CEH: Certified Ethical Hacker


Duration: 5 days
CPE Credits: 35
Course Number: SEC-312
CEH training - EC-Council CEH Logo - Intrinsec

The following CEH training seminar is an official five day, 35 CPE course offered to you by Intrinsec Security – an Accredited Training Center in partnership with EC-Council.

CEH Training Information

CEH training is often considered to be the worlds most advanced ethical hacking course. The Certified Ethical Hacker (CEH) program is one of the most desired cyber security certifications available. Why? For starters, the CEH course has 18 of the most current, comprehensive modules, all designed by EC-Council to help students master the ethical hacking methodology and gain the CEH credential

This CEH training course covers 270 attack technologies, all commonly used by hackers. EC-Council’s security experts have also designed more than 140 labs which replicate real time scenarios and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

The goal of CEH training is to provide you with a instructor-led course that will help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Additionally, CEH certification training will also help you prepare for the EC-Council Certified Ethical Hacker exam.

What Comes With This Course

  • Five Days of Official CEH Training from an Authorized EC-Council Instructor
  • Official EC-Council CEH Training Courseware
  • Official EC-Council CEH Training Lab Manual
  • Official EC-Council CEH Tools
  • Six Months of Online Access to iLabs for CEH (virtual exercises)
  • Six Months of Online Access to CEH Test Prep Program (+240 Practice Questions)
  • Exam Voucher for CEH (v9)


CEH Courseware and Manuals
CEH iLabs and Virtual Exercuses
CEH Practice Tests
CEH Certification Exam Voucher

What You Will Learn

This official CEH training seminar is based on the 18 domains featured in the CEH certification program, ensuring you successfully prepare for the CEH exam while also enhancing your overall competencies in ethical hacking.

Domain 1: Introduction to Ethical Hacking

Introduction to Ethical Hacking

Introduction to Ethical Hacking is the first domain students review in this official CEH training program. The focus of this domain is to review key issues plaguing the information security world, incident management process, and penetration testing.

CEH Training Objectives
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards
Domain 2: Footprinting and Reconnaissance

Footprinting and Reconnaissance

The second domain students will cover in this course is Footprinting and Reconnaissance. The areas students review is footprinting, footprinting tools, and countermeasures.

CEH Training Objectives
  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing
Domain 3: Scanning Networks

Scanning Networks

Scanning Networks is the third domain reviewed in this course. In it, students will learn about network scanning techniques and scanning countermeasures.

CEH Training Objectives
  • Overview of Network Scanning
  • CEH Scanning Methodology
Domain 4: Enumeration


Enumeration is the fourth domain reviewed in this training seminar and it focuses on enumeration techniques and enumeration countermeasures.

CEH Training Objectives
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing
Domain 5: System Hacking

System Hacking

The fifth domain in this course is System Hacking. Students will review system hacking methodology, steganography, steganalysis attacks, along with covering tracks.

CEH Training Objectives
  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
Domain 6: Malware Threats

Malware Threats

Malware Threats is the sixth domain students cover in this course. The material from this section focuses on the different types of Trojans, Trojan analysis, and Trojan countermeasures.

CEH Training Objectives
  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Malware Detection
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing
Domain 7: Sniffing


Domain 7, also known as ‘Sniffing’, reviews packet sniffing techniques and how to defend against sniffing.

CEH Training Objectives
  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Counter Measures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing
Domain 8: Social Engineering

Social Engineering

Domain 8 of this course teaches students about social engineering techniques, identify theft, and social engineering countermeasures.

CEH Training Objectives
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing
Domain 9: Denial of Service

Denial of Service

The ninth domain of this training program is called Denial of Service, and it covers DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

CEH Training Objectives
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter Measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing
Domain 10: Session Hijacking

Session Hijacking

Session Hijacking is the tenth domain covered in this course. Students will learn about session hijacking techniques and countermeasures.

CEH Training Objectives
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter Measures
  • Session Hijacking Pen Testing
Domain 11: Hacking Webservers

Hacking Webservers

This domain looks at the different types of webserver attacks, attack methodology, and countermeasures.

CEH Training Objectives
  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter Measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing
Domain 12: Hacking Web Applications

Hacking Web Applications

Hacking Web Applications is the twelfth domain in this course, and it focuses on the different types of web application attacks, web application hacking methodology, and countermeasures.

CEH Training Objectives
  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing
Domain 13: SQL Injection

SQL Injection

Domain 13 of this course takes an in-depth look at SQL injection attacks and injection detection tools.

CEH Training Objectives
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures
Domain 14: Hijacking Wireless Networks

Hacking Wireless Networks

Hacking Wireless Networks is the fourteenth domain featured in this training seminar. In this domain, students review encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

CEH Training Objectives
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter Measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing
Domain 15: Hacking Wireless Networks

Hacking Wireless Networks

Domain 15 of this course reviews mobile platform attack vector, Android vulnerabilities, jailbreaking iOS, Windows Phone 8 vulnerabilities, mobile security guidelines, and tools.

CEH Training Objectives
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing
Domain 16: Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls, and Honeypots is the sixteenth domain in this course. It provides students with a lesson on firewalls, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.

CEH Training Objectives
  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing
Domain 17: Cloud Computing

Cloud Computing

Domain 17 is titled “Cloud Computing”, and it teaches students about important cloud computing concepts, threats, attacks, and security techniques and tools.

CEH Training Objectives
  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing
Domain 18: Cryptography


Cryptography is the eighteenth and final domain reviewed in this official CEH training program. Students will focus on the different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

CEH Training Objectives
  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

Why Yes, We Do Provide Group Training!

We have multiple options for you to lower costs and get more of your people trained.

Intrinsec’s CEH Training Incentives

Intrinsec's CEH Training Incentive 1


With the YOU PASS WE PAY promo, you’re eligible to receive $300 if you pass the CEH exam within 90 days of completing this course!

*See terms & conditions for details.

Intrinsec's CEH Training Incentive 1


Our PRICE MATCH GUARANTEE is simple – not only do you get the most effective training available, but you also pay the best price!



Oct 23 - 27, 2017 8:00am - 4:00pm MST Live Online USD $2,695.00
Dec 11 - 15, 2017 8:00am - 4:00pm MST Live Online USD $2,695.00
Oct 23 - 27, 2017 9:00am - 5:00pm MDT Live Online USD $2,695.00

Request Group Training