format: Multiple Choice

Test centers: ECC EXAM, VUE

Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

C|EH Practical

Questions: 20

Time limit: 6 hours

Min. success rate: 70%

Format: iLabs Cyber Range

Open Book Politics: Just Like In The Real World

Frequently asked questions

All questions

What is EC-Council?

The International Council of E-Commerce Consultants is an international organization specializing in cybersecurity and information technology (IT) certification.

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.

How does the EC-Council final exam and certification work?

As part of the training, you will get access to virtual laboratories and you will receive an exam voucher. The exam can be taken in three ways:

• computer-based at TAYLLORCOX Campus

• computer-based at the Pearson VUE test center

• computer-based with an online proctor

You will get the results right after completing the exam. If you pass your exam, you will receive your EC-Council certificate within 2-3 working days.