DCS – Diploma in Cyber Security

icss-logo

EC-Council CEH v11

Live Interactive Practical
Certified Ethical Hacker
Program

5/5

|   12567+
Satisfied learners

|   Read Reviews

  • 40 hours of Instructor-Led Training
  • EC-Council Authorized Training Partner
  • EC-Council Official Courseware
  • Certified EC-Council Instructor (CEI)


Become an Certified Ethical Hacker

EC-Council CEHv11

120678+

Students Enrolled

On/Offline

Mode of Training

2 Months

Course Duration

No Cost EMI

Easy EMI Option

CEH Course Key Features

  • EC-Council CEHv11 Certification- Exam voucher exclusive
  • iLab & Virtual Labs for Practical
  • Hands-on training with live demonstrations for all modules
  • Learn from Basics to Advanced
  • EC-Council Certified Instructors having with 5-10 years of work ex.
  • Get certified at an affordable price​
  • Study material by EC-Council (e-kit)
  • 99.9% Passing Rate

It’s Time to Invest Yourself!

 
CEHv11 Course Details

CEH Course Content / Exam(s)

Why CEHv11?
Course Objective
Course Outline
Who is it for
Eligibility & Prerequisites
About The Exam
Brochure
Why CEHv11?

Nowadays almost everyone has gone online. People have smartphones, computers, or laptops in their hands, on which they are starting to share everything personal and professional. In such a situation cybercrime such as email hacking, data theft, virus attack, password cracking, credit card number theft, and stealing secret data are also increasing rapidly.

According to a survey conducted by the International Data Corp, there is a demand for over 60,000 information security personnel worldwide. In India alone, the number is expected to grow by over 77,000 and 188,000 worldwide in the next few years. Talented Ethical Hackers can look for making their career in some of the big names in the IT sector including Wipro, Dell, Reliance, Google, Accenture, IBM, and Infosys.

EC-Council’s CEH V11 certification training focuses to train aspiring security professionals to gain essential ethical hacking skills with the practical implementation of scanning, testing, hacking, and securing the systems. The CEH V11 training and certification from ICSS features:

  • Inducing “think like hacker” approach in the participants
  • Explains the functioning of the perimeter defenses, scan and hacking networks without affecting the real networks to identify vulnerabilities
  • Demonstrates the exploitation of privileges by intruders and fool-proof security measures to protect the security architecture of the organization
  • Real-like test environments to help participants explore their acquired skills
  • Interactive theory and lab sessions delivered by industry experts having several years of experience.

Course Objective

Successful completion the CEH V11 certification training empowers you with across the board understanding of:

  •  Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
  • Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
  • Performing network scans, host and port discovery by utilizing different scanning tools
  • Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
  • Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
  • Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
  • Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
  • Packet sniffing concepts, techniques, and protection against the same.
  • Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defense tools
  • Security solutions like firewall, IPS, honeypots, their evasion, and protection
  • Web server and web application-based attacks, methodologies
  • SQL injection, hijacking, and evasion techniques
  • Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
  • Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
  • Operational Technology (OT) essentials, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
  • Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
  • Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
  • Cloud computing, threats and security, essentials of container technology and serverless computing

Course Outline

Module 01: Introduction to Ethical Hacking Module 11: Session Hijacking
Module 02: Footprinting and Reconnaissance Module 12: Evading IDS, Firewalls, and Honeypots
Module 03: Scanning Networks Module 13: Hacking Web Servers
Module 04: Enumeration Module 14: Hacking Web Applications
Module 05: Vulnerability Analysis Module 15: SQL Injection
Module 06: System Hacking Module 16: Hacking Wireless Networks
Module 07: Malware Threats Module 17: Hacking Mobile Platforms
Module 08: Sniffing Module 18: IoT Hacking
Module 09: Social Engineering Module 19: Cloud Computing
Module 10: Denial-of-Service Module 20: Cryptography

Who is it for

  • Students
  • Freshers and Job Seekers
  • Defense Professionals
  • Ethical hackers
  • System Administrators
  • Network Administrators
  • Engineers
  • Web managers
  • Auditors
  • Security Professionals

Eligibility & Prerequisites

  • The candidate must be 10th-grade qualified to become eligible for the Certified Ethical Hacker course.
  • There are no specific prerequisites for joining the course, but it would be advantageous for the candidate if they have a basic knowledge of networking.

About The Exam

  • Certification Name:  312-50 (ECC EXAM), 312-50 (VUE)
  • Test Format: Multiple Choice
  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Delivery: ECC EXAM, VUE

Brochure

CEH v11 ICSS Brochure

New Batch Starts

– 12 April 2021, 08 Apr 2021(Batch full)

Application Deadline

11 April 2021


Request a Batch

Avail early bird offer Valid up to 11th April

  • 00Days
  • :
  • 00Hours
  • :
  • 00Minutes
  • :
  • 00Seconds
What’s New in CEH v11

Introducing All New CEH v11

Enumeration
  • NFS Enumeration
  • NFS Enumeration Tools
  • DNS Cache Snooping
  • DNSSEC Zone Walking
Malware Threats
  • APT Concepts
  • Fireless Malware Concepts
  • Trojan Analysis: Emotet
Cloud Computing
  • Kubernetes Vulnerabilities & Solutions
  • Serverless Application Security Solutions
IoT Hacking
  • IoT Device Management
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Countermeasures

Highlights of some of what sets CEH v11 apart from the rest

Mapped to NICE 2.0

Emerging Attack Vectors

Modern Exploit Technologies

Hands-on Hacking Challenges

Modern Case Studies and Current Events

Enhanced Focus on Malware Analysis

Live, Cyber Range (no simulations)

Greater Focus on Cloud and IoT

Thousands of Hacking Techniques, Tricks, and Tools

Better Interface

Enroll now to get more details on Course & Pricing

011-43870088 | +91 8744013344


Request a Batch

Why ICSS

Certified & Experienced Instructors

Flexible Schedule

99.9% Passing Rate

100% Practical Sessions

Looking For A Flexible, Interactive Practical & Cost-Effective Learning Solution? We Are Just A Click Away


Request a Batch

Listen from our Students

[trustindex no-registration=google]

Our
International Students

BECOME AN CERTIFIED ETHICAL HACKER

About ICSS

A leading brand in Physical Security & Cybersecurity Training provider also deals in PSARA License & MOU and VAPT Services

011-43870088 | +91 8744013344 |  enquiry@icssindia.org

All rights reserved. © 2021, ICSS

You may also like...