• No products in the cart.

Certified Ethical Hacker Course Description

IT Security is a severe issue in the IT industry across the globe, especially with the IT sector booming. Security breaches can come from anywhere. Competitors, spies, rogue employees, bored teens and even hackers are invading computers everywhere to make trouble and steal information. While following best practices and security principles and policies are very important, they cannot guarantee that your data safety will not be compromised.

How can these breaches be prevented? By knowing what to look for. The best way to beat a cybercriminal is to think like them to know what types of attacks they make, and how you can guard against them. Ethical hacking and countermeasures serve to test and evaluate the security of the corporate environment in the real world. Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.

The Ethical Hacker certification by EC-Council gives the students a real-time environment where they get to scan, test, hack and secure their own systems. All students get in-depth knowledge and practical experience with the current essential security systems in our lab intensive environment. How intruders escalate privileges and what steps can be taken to secure a system are some of the basic tactics that the students get trained in. Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation are some of the topics that the students get to learn about in this program.


Certified Ethical Hacking Course Learning Outcomes;

  • Learn tools required to be an Ethical Hacker.
  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.


Certified Ethical Hacker Training – Suggested Audience

The Certified Ethical Hacking v9.0 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Suggested attendees based on our past programs are:

  • Network Administrator
  • System Administrator
  • IT Security Analyst
  • Web Administrator
  • System Engineer


Certified Ethical Hacker In-house/Corporate Training

If you have a group of 5-6 participants, apply for in-house training. For commercials please send us an email with group size to

Course Curriculum

01. Introduction to Ethical Hacking
02. Foot Printing & Reconnaissance
03. Scanning Networks
04. Enumeration
05. System Hacking
06. Trojans & Backdoors
07. Viruses & Worms
08. Sniffers
09. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hijacking Web servers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Evading IDS, Firewalls & Honey pots
17. Buffer Overflow
18. Cryptography
19. Penetration Testing
20. Detailed coverage and labs in Module 18: Cryptography
Shellshock CVE-2014-6271 Details 00:00:00
Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X. Details 00:00:00
Detailed coverage and labs in Module 11: Hacking Webservers Details 00:00:00
21. Poodle CVE-2014-3566
POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password. Details 00:00:00
Case study in Module 18: Cryptography Details 00:00:00
22. Hacking Using Mobile Phones
CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) usingmobile phones Details 00:00:00
Courseware covers latestmobile hacking toolsin all the modules Details 00:00:00
Coverage of latest Trojan, Virus, Backdoors Details 00:00:00
Courseware covers Information Security Controls and Information Security Laws and Standards Details 00:00:00
Labs on Hacking Mobile Platforms and Cloud Computing Details 00:00:00
More than 40 percent new labs are added from Version 8 Details 00:00:00

Course Reviews


  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.