Travel to Class or join the Live Video Conference via WebEx.

WebEx brings you directly into the Classroom!

Live Online Video Conference gives you the flexibility and a cost effective way to attend Live training events from the convenience of your home, office or even while you travel.  Engineers Login and Participate in the LIVE course with other students attending the course in person.  Live Online students enjoy all the benefits as students who attend in person. Same Books, Same Labs, Same TestPrep, Same Access to the Instructor!  The only thing you miss out on is the travel, the traffic, all the extra expenses and the anxiety of making it to class on time.  WebEx is available on Windows, Linux, MacOS & Mobile devices.  No Excuses. Register today for a class and Get Certified!

Our Live Video Conference via WebEx connections bring you directly into the Classroom!

Certified Ethical Hacker

Course Title: Certified Ethical Hacker (CEH) v12 Duration: 40 hours (5 days, 9:00AM – 5:00PM)
Class Format:

  • Instructor-led classroom – Authorized Training Center (ATC)
  • Live online training – iClass

 

Course Description:

The Certified Ethical Hacker (C|EH v12) program is a trusted and respected ethical hacking Certification program that any information security professional will need. This program in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This program will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

The Certified Ethical Hacker (CEH) is a certification program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The program helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The Certified Ethical Hacker program is the most comprehensive Ethical Hacking program in the world.

Certification/Specialization: 

CEH

 

Prerequisite Knowledge:

  • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
  • Prior completion of NET+/SEC+ training would be an advantage

 

Who Should Attend:

  • Anyone interested in Cyber Security
  • Attorneys, legal consultants, and lawyers
  • Law enforcement officers
  • Police officers
  • Federal/ government agents
  • Defense and military
  • Detectives/ investigators
  • Incident response team members
  • Information security managers
  • Network defenders
  • IT professionals, IT directors/ managers
  • System/network engineers
  • Security analyst/ architect/ auditors/ consultants

 

Course Delivery Method:

This boot camp is approximately 60% lecture and 40% hands-on labs.  The instructor uses a combination of “Chalk talk” and “one on one mentoring”, the instructor will NOT always use an overhead projector.  We believe in traditional method of teaching where the subjects were taught and NOT lectured.  The classroom material is based on current C|EH.

 

Military and Veteran Pricing

Internetwork Academy Appreciates your Service

CEHv12 Course Outline

 

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography