DCS – Diploma in Cyber Security
EC-Council CEH v11
Live Interactive Practical
Certified Ethical Hacker
Program
5/5
| 12567+
Satisfied learners
- 40 hours of Instructor-Led Training
- EC-Council Authorized Training Partner
- EC-Council Official Courseware
- Certified EC-Council Instructor (CEI)
Become an Certified Ethical Hacker
120678+
Students Enrolled
On/Offline
Mode of Training
2 Months
Course Duration
No Cost EMI
Easy EMI Option
CEH Course Key Features
- EC-Council CEHv11 Certification- Exam voucher exclusive
- iLab & Virtual Labs for Practical
- Hands-on training with live demonstrations for all modules
- Learn from Basics to Advanced
- EC-Council Certified Instructors having with 5-10 years of work ex.
- Get certified at an affordable price
- Study material by EC-Council (e-kit)
- 99.9% Passing Rate
It’s Time to Invest Yourself!
CEHv11 Course Details
CEH Course Content / Exam(s)
Why CEHv11?
Course Objective
Course Outline
Who is it for
Eligibility & Prerequisites
About The Exam
Brochure
Why CEHv11?
Nowadays almost everyone has gone online. People have smartphones, computers, or laptops in their hands, on which they are starting to share everything personal and professional. In such a situation cybercrime such as email hacking, data theft, virus attack, password cracking, credit card number theft, and stealing secret data are also increasing rapidly.
According to a survey conducted by the International Data Corp, there is a demand for over 60,000 information security personnel worldwide. In India alone, the number is expected to grow by over 77,000 and 188,000 worldwide in the next few years. Talented Ethical Hackers can look for making their career in some of the big names in the IT sector including Wipro, Dell, Reliance, Google, Accenture, IBM, and Infosys.
EC-Council’s CEH V11 certification training focuses to train aspiring security professionals to gain essential ethical hacking skills with the practical implementation of scanning, testing, hacking, and securing the systems. The CEH V11 training and certification from ICSS features:
- Inducing “think like hacker” approach in the participants
- Explains the functioning of the perimeter defenses, scan and hacking networks without affecting the real networks to identify vulnerabilities
- Demonstrates the exploitation of privileges by intruders and fool-proof security measures to protect the security architecture of the organization
- Real-like test environments to help participants explore their acquired skills
- Interactive theory and lab sessions delivered by industry experts having several years of experience.
Course Objective
Successful completion the CEH V11 certification training empowers you with across the board understanding of:
- Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
- Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
- Performing network scans, host and port discovery by utilizing different scanning tools
- Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
- Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
- Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
- Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
- Packet sniffing concepts, techniques, and protection against the same.
- Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defense tools
- Security solutions like firewall, IPS, honeypots, their evasion, and protection
- Web server and web application-based attacks, methodologies
- SQL injection, hijacking, and evasion techniques
- Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
- Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
- Operational Technology (OT) essentials, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
- Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
- Cloud computing, threats and security, essentials of container technology and serverless computing
Course Outline
Module 01: Introduction to Ethical Hacking | Module 11: Session Hijacking |
---|---|
Module 02: Footprinting and Reconnaissance | Module 12: Evading IDS, Firewalls, and Honeypots |
Module 03: Scanning Networks | Module 13: Hacking Web Servers |
Module 04: Enumeration | Module 14: Hacking Web Applications |
Module 05: Vulnerability Analysis | Module 15: SQL Injection |
Module 06: System Hacking | Module 16: Hacking Wireless Networks |
Module 07: Malware Threats | Module 17: Hacking Mobile Platforms |
Module 08: Sniffing | Module 18: IoT Hacking |
Module 09: Social Engineering | Module 19: Cloud Computing |
Module 10: Denial-of-Service | Module 20: Cryptography |
Who is it for
- Students
- Freshers and Job Seekers
- Defense Professionals
- Ethical hackers
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Auditors
- Security Professionals
Eligibility & Prerequisites
- The candidate must be 10th-grade qualified to become eligible for the Certified Ethical Hacker course.
- There are no specific prerequisites for joining the course, but it would be advantageous for the candidate if they have a basic knowledge of networking.
About The Exam
- Certification Name: 312-50 (ECC EXAM), 312-50 (VUE)
- Test Format: Multiple Choice
- Number of Questions: 125
- Test Duration: 4 Hours
- Test Delivery: ECC EXAM, VUE
Brochure
New Batch Starts
– 12 April 2021, 08 Apr 2021(Batch full)
Application Deadline
– 11 April 2021
Avail early bird offer Valid up to 11th April
- 00Days
- :
- 00Hours
- :
- 00Minutes
- :
- 00Seconds
What’s New in CEH v11
Introducing All New CEH v11
Enumeration
- NFS Enumeration
- NFS Enumeration Tools
- DNS Cache Snooping
- DNSSEC Zone Walking
Malware Threats
- APT Concepts
- Fireless Malware Concepts
- Trojan Analysis: Emotet
Cloud Computing
- Kubernetes Vulnerabilities & Solutions
- Serverless Application Security Solutions
IoT Hacking
- IoT Device Management
- IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- IoT Countermeasures
Highlights of some of what sets CEH v11 apart from the rest
Mapped to NICE 2.0
Emerging Attack Vectors
Modern Exploit Technologies
Hands-on Hacking Challenges
Modern Case Studies and Current Events
Enhanced Focus on Malware Analysis
Live, Cyber Range (no simulations)
Greater Focus on Cloud and IoT
Thousands of Hacking Techniques, Tricks, and Tools
Better Interface
Enroll now to get more details on Course & Pricing
Why ICSS
Certified & Experienced Instructors
Flexible Schedule
99.9% Passing Rate
100% Practical Sessions
Looking For A Flexible, Interactive Practical & Cost-Effective Learning Solution? We Are Just A Click Away
Listen from our Students
[trustindex no-registration=google]
Our
International Students
BECOME AN CERTIFIED ETHICAL HACKER
About ICSS
A leading brand in Physical Security & Cybersecurity Training provider also deals in PSARA License & MOU and VAPT Services
011-43870088 | +91 8744013344 | enquiry@icssindia.org
All rights reserved. © 2021, ICSS