CEH training Certification

Certified Ethical Hacker (CEH V9) Training & Certification

The World's most advanced Ethical Hacking & Penetration Testing Program

Course Description

EC-Council's Certified Ethical Hacker is a skilled professional who has the knowledge of weaknesses and vulnerabilities of the system and how to breach the target system as a hacker's perspective, but in a lawful and legitimate manner.This course prepares for EC-Council Certified Ethical Hacker exam 312-50.

This course is helpful in mastering the advance concept of Ethical Hacking like google hacking techniques, creating virus, exploit code writing, reverse engineering to find out flaws in the application and securing network with network packet analysis. The students will get to learn how to exploit as well as secure their web servers eg Apache http Server, IIS server and Database servers like Oracle, MySQL and the Windows, UNIX, Linux operating Systems and Network devices like IDS, IPS, firewall and routers along with the concept of Cloud computing and Mobile device hacking.

Course Objective

  • Advance google hacking techniques to gather publicly available information.
  • Penetration into network system to find out the weakness using various tools.
  • Learn how to exploit the vulnerabilities in your system with latest techniques.
  • Learn packet crafting and packet sniffing for a network.
  • Learn various techniques of social engineering, buffer overflow, virus creation.
  • In-depth knowledge of IDS, Firewall and honeypot.
  • Wireless hacking concepts.
  • Learn mobile devices hacking and cloud computing threats.
  • Latest web application and mobile application hacking techniques.
  • SSL (Secure Socket Layer) pretesting for Heartbleed, CRIME, BEAST etc.
  • Latest virus, backdoors, malware, ransomware.
  • Knowledge of Information security laws, standards and controls.
  • Ultimately it prepares the students to handle IT security issues more effectively.
  • Hands on with Kali linux.

What Is New In The CEH v9 Course

This is the worlds most advanced ethical hacking training course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

EC Council security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. In short, you walk out the door with advanced hacking skills that are highly in demand, as well as the internationally recognised Certified Ethical Hacker (CEH) Training Certification.

Who Should Attend

The Certified Ethical Hacking - CEH Training Course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Certified Ethical Hacker or CEH V9 is the most sought-after certification for those who are keen to pursue a career in Cyber security and penetration testing.
  • The course is designed in such a way so that it includes in depth knowledge of network, web application, mobile, WIFI hacking and countermeasures and other domains which provides endless job opportunities.
  • One can become a network security analyst, application security analyst, or a security manager after earning CEH certification.
  • Certified Ethical Hackers are highly paid with relevant experience in government, corporate and consulting jobs.
  • It is an interesting and challenging field where you have to think like a hacker to defeat them. So, if you have an ability to think out of the box and problem-solving skills with an interest in IT security CEH is the best option.

Modules Covered

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls, and Honeypots
  • Cloud Computing
  • Cryptography

Additional Topics

  • Trojans & Backdoors
  • Virus & Worms
  • Buffer Overflow
  • Introduction of Penetration Testing

Course Duration

  • Fast Track : 5 Days (8 Hours/Day)
  • Regular Track : 5 Weeks (2 Hours/Day)
  • Weekend Track : 6 Weekends (4 Hours/Day)

CEH Exam Certification Info

  • Exam Type : ECC Exam Portal
  • Exam Name : CEH (312-50) Exam
  • Exam Duration : 4 Hours
  • Passing Score : 70%
  • Number of Question : 125 Nos.
  • Test Format : Multiple Choice
  • Test Delivery : Prime Prometric (IBT)

Kit Include

  • EC-Council authorized Electronic Courseware, Lab Manuals & Tools
  • CEH v9 Certification from EC-Council (After clearing the exam)
  • Information Security Analyst authorized certificate from Codec Networks

Post Training Program (Codec Networks Specialty)

  • One Live Project Work
  • Extensive Exam Preparation Classroom Training (4 Classes)
  • Hand-over Labs & Practical´s Checklist for review

Why Codec Networks

Codec Networks provides the Best Ethical Hacking Training in Delhi NCR . Here we have an environment exactly like the actual one where they will be taught how to perform information gathering, scanning, getting access i.e. hacking, maintaining access, clearing tracks as well as how to secure their own networks. We have intensive lab environment where the student will gain practical knowledge with reference to the current security attacks and threats scenarios well-built simulated lab where the students can perform the practical under the supervision of experienced trainers who are working in the cybersecurity domains. The whole concept is to provide practical knowledge along with concept clearing in Cyber Security which is useful from career perspective in the organisation as well as for the security enthusiasts, entrepreneur. At the end of training students will have a good understanding and hands on experience in IT Security.