CEH: Certified Ethical Hacker


Price: USD $3,345.00
Duration: 5 days
CPE Credits: 35
Course Number: SEC-312
CEH - Certified Ethical hacker

The following CEH training seminar is an official five day, 35 CPE course offered to you by Intrinsec Security – an Accredited Training Center in partnership with EC-Council.

Course Introduction

The Certified Ethical Hacker (CEH) training program is the worlds most advanced certified ethical hacking course and is often the first choice for professionals interested in validating their capabilities in the network security discipline of Ethical Hacking from a vendor-neutral perspective.

The training exercises and provided course material for this official EC-Council course will teach students how to look for weaknesses and vulnerabilities in target systems while also learning to use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Additionally, this course will also help students successfully prepare for the CEH exam.

Aside from a virtual seat in an upcoming CEH class, the resources provided with registration include official EC-Council courseware along with a CEH exam voucher. Not only that, but you will also gain access to a number of EC-Council’s “self-paced” resources including their online lab environment (iLabs) and practice tests (Test Prep Program). When you combine the instructor-led training with the course resources, this official EC-Council class is an great tool for those interested in gaining ethical hacking skills, the CEH certification, or both.


Certifications Training


OnSite Training
50-Day Training Bundle

What Comes With Registration?

  • Five Days of Official EC-Council Training from an Authorized CEH Instructor
  • Official EC-Council CEH (v9) Courseware
  • Official EC-Council CEH (v9) Lab Manual
  • Official EC-Council CEH (v9) Tools
  • Six Months of Online Access to iLabs for CEH v9 (virtual exercises)
  • Six Months of Online Access to CEH v9 Test Prep Program (+240 Practice Questions)
  • Exam Voucher for CEH (v9)

CEH Prerequisites

This official EC-Council training seminar has no prerequisites and the scheduled dates below are open for registration.

NOTE: While this training program does not have any prerequisites, we do recommend for all prospective students to have at least two years of information security related experience.

Course Outline

Domain 1: Introduction to Ethical Hacking

Introduction to Ethical Hacking is the first domain students review in this official CEH training program. The focus of this domain is to review key issues plaguing the information security world, incident management process, and penetration testing.

Student Learning Objectives
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards

Domain 2: Footprinting and Reconnaissance

The second domain students will cover in this course is Footprinting and Reconnaissance. The areas students review are footprinting, footprinting tools, and countermeasures.

Student Learning Objectives
  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Domain 3: Scanning Networks

Scanning Networks is the third domain reviewed in this course. In it, students will learn about network scanning techniques and scanning countermeasures.

Student Learning Objectives
  • Overview of Network Scanning
  • CEH Scanning Methodology

Domain 4: Enumeration

Enumeration is the fourth domain reviewed in this training seminar and it focuses on enumeration techniques and enumeration countermeasures.

Student Learning Objectives
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Domain 5: System Hacking

The fifth domain in this course is System Hacking. Students will review system hacking methodology, steganography, steganalysis attacks, along with covering tracks.

Student Learning Objectives
  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps

Domain 6: Malware Threats

Malware Threats is the sixth domain students cover in this course. The material from this section focuses on the different types of Trojans, Trojan analysis, and Trojan countermeasures.

Student Learning Objectives
  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Malware Detection
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

Domain 7: Sniffing

Domain 7, also known as ‘Sniffing’, reviews packet sniffing techniques and how to defend against sniffing.

Student Learning Objectives
  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Counter Measures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Domain 8: Social Engineering

Domain 8 of this course teaches students about social engineering techniques, identify theft, and social engineering countermeasures.

Student Learning Objectives
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

Domain 9: Denial of Service

The ninth domain of this training program is called Denial of Service, and it covers DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

Student Learning Objectives
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter Measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

Domain 10: Session Hijacking

Session Hijacking is the tenth domain covered in this course. Students will learn about session hijacking techniques and countermeasures.

Student Learning Objectives
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter Measures
  • Session Hijacking Pen Testing

Domain 11: Hacking Webservers

This domain looks at the different types of webserver attacks, attack methodology, and countermeasures.

Student Learning Objectives
  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter Measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Domain 12: Hacking Web Applications

Hacking Web Applications is the twelfth domain in this course, and it focuses on the different types of web application attacks, web application hacking methodology, and countermeasures.

Student Learning Objectives
  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing

Domain 13: SQL Injection

Domain 13 of this course takes an in-depth look at SQL injection attacks and injection detection tools.

Student Learning Objectives
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

Domain 14: Hacking Wireless Networks

Hacking Wireless Networks is the fourteenth domain featured in this training seminar. In this domain students review encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools.

Student Learning Objectives
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter Measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

Domain 15: Hacking Wireless Networks

Domain 15 of this course reviews mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools.

Student Learning Objectives
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Domain 16: Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls and Honeypots is the sixteenth domain in this course. It provides students with a lesson on firewalls, IDS and honeypot evasion techniques, evasion tools, and countermeasures.

Student Learning Objectives
  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

Domain 17: Cloud Computing

Domain 17 is titled “Cloud Computing”, and it teaches students about important cloud computing concepts, threats, attacks, and security techniques and tools.

Student Learning Objectives
  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

Domain 18: Cryptography

Cryptography is the eighteenth and final domain reviewed in this official CEH training program. Students will focus on the different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

Student Learning Objectives
  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools
EC-Council logo - IntrinsecSecurity.com


Jul 17 - 21, 2017 8:00am - 4:00pm MST Live Online USD $3,345.00
Aug 28 - Sep 1, 2017 8:00am - 4:00pm MST Live Online USD $3,345.00
Oct 23 - 27, 2017 8:00am - 4:00pm MST Live Online USD $3,345.00
Dec 11 - 15, 2017 8:00am - 4:00pm MST Live Online USD $3,345.00

Request Group Training