Certified Ethical Hacker (CEH)
Learning Objectives
Introduction to Ethical Hacking, Footprinting and Reconnaissance,
Scanning Networks, Enumeration, Vulnerability Analysis, System Hacking
Malware Threats, Sniffing, Social Engineering, Denial-of-Service
Session Hijacking, Evading IDS, Firewalls, and Honeypots
Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks
Hacking Mobile Platforms, IoT Hacking, Cloud Computing, Session Hijacking
Course Schedule
Lesson 1:
Topics:
- Module 01: Introduction to Ethical Hacking
- Module 02: Footprinting and Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
Labs:
- Information gathering & Google hacking
- Finding information in Wireshark, Using Wireshark to sniff network traffic
- NMAP host discovery and port scanning, scanning remote system
- Vulnerability scanning with Nessus
Lesson 2:
Topics:
- Module 06: System Hacking
- Module 07: Malware Threats
- Module 08: Sniffing
- Module 09: Social Engineering
- Module 10: Denial-of-Service
Labs:
- Metasploit from the command line
- Metasploit with Armitage
- Metasploit with Armitage client-side attack
- Creating a Trojan with Metasploit
- ARP poisoning with Ettercap
- Hiding files with alternate data streams (ADS)
Lesson 3:
Topics:
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
Labs:
- Web app vulnerabilities with rational Appscan
- Intercepting and Spidering with Burp
- Web application vulnerabilities with Webgoat
- Password hash cracking with John the Ripper
- Website password guessing with Burp Suite
Lesson 4:
Topics:
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Labs:
- Configuring and using SNORT and creating a backdoor with NetCat
- Router SNMP hacking
- Custom password list with CUPP, password cracking with John the Ripper
- Cracking WEP Keys, Cracking WPA2 – PSK Keys
- Discovering hidden SSIDS
Training program
A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
In its 12th version, the Certified Ethical Hacker provides comprehensive training, handson learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.
The C|EH® exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test your skills in information security threats and attack vectors, attack detection, attack prevention, procedures, methodologies, and more!
Register For Class
Date |
Type |
Location |
|
---|---|---|---|
February: 10, 11, 12, 13, 14 & Feb 17, 18, 19, 20, 21, 2025 - 6 PM - 10 PM (EST) | In-Person & Virtual | Register | |
February: 15, 16 & Feb 22, 23, 2025 - 8 AM - 6 PM (EST) | In-Person & Virtual | Register | |
March: 17, 18, 19, 20, 21 & Mar 24, 25, 26, 27, 28, 2025 - 6 PM - 10 PM (EST) | In-Person & Virtual | Register | |
April: 21, 22, 23, 24, 25 & Apr 28, 29, 30, May 1, 2, 2025 - 6 PM - 10 PM (EST) | In-Person & Virtual | Register | |
May: 3, 4 & May 10, 11, 2025 - 8 AM - 6 PM (EST) | In-Person & Virtual | Register | |
July: 12, 13 & Jul 19, 20, 2025 - 8 AM - 6 PM (EST) | In-Person & Virtual | Register | |
February: 9, 10, 11, 12, 13 & Feb 16, 17, 18, 19, 20, 2026 - 6 PM - 10 PM (EST) | In-Person & Virtual | Register |
NOT SURE WHERE TO START?
Private Team Training
Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training
For details, call 704-554-3827
Come Learn With Intellectual Point
Price Match Guarantee!
We will match Competitor’s Price Quote.
Call for more details 703-554-3827
A Certified Ethical Hacker Course at Intellectual Point Includes:
- Live instructor-led training in modern classrooms
- Hands-on labs on real tools like Kali Linux, Metasploit, WireShark, Nmap, etc.
- 24 x 7 access to the real labs in classrooms and remotely
- Confidence building hands-on training led by industry experts
- Authorized Pearson VUE Testing at the same location to help you complete your exam*
- 100% latest material, notes, videos, and practice questions included in the course price