866-598-3576
Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Available October 1st

Course Information

Difficulty: Intermediate

Certified Ethical Hacker v10

SALE $599.00 $0.99

Description

TARGETED JOB TITLES

  • Ethical Hackers
  • System Administrators
  • Network Administrators & Engineers
  • Web-managers
  • IT Auditors
  • Security Professionals

PERSONA SEARCH FILTERS

  • LEVEL 1: A+ certified, tech support 
  • LEVEL 2: Network+/CCNA certified, network support or network admin
  • LEVEL 3: Security+, CISSP, or TICSA, security support, info security

IMPORTANT SKILLS

  • Unix/Linux commands and distributions
  • Programming–maybe C, LISP, Perl, or Java
  • Database, SQL 

COURSE DESCRIPTION

KWT’s Certified Ethical Hacker (C|EH v10) course is a trusted and respected ethical hacking training program that all information security professional should take advantage of and is a sought after hiring skill by Fortune 500s, industry leaders and government agencies alike.
This course gives you the tools you need to change the game by giving you hack preventing tactics. Instead of reacting to attacks that have already occurred, CEH training teaches you to think like a dangerous hacker. This allows you to analyze existing security controls and procedures in the same way that attackers analyze targets. You will learn to look for undetected weaknesses and exploitable strengths so you can PREVENT attacks. 

 

The U.S. Bureau of Labor Statistics (BLS) projects cybersecurity job growth at a rate of 28% for the decade ending in 2026. This is far greater than job growth of 7% projected for all professions combined. 

A quick search on LinkedIn (August 2019) shows 4,832 current jobs in the United States alone that require the C|EH. These job titles include: 

  • Senior Penetration Tester – $121,000 average salary
  • Security Consultant – $82,939 average salary
  • SOC Tier 2 Analyst – $70,000 average salary
  • Cybersecurity Response Manager – $76,915 average salary
  • Auditor – $78,000 average salary
  • Network Security Operations – $48,036 average salary 
  • Vulnerability Tester – $71,660 average salary
  • Ethical Hacker – $94,300 average salary
 

WHAT PARTICIPANTS CAN EXPECT TO LEARN

Qualification for a CEH involves mastering:
  • Penetration testing
  • Footprinting and reconnaissance
  • Social engineering
The course of study covers: 
  • Creating Trojan horses
  • Backdoors
  • Viruses
  • Worms
  • Denial of Service (DoS) attacks
  • SQL injection
  • Buffer overflow
  • Session hijacking
  • System hacking
You’ll discover how to:
  • Hijack Web servers and Web applications
  • Scan and sniff networks
  • Crack wireless encryption
  • Evade IDSs, firewalls, and honeypots
 

THE EXAM

The 312-50 exam lasts four hours, comprises 125 multiple-choice questions, and tests CEH candidates on the following 18 areas:
 
  • Introduction to ethical hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware threats
  • Sniffing
  • Social engineering
  • Denial of Service
  • Session hijacking
  • Hacking web servers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Hacking mobile platforms
  • Evading IDS, firewalls, and honeypots
  • Cloud computing
  • Cryptography

MESSAGING

To stop a hacker, one needs to think like one and this is what ethical hacking is all about. Ethical hackers perform security tasks like hackers; however it is to protect the computers and networks of an organization. They have the permission to hack organization’s network in order to perform tests that keep it safe from illegal hacking. Ethical hackers help in improving the security of systems in organizations.

Course Instructor

Kris Seeburn Kris Seeburn Author

SECTION 1: INTRODUCTION TO ETHICAL HACKING

SECTION 2: FOOTPRINTING & RECONNAISSANCE

SECTION 3: SCANNING NETWORKS

SECTION 4: ENUMERATION

SECTION 5: VULNERABILITY ANALYSIS

SECTION 6: SYSTEM HACKING

SECTION 7: MALWARE THREATS

SECTION 8: SNIFFING

SECTION 9: SOCIAL ENGINEERING

SECTION 10: DENIAL-OF-SERVICE

SECTION 11: SESSION HIJACKING

SECTION 12: EVADING IDS, FIREWALLS, AND HONEYPOTS

SECTION 13: HACKING WEB SERVERS

SECTION 14: HACKING WEB APPLICATIONS

SECTION 15: SQL INJECTION

SECTION 16: HACKING WIRELESS NETWORKS

SECTION 17: HACKING MOBILE PLATFORMS

SECTION 18: IOT HACKING

SECTION 19: CLOUD COMPUTING

SECTION 20: CRYPTOGRAPHY

Close Menu

Pin It on Pinterest

Share This
×

Cart