search3
    
    CEH V11 Training

    QUICK

    INFORMATION

    course-duration

    5 Day(s) Course

    courseware

    Official Courseware

    certified-trainer

    Certified Trainer

    exam-voucher

    Training

    customize-batch

    Customize Your Batch

    one-o-one

    1:1 Training Available on Demand

    Course Information

    cehv11

     

    Certified Ethical Hacker (CEH) Version 11 – Demanded By Employees. Respected By Peers.

    CEH provides an in-depth understanding of Ethical Hacking phases, Malicious Crimes, various attack vectors, and vulnerabilities and preventative countermeasures. The CEHv11 Training And certification course will enable you to think and act like malicious hacker so that you will be better positioned to set-up security infrastructure and safeguard from future attacks.

    CEHv11 training course make you understand weaknesses and vulnerabilities that assist organizations strengthen their system security controls to minimize the risk of an incident. CEH Live Online Course is developed to incorporate a hands-on environment and systematic process across ethical hacking domain and methodology, imparting an opportunity to work for proving the needed knowledge and skills for performing skills required for ethical hacking.

    In its 11th version, CEH continues to evolve with the latest tools, tactics, operating systems, exploits, and technologies.

    Here are some critical updates of CEH v11 to be implemented in CEHv11 Training and certification course:

    • Incorporating Parrot Security OS
    • Re-Mapped to NIST/NICE Framework
    • Enhanced Cloud Security, IoT, and OT Modules
      • Cloud−Based Threats
      • IoT Threats
      • Operational Technology (OT} Attacks
    • Modern Malware Analysis
    • Covering the Latest Threats - Fileless Malware
    • New Lab Designs and Operating Systems
    • Increased Lab Time and Hands−on Focus

    Industry’s Most Comprehensive Tools Library

    COURSE OUTLINE

    • Module 01: Introduction to Ethical Hacking
    • Module 02: Footprinting and Reconnaissance
    • Module 03: Scanning Networks
    • Module 04: Enumeration
    • Module 05: Vulnerability Analysis
    • Module 06: System Hacking
    • Module 07: Malware Threats
    • Module 08: Sniffing
    • Module 09: Social Engineering
    • Module 10: Denial-of-Service
    • Module 11: Session Hijacking
    • Module 12: Evading IDS, Firewalls, and Honeypots
    • Module 13: Hacking Web Servers
    • Module 14: Hacking Web Applications
    • Module 15: SQL Injection
    • Module 16: Hacking Wireless Networks
    • Module 17: Hacking Mobile Platforms
    • Module 18: IoT Hacking
    • Module 19: Cloud Computing
    • Module 20: Cryptography

    WHO SHOULD ATTEND

    • Information Security Analyst /Administrator
    • Information Assurance (IA) Security Officer
    • Information Security Manager/ Specialist
    • Information Systems Security Engineer / Manager
    • Information Security Professionals / Officers
    • Information Security / IT Auditors
    • Risk / Threat/Vulnerability Analyst
    • System Administrators
    • Network Administrators and Engineers

    Pre-requisites

    To be eligible to attempt the EC-Council CEH certification examination, you have two options:

    Attend Official Network Security Training by EC-Council:

    If you have completed an official EC-Council training either at an Accredited Training

    Center, via the iClass platform, or at an approved academic institution, you are eligible

    to appear for EC-Council exam without going through the application process.

     

    Attempt the Exam without Official EC-Council Training:

    In order to be considered for the EC-Council CEH exam without attending official network

    security training, you must have at least 2 years of work experience in the Information

    Security domain.

     

    If the candidate has the required work experience, you can submit an eligibility

    application form along with USD 100.00, a non-refundable fee

    Exam

    Name Code Fee
    CEH v10: Certified Ethical Hacker 312-50 -

    What Our Trainees Say

    Mercury Solutions Ltd. https://bit.ly/2H3ANjF is rated 4.6 stars by www.facebook.com/mercurysol based on 18 reviews.