Course Date | Start Time | End Time | Time Zone | Location | Days | Price | |
---|---|---|---|---|---|---|---|
Dec 9, 2024 | 09:00 | 05:00 | EST | Live Virtual Class | 5 | $4,400 CAD | Purchase |
Mar 10, 2025 | 09:00 | 05:00 | EDT | Live Virtual Class | 5 | $4,400 CAD | Purchase |
Jun 9, 2025 | 09:00 | 05:00 | EDT | Live Virtual Class | 5 | $4,400 CAD | Purchase |
Sep 8, 2025 | 11:00 | 07:00 | EDT | Live Virtual Class | 5 | $4,400 CAD | Purchase |
Dec 8, 2025 | 09:00 | 05:00 | EST | Live Virtual Class | 5 | $4,400 CAD | Purchase |
Certified Ethical Hacker
CEH is the leading ethical hacking training and certification program in cybersecurity. Students audit a system for weaknesses and vulnerabilities using the same tools and exploits as malicious hackers, but under proper legal circumstances and in the best interest of assessing the security posture of a target system and organization. It teaches how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
Duration: 5 days
Audience:
- Information Security Analyst/Administrator
- Information Security Manager/Specialist
- Information Assurance (IA) Security Officer
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
Learning Objectives
- Key issues plaguing the information security world, incident management process, and penetration testing
- Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Different types of webserver attacks, attack methodology, and countermeasures
- Different types of web application attacks, web application hacking methodology, and countermeasures
- SQL injection attacks and injection detection tools
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
- Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
- Various cloud computing concepts, threats, attacks, and security techniques and tools
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
- Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
- Different threats to IoT platforms and learn how to defend IoT devices securely
Topics
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography