Certified Ethical Hacker V9 | EC Council | Test & Evaluate Security Vulnerabilities with CEH V9 Training

Certified Ethical Hacker Course Description

IT Security is a severe issue in the IT industry across the globe, especially with the IT sector booming. Security breaches can come from anywhere. Competitors, spies, rogue employees, bored teens and even hackers are invading computers everywhere to make trouble and steal information. While following best practices and security principles and policies are very important, they cannot guarantee that your data safety will not be compromised. 

How can these breaches be prevented? By knowing what to look for.The best way to beat a cyber criminal is to think like them to know what types of attacks they make, and how you can guard against them. Ethical hacking and countermeasures serve to test and evaluate the security of the corporate environment in the real world. Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.

The Ethical Hacker certification by EC-Council gives the students a real-time environment where they get to scan, test, hack and secure their own systems. All students get in-depth knowledge and practical experience with the current essential security systems in our lab intensive environment. How intruders escalate privileges and what steps can be taken to secure a system are some of the basic tactics that the students get trained in. Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation are some of the topics that the students get to learn about in this program.

Certified Ethical Hacking Course Learning Outcomes

  • Learn tools required to be an Ethical Hacker.
  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

Certified Ethical Hacker Training - Suggested Audience

The Certified Ethical Hacking v9.0 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Suggested attendees based on our past programs are:
  • Network Administrator
  • System Administrator
  • IT Security Analyst
  • Web Administrator
  • System Engineer

Certified Ethical Hacker V9 Training Duration

  • Open-House F2F (Public): 2/3 days
  • In-House F2F (Private): 2/3/4 days, for commercials please send us an email with group size to hello@pincorps.com

Certified Eithical Hacker V9 course outline includes the below modules:

  • Introduction to Ethical Hacking
  • Foot Printing & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hijacking Web servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls & Honey pots
  • Buffer Overflow
  • Cryptography
  • Penetration Testing

New course Itineraries
  • Detailed coverage and labs in Module 18: Cryptography.
  1. Shellshock CVE-2014-6271
  2. Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
  3. Detailed coverage and labs in Module 11: Hacking Webservers
  • Poodle CVE-2014-3566
  1. POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
  2. Case study in Module 18: Cryptography
  • Hacking Using Mobile Phones
  1. CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) usingmobile phones
  2. Courseware covers latestmobile hacking toolsin all the modules
  3. Coverage of latest Trojan, Virus, Backdoors
  4. Courseware covers Information Security Controls and Information Security Laws and Standards
  5. Labs on Hacking Mobile Platforms and Cloud Computing
  6. More than 40 percent new labs are added from Version 8
Keny White


Keny White is Professor of the Department of Computer Science at Boston University, where he has been since 2004. He also currently serves as Chief Scientist of Guavus, Inc. During 2003-2004 he was a Visiting Associate Professor at the Laboratoire d'Infomatique de Paris VI (LIP6). He received a B.S. from Cornell University in 1992, and an M.S. from the State University of New York at Buffalo.


After working as a software developer and contractor for over 8 years for a whole bunch of companies including ABX, Proit, SACC and AT&T in the US, He decided to work full-time as a private software trainer. He received his Ph.D. in Computer Science from the University of Rochester in 2001. "What I teach varies from beginner to advanced and from what I have seen, anybody can learn and grow from my courses".


Average Rating

1 rating

Detailed Rating

5 stars
4 stars
3 stars
2 stars
1 star

    This is great

    I really love the course editor in LearnPress. It is never easier when creating courses, lessons, quizzes with this one. It's the most useful LMS WordPress plugin I have ever used. Thank a lot! Testing quiz is funny, I like the sorting choice question type most.