EC-Council CEH v10 Training Course

This Certify CEH (Certified Ethical Hacker) course provides practitioners with the benefit of structure and the flexibility of online delivery. 

ECCouncil_CEH-444x110
CEH Badge CyberVista
five stars

I’ve attained my share of certifications, and this CEH course was among the best exam prep classes that I’ve ever taken. The pacing and presentation of the content felt very much like a college class, which really aided in effective retention and understanding of the information.

Read more reviews.

COURSE OVERVIEW

EC-Council’s Certified Ethical Hacking (CEHv10 or “Version 10”) certification is designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems. 

CyberVista’s CEH training system is designed to improve cybersecurity practitioner skills and knowledge to help earn the CEH certification. Like all CyberVista certification training courses, the Live Online course is structured and flexible. The live component is coupled with a powerful learning management system hosting all of the learning tools needed to excel.

Live Online Classroom

Light Board Technology: All Certify courses feature light board lectures. It’s like a glass chalkboard pumped full of light so the writing glows while the instructor looks into the camera. This isn’t death by PowerPoint.

Smarter training for all CEH topic areas.

Click to expand into sub-domains. 

Domain 1: Introduction to Ethical Hacking and Footprinting

  • 1.0.0 Domain Introduction
  • 1.1.0 Introduction to Ethical Hacking Concepts
    • 1.1.1 Information Security Overview
    • 1.1.2 Information Security Threats and Attack Vectors
    • 1.1.3 Hacking Concepts
    • 1.1.4 Ethical Hacking Concepts
    • 1.1.5 Information Security Controls
    • 1.1.6 Information Security Policies and Physical Security
    • 1.1.7 Risk, Incident Management, and SIEM
    • 1.1.8 Network Security Controls, IAM and Data Concepts
    • 1.1.9 Penetration Testing Concepts
    • 1.1.10 Information Security Laws and Standards
  • 1.2.0 Footprinting and Reconnaissance Concepts
    • 1.2.1 Footprinting Concepts and Footprinting through Search Engines
    • 1.2.2 Footprinting through Web Services and Social Networking Sites
    • 1.2.3 Website and Email Footprinting, Competitive Intelligence
    • 1.2.4 Whois, DNS, Network Footprinting, and Footprinting through Social Engineering
    • 1.2.5 Footprinting Tools
    • 1.2.6 Footprinting Countermeasures and Pen Testing

Domain 2: Network Scanning and Enumeration

  • 2.0.0 Domain Introduction
  • 2.1.0 Network Scanning Concepts
    • 2.1.1 Concepts, Tools, Techniques
    • 2.1.2 Scanning Beyond IDS and Firewall
    • 2.1.3 Banner Grabbing, Network Diagrams, Pen Testing
  • 2.2.0 Enumeration Concepts
    • 2.2.1 Enumeration Concepts
    • 2.2.2 NetBIOS, SNMP, and LDAP Enumeration
    • 2.2.3 NTP, SMTP, DNS, and Other Enumeration
    • 2.2.4 Countermeasures and Pen Testing
  • 2.3.0 Vulnerability Analysis Concepts
    • 2.3.1 Vulnerability Assessment Concepts and Solutions
    • 2.3.2 Vulnerability Scoring Systems, Assessment Tools, and Reports

Domain 3: System Hacking and Malware Threats

  • 3.0.0 Domain Introduction
  • 3.1.0 System Hacking Concepts
    • 3.1.1 Concepts, Cracking Passwords
    • 3.1.2 Escalating Privileges and Executing Applications
    • 3.1.3 Hiding Files
    • 3.1.4 Covering Tracks, Penetration Testing
  • 3.2.0 Malware Threats Concepts
    • 3.2.1 Malware and Trojan Concepts
    • 3.2.2 Virus and Worm Concepts
    • 3.2.3 Malware Analysis
    • 3.2.4 Countermeasures, Anti-Malware Software, and Malware Pen Testing

Domain 4: Sniffing and Social Engineering

  • 4.0.0 Domain Introduction
  • 4.1.0 Sniffing Concepts
    • 4.1.1 Sniffing Concepts
    • 4.1.2 MAC Attacks, DHCP Attacks, ARP Poisoning
    • 4.1.3 Spoofing Attacks, DNS Poisoning, Sniffing Tools
    • 4.1.4 Countermeasures, Detection Techniques, Pen Testing
  • 4.2.0 Social Engineering Concepts
    • 4.2.1 Social Engineering Concepts and Techniques
    • 4.2.2 Insider Threats, Impersonation, Identity Theft
    • 4.2.3 Countermeasures and Pen Testing

Domain 5: Non-Availability, Interception, and Deception

  • 5.0.0 Domain Introduction
    • 5.1.0 Denial-of-Service Concepts
    • 5.1.1 DoS/DDoS Concepts and Attack Techniques
    • 5.1.2 Botnets, Case Studies, Attack Tools
    • 5.1.3 Countermeasures, Protection Tools, Pen Testing
  • 5.2.0 Session Hijacking Concepts
    • 5.2.1 Session Hijacking Concepts, Application Level Session Hijacking
    • 5.2.2 Network Level Session Hijacking, Hijacking Tools
    • 5.2.3 Countermeasures and Pen Testing
  • 5.3.0 Evading IDS, Firewalls, and Honeypots Concepts
    • 5.3.1 IDS, Firewall, and Honeypot Concepts
    • 5.3.2 IDS, Firewall, and Honeypot Solutions
    • 5.3.3 Evading IDS
    • 5.3.4 Evading Firewalls
    • 5.3.5 IDS/Firewall Evading Tools, Detecting Honeypots
    • 5.3.6 Countermeasures and Pen Testing

Domain 6: Attacking Web Servers and Applications

  • 6.0.0 Domain Introduction
  • 6.1.0 Hacking Web Server Concepts and Attacks
    • 6.1.1 Web Server Concepts and Attacks
    • 6.1.2 Web Server Attack Methodology and Attack Tools
    • 6.1.3 Countermeasures, Patch Management, Security Tools, and Pen Testing
  • 6.2.0 Hacking Web Application Concepts
    • 6.2.1 Web App Concepts and Threats
    • 6.2.2 Hacking Methodology
    • 6.2.3 Hacking Tools, Countermeasures, Testing Tools, Pen Testing
  • 6.3.0 SQL Injection Concepts
    • 6.3.1 SQL Injection Concepts and Types
    • 6.3.2 SQL Injection Methodology
    • 6.3.3 Tools, Evasion Techniques, Countermeasures

Domain 7: Attack Vectors and Countermeasures

  • 7.0.0 Domain Introduction
  • 7.1.0 Hacking Wireless Networks Concepts
    • 7.1.1 Wireless Concepts, Wireless Encryption, Wireless Threats
    • 7.1.2 Wireless Hacking Methodology
    • 7.1.3 Hacking Tools, Bluetooth Hacking, Countermeasures, Tools, Pen Testing
  • 7.2.0 Hacking Mobile Platform Concepts
    • 7.2.1 Mobile Platform Attack Vectors
    • 7.2.2 Hacking Android and iOS, Mobile Spyware
    • 7.2.3 MDM, Security Guidelines and Tools, Pen Testing
  • 7.3.0 IoT Hacking Concepts
    • 7.3.1 IoT Concepts, Attacks
    • 7.3.2 IoT Hacking Methodology, Hacking Tools
    • 7.3.3 Countermeasures and Pen Testing

Domain 8: IDS, Cloud Computing, and Cryptography

  • 8.0.0 Domain Introduction
  • 8.1.0 Cloud Computing Concepts
    • 8.1.1 Cloud Computing Concepts, Threats and Attacks
    • 8.1.2 Cloud Security, Tools, and Pen Testing
  • 8.2.0 Cryptography Concepts
    • 8.2.1 Cryptography Concepts, Encryption Algorithm
    • 8.2.2 Cryptography Tools
    • 8.2.3 PKI, Email and Disk Encryption
    • 8.2.4 Cryptanalysis, Countermeasures

Who should earn the CEH?

The CEH is an intermediate certification designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems in order to improve an organization’s security posture.  This credential is well-suited for those in or aspiring to the following positions:

Penetration Tester Ethical Hacker
Network Security Specialist Security Consultant
Security Analyst SOC Analyst
Vulnerability Specialist Data Analyst

The CEH also meets the U.S. Department of Defense Directive 8570.

About the Exam

The CEH credential from EC-Council certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Performance-based Questions No
Exam Length 4 Hours, 125 Questions
Experience Level Intermediate
Pre-requisites CEH Training; 2 years InfoSec experience, endorsement
Exam Price  $1,199
Passing Score  70%

Free CEH Guide

The Anatomy of the CEH exam download dives into the CEH v10 exam structure, content, application process, and general reasons as to why you should consider earning this in-demand cert.

CEH Anatomy Guide Download

WHAT YOU'LL RECEIVE

Domain Foundations

Quiz Bank

More than 300 high quality practice questions. Want a quick 10 question quiz on a certain domain? Easy!

On-Demand Videos

More than 16 hours of short videos available. Content is delivered in 5-10 minute bite-sized chunks mapped to all of the sub-topics.

Performance Tracker

The Performance Tracker allows students to gauge progress and track improvement. Links directly to relevant videos.

Lab Exercises

Lab Exercises contain a scenario, objectives, and individual step-by-step tasks.

Homestretch Tools

Summary Notes

We guide studies with condensed fact sheets that focus on the most important concepts to make long term retention easier.

Summary Videos

This 2-hour video series focuses on making connections across the topic areas helping students to learn and retain the information for the long term.

Digital Flashcards

400+ e-flashcards are available on any mobile device. Students can practice to ensure confidence.

Supplementary Lab Videos

Expert led guides to the most important CEH labs.

Additional Resources

Diagnostic Exam

Before students begin the course, a 100 question diagnostic exam will identify current areas of strength and weakness to help to focus efforts on improvement.

Lesson Book

The CyberVista Lesson Book is a companion book to the live online sessions serving as the perfect place for note taking.

Mid-term & Final Exam

A 100 question mid-term practice exam and 125 question final ensure that students complete the course prepared and confident to pass the exam.

Textbook

CEH All-In-One Exam Guide by Matt Walker

COURSE SCHEDULE

The schedule below is applicable to the Live Online version of the course. Within the Live Online course, students attend an online lecture three hours a week over while partnering with fellow students in our interactive, live online environment. 

CyberVista CISSP Training Learning Management System CISSP

PRICING + FINANCING

CEH Training Course

Live Online
$3,995

• Engaging Live Online Instruction
• EC-Council Approved Course & Instructors
• Readiness Guarantee
• Exam Voucher Included
• Domain Foundations
• Homestretch Tools
• Additional Resources

CEH Training Course

On-Demand
$3,495

• Flexible On-Demand Delivery
• EC-Council Approved Course & Instructors
• Readiness Guarantee
• Exam Voucher Included
• Domain Foundations
• Homestretch Tools
• Additional Resources

Monthly Financing

For added flexibility and affordability, all individual students are welcome to take advantage of our partnership with Skills Fund offering monthly financing for all Certify courses.

For Business

If you are interested in training for a team or your organization, submit a request within CyberVista’s Enterprise Program. We offer scaled corporate discounts.

For Government

If you are interested in training for a public organization, agency, or government contractor, please review our Government Program. We can offer special government pricing on all courses.

FAQs

Have questions?
Check out our frequently asked questions.

PRACTICE QUESTIONS

Test your skills with
free practice questions.

SPECIAL OFFERS

Check out the promotional offers
available for this month.

REVIEWS

five stars

Very High Quality Training

I’ve attained my share of certifications, and this CEH course was among the best exam prep classes that I’ve ever taken. The pacing and presentation of the content felt very much like a college class, which really aided in effective retention and understanding of the information .

The online resources that are available are also incredibly useful, especially the library of practice questions.

Overall, this course would have been a worthy use of my time even if there were no test associated with it, which is the highest praise I can give a training program.

five stars

Well organized training, great instructor!

I recently took the CEH training and it exceeded my expectations:
– Content was adequate and well presented by an instructor who was professional, knows his stuff and interacted very well with an online class (always that is always a challenge). He also presented daily situations that helped absorb the content much better
– Materials: I received a CEH AIO (all-in-one) book and Cybervista’s training materials, which are well organized, with good space to take many notes
– Coordination: Having a good instructor and materials is important, but having a good organization behind the scenes is critical to support the class for weeks. In this point, Cybervista’s staff was always courteous and responsive to my emails

color
https://www.cybervista.net/wp-content/themes/blake/
https://www.cybervista.net//
#0085c3
style1
scroll
Loading posts...
/nas/content/live/cybervista/
#
on
none
loading
#
Sort Gallery
https://www.cybervista.net/wp-content/themes/blake
on
no
off
Enter your email here
off
off