CEH: Certified Ethical Hacker


Duration: 5 days
CPE Credits: 35
Course Number: SEC-312
CEH - Certified Ethical hacker

The following CEH training seminar is an official five day, 35 CPE course offered to you by Intrinsec Security – an Accredited Training Center in partnership with EC-Council.

Course Introduction

The Certified Ethical Hacker (CEH) training program is the world’s most advanced certified ethical hacking course and is often the first choice for professionals interested in validating their capabilities in the network security discipline of Ethical Hacking from a vendor-neutral perspective.

The training exercises and provided course material for this official EC-Council course will teach students how to look for weaknesses and vulnerabilities in target systems while also learning to use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Additionally, this course will also help students successfully prepare for the CEH exam.

Aside from a virtual seat in an upcoming CEH class, the resources provided with registration include official EC-Council courseware along with a CEH exam voucher. Not only that, but you will also gain access to a number of EC-Council’s “self-paced” resources including their online lab environment (iLabs) and practice tests (Test Prep Program). When you combine the instructor-led training with the course resources, this official EC-Council class is a great tool for those interested in gaining ethical hacking skills, the CEH certification, or both.

What You Will Learn

This official CEH training seminar is based on the 18 domains featured in the CEH certification program, ensuring you successfully prepare for the CEH exam while also enhancing your overall competencies in ethical hacking.

Domain 1: Introduction to Ethical Hacking

Domain 1: Introduction to Ethical Hacking

Introduction to Ethical Hacking is the first domain students review in this official CEH training program. The focus of this domain is to review key issues plaguing the information security world, incident management process, and penetration testing.

Student Learning Objectives
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards
Domain 2: Footprinting and Reconnaissance

Domain 2: Footprinting and Reconnaissance

The second domain students will cover in this course is Footprinting and Reconnaissance. The areas students review is footprinting, footprinting tools, and countermeasures.

Student Learning Objectives
  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing
Domain 3: Scanning Networks

Domain 3: Scanning Networks

Scanning Networks is the third domain reviewed in this course. In it, students will learn about network scanning techniques and scanning countermeasures.

Student Learning Objectives
  • Overview of Network Scanning
  • CEH Scanning Methodology
Domain 4: Enumeration

Domain 4: Enumeration

Enumeration is the fourth domain reviewed in this training seminar and it focuses on enumeration techniques and enumeration countermeasures.

Student Learning Objectives
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing
Domain 5: System Hacking

Domain 5: System Hacking

The fifth domain in this course is System Hacking. Students will review system hacking methodology, steganography, steganalysis attacks, along with covering tracks.

Student Learning Objectives
  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
Domain 6: Malware Threats

Domain 6: Malware Threats

Malware Threats is the sixth domain students cover in this course. The material from this section focuses on the different types of Trojans, Trojan analysis, and Trojan countermeasures.

Student Learning Objectives
  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Malware Detection
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing
Domain 7: Sniffing

Domain 7: Sniffing

Domain 7, also known as ‘Sniffing’, reviews packet sniffing techniques and how to defend against sniffing.

Student Learning Objectives
  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Counter Measures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing
Domain 8: Social Engineering

Domain 8: Social Engineering

Domain 8 of this course teaches students about social engineering techniques, identify theft, and social engineering countermeasures.

Student Learning Objectives
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing
Domain 9: Denial of Service

Domain 9: Denial of Service

The ninth domain of this training program is called Denial of Service, and it covers DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

Student Learning Objectives
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter Measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing
Domain 10: Session Hijacking

Domain 10: Session Hijacking

Session Hijacking is the tenth domain covered in this course. Students will learn about session hijacking techniques and countermeasures.

Student Learning Objectives
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter Measures
  • Session Hijacking Pen Testing
Domain 11: Hacking Webservers

Domain 11: Hacking Webservers

This domain looks at the different types of webserver attacks, attack methodology, and countermeasures.

Student Learning Objectives
  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter Measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing
Domain 2: Hacking Web Applications

Domain 12: Hacking Web Applications

Hacking Web Applications is the twelfth domain in this course, and it focuses on the different types of web application attacks, web application hacking methodology, and countermeasures.

Student Learning Objectives
  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing
Domain 13: SQL Injection

Domain 13: SQL Injection

Domain 13 of this course takes an in-depth look at SQL injection attacks and injection detection tools.

Student Learning Objectives
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures
Domain 14: Hijacking Wireless Networks

Domain 14: Hacking Wireless Networks

Hacking Wireless Networks is the fourteenth domain featured in this training seminar. In this domain, students review encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

Student Learning Objectives
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter Measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing
Domain 15: Hacking Wireless Networks

Domain 15: Hacking Wireless Networks

Domain 15 of this course reviews mobile platform attack vector, Android vulnerabilities, jailbreaking iOS, Windows Phone 8 vulnerabilities, mobile security guidelines, and tools.

Student Learning Objectives
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing
Domain 16: Evading IDS, Firewalls and Honeypots

Domain 16: Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls, and Honeypots is the sixteenth domain in this course. It provides students with a lesson on firewalls, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.

Student Learning Objectives
  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing
Domain 17: Cloud Computing

Domain 17: Cloud Computing

Domain 17 is titled “Cloud Computing”, and it teaches students about important cloud computing concepts, threats, attacks, and security techniques and tools.

Student Learning Objectives
  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing
Domain 18: Cryptography

Domain 18: Cryptography

Cryptography is the eighteenth and final domain reviewed in this official CEH training program. Students will focus on the different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

Student Learning Objectives
  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

This CEH Training Program Is Brought To You By:



What Comes With This Course

  • Five Days of Official EC-Council Training from an Authorized CEH Instructor
  • Official EC-Council CEH (v9) Courseware
  • Official EC-Council CEH (v9) Lab Manual
  • Official EC-Council CEH (v9) Tools
  • Six Months of Online Access to iLabs for CEH v9 (virtual exercises)
  • Six Months of Online Access to CEH v9 Test Prep Program (+240 Practice Questions)
  • Exam Voucher for CEH (v9)



Why Yes, We Do Provide Group Training!

We have multiple options for you to lower costs and get more of your people trained.

What We’ll Do For You




With the YOU PASS WE PAY promo, you’re eligible to receive $300 if you pass the CEH exam within 90 days of completing our course!

*See terms & conditions for details.




Our PRICE MATCH GUARANTEE is simple – not only do you get the best training on the market, but you also pay the best price!



Aug 28 - Sep 1, 2017 8:00am - 4:00pm MST Live Online USD $2,695.00
Oct 23 - 27, 2017 8:00am - 4:00pm MST Live Online USD $2,695.00
Dec 11 - 15, 2017 8:00am - 4:00pm MST Live Online USD $2,695.00

Request Group Training