Online Training Course
EC-COUNCIL CEH
Certify your red team’s skills and get ahead of hackers by training for EC-Council’s Certified Ethical Hacker (CEH) certification. For individuals looking to prepare on their own, we offer a CEH Practice Test.
Course Overview
EC-Council’s Certified Ethical Hacker (CEHv11 or “Version 11”) certification is designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems. N2K’s CEH certification training course provides your team of security analysts, penetration testers, or vulnerability analysts with foundational red team knowledge and skills in security, procedures, analysis,
and more to better uphold the security posture of the organization.
Our 100% online format makes it easier for your workforce to accommodate training. This Live Online CEH Course is taught online over eight consecutive weeks with live instruction once per week and includes multiple learning tools and materials in our LMS. Resources within the portal are available on-demand for a full six-month access period of the course.
Prerequisites
According to EC-Council, it is recommended to have at least two (2) years of related information security experience. Proof of experience is required.
Related Courses
Equivalent certifications to the CEH include EC-Council’s Certified Network Defender (CND) or Pentest+ from CompTIA.
EC-Council also has a Certified Ethical Hacker Master credential, or CEH (Practical), that serves as a “next level” certification following the actual CEH exam.
Who should earn the CEH?
The CEH is an intermediate-level certification equivalent to 2 years of hands-on experience in a security role. Individuals in the following roles are excellent candidates for this certification.
- Junior Penetration Testers or Ethical Hackers who want to take their hacking skills to the next level
- SOC Analysts and Incident Responders who want a better understanding of “hacker mentality” and tactics
- Network Security Specialists who oversee enterprise networks to source and mitigate vulnerabilities
Benefits of Training
There are a great number of benefits to achieving the CEH certification, but a few highlights include:
- Ideal credential to validate Red Team skills and abilities
- Understand the latest hacking techniques and methodologies used by hackers
- Mapped to NICE 2.0
- DoDD 8140/8570 approved for CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, and CSSP Auditor
case study
Improving Certification Pass Rates for the US Army
Course Outline
The Certified Ethical Hacker curriculum spans eight (8) domains within cybersecurity. This course provides training for all domains. Click on the sections below to see topic areas within each domain.
Domain 1: Introduction to Ethical Hacking and Footprinting
Overview of information security, hacking and ethical hacking concepts, footprinting, reconnaissance.
- 1.0.0 Domain Introduction
- 1.1.0 Introduction to Ethical Hacking Concepts
- 1.1.1 Information Security Overview
- 1.1.2 Information Security Threats and Attack Vectors
- 1.1.3 Hacking Concepts
- 1.1.4 Ethical Hacking Concepts
- 1.1.5 Information Security Controls
- 1.1.6 Information Security Policies and Physical Security
- 1.1.7 Risk, Incident Management, and SIEM
- 1.1.8 Network Security Controls, IAM and Data Concepts
- 1.1.9 Penetration Testing Concepts
- 1.1.10 Information Security Laws and Standards
- 1.2.0 Footprinting and Reconnaissance Concepts
- 1.2.1 Footprinting Concepts and Footprinting through Search Engines
- 1.2.2 Footprinting through Web Services and Social Networking Sites
- 1.2.3 Website and Email Footprinting, Competitive Intelligence
- 1.2.4 Whois, DNS, Network Footprinting, and Footprinting through Social Engineering
- 1.2.5 Footprinting Tools
- 1.2.6 Footprinting Countermeasures and Pen Testing
Domain 2: Network Scanning and Enumeration
Overview of network scanning concepts, tools and techniques, enumeration concepts, and vulnerability analysis concepts and solutions.
- 2.0.0 Domain Introduction
- 2.1.0 Network Scanning Concepts
- 2.1.1 Concepts, Tools, Techniques
- 2.1.2 Scanning Beyond IDS and Firewall
- 2.1.3 Banner Grabbing, Network Diagrams, Pen Testing
- 2.2.0 Enumeration Concepts
- 2.2.1 Enumeration Concepts
- 2.2.2 NetBIOS, SNMP, and LDAP Enumeration
- 2.2.3 NTP, SMTP, DNS, and Other Enumeration
- 2.2.4 Countermeasures and Pen Testing
- 2.3.0 Vulnerability Analysis Concepts
- 2.3.1 Vulnerability Assessment Concepts and Solutions
- 2.3.2 Vulnerability Scoring Systems, Assessment Tools, and Reports
Domain 3: System Hacking and Malware Threats
Understand the different types of hacking concepts and different types. Review different malware threat types and malware analysis.
- 3.0.0 Domain Introduction
- 3.1.0 System Hacking Concepts
- 3.1.1 Concepts, Cracking Passwords
- 3.1.2 Escalating Privileges and Executing Applications
- 3.1.3 Hiding Files
- 3.1.4 Covering Tracks, Penetration Testing
- 3.2.0 Malware Threats Concepts
- 3.2.1 Malware and Trojan Concepts
- 3.2.2 Virus and Worm Concepts
- 3.2.3 Malware Analysis
- 3.2.4 Countermeasures, Anti-Malware Software, and Malware Pen Testing
Domain 4: Sniffing and Social Engineering
Review sniffing concepts, tools, and countermeasures. Social engineering concepts, techniques, countermeasures, and penetration testing.
- 4.0.0 Domain Introduction
- 4.1.0 Sniffing Concepts
- 4.1.1 Sniffing Concepts
- 4.1.2 MAC Attacks, DHCP Attacks, ARP Poisoning
- 4.1.3 Spoofing Attacks, DNS Poisoning, Sniffing Tools
- 4.1.4 Countermeasures, Detection Techniques, Pen Testing
- 4.2.0 Social Engineering Concepts
- 4.2.1 Social Engineering Concepts and Techniques
- 4.2.2 Insider Threats, Impersonation, Identity Theft
- 4.2.3 Countermeasures and Pen Testing
Domain 5: Non-Availability, Interception, and Deception
Denial-of-Service, types of session hijacking, IDS, firewall, and honeypot overview, including techniques, tools, and countermeasures.
- 5.0.0 Domain Introduction
- 5.1.0 Denial-of-Service Concepts
- 5.1.1 DoS/DDoS Concepts and Attack Techniques
- 5.1.2 Botnets, Case Studies, Attack Tools
- 5.1.3 Countermeasures, Protection Tools, Pen Testing
- 5.2.0 Session Hijacking Concepts
- 5.2.1 Session Hijacking Concepts, Application Level Session Hijacking
- 5.2.2 Network Level Session Hijacking, Hijacking Tools
- 5.2.3 Countermeasures and Pen Testing
- 5.3.0 Evading IDS, Firewalls, and Honeypots Concepts
- 5.3.1 IDS, Firewall, and Honeypot Concepts
- 5.3.2 IDS, Firewall, and Honeypot Solutions
- 5.3.3 Evading IDS
- 5.3.4 Evading Firewalls
- 5.3.5 IDS/Firewall Evading Tools, Detecting Honeypots
- 5.3.6 Countermeasures and Pen Testing
- 5.0.0 Domain Introduction
Domain 6: Attacking Web Servers and Applications
Understand the different types, methodologies, tools, and countermeasures for both web server and web application hacking and SQL injection.
- 6.0.0 Domain Introduction
- 6.1.0 Hacking Web Server Concepts and Attacks
- 6.1.1 Web Server Concepts and Attacks
- 6.1.2 Web Server Attack Methodology and Attack Tools
- 6.1.3 Countermeasures, Patch Management, Security Tools, and Pen Testing
- 6.2.0 Hacking Web Application Concepts
- 6.2.1 Web App Concepts and Threats
- 6.2.2 Hacking Methodology
- 6.2.3 Hacking Tools, Countermeasures, Testing Tools, Pen Testing
- 6.3.0 SQL Injection Concepts
- 6.3.1 SQL Injection Concepts and Types
- 6.3.2 SQL Injection Methodology
- 6.3.3 Tools, Evasion Techniques, Countermeasures
Domain 7: Attack Vectors and Countermeasures
Concepts, attack types, tools, countermeasures, and pen-testing on hacking wireless networks, mobile, and IoT devices.
- 7.0.0 Domain Introduction
- 7.1.0 Hacking Wireless Networks Concepts
- 7.1.1 Wireless Concepts, Wireless Encryption, Wireless Threats
- 7.1.2 Wireless Hacking Methodology
- 7.1.3 Hacking Tools, Bluetooth Hacking, Countermeasures, Tools, Pen Testing
- 7.2.0 Hacking Mobile Platform Concepts
- 7.2.1 Mobile Platform Attack Vectors
- 7.2.2 Hacking Android and iOS, Mobile Spyware
- 7.2.3 MDM, Security Guidelines and Tools, Pen Testing
- 7.3.0 IoT Hacking Concepts
- 7.3.1 IoT Concepts, Attacks
- 7.3.2 IoT Hacking Methodology, Hacking Tools
- 7.3.3 Countermeasures and Pen Testing
Domain 8: IDS, Cloud Computing, and Cryptography
Review cloud computing concepts, threat and attack types, tools, and pen-testing. Understand cryptography concepts, tools, cryptanalysis and countermeasures.
- 8.0.0 Domain Introduction
- 8.1.0 Cloud Computing Concepts
- 8.1.1 Cloud Computing Concepts, Threats and Attacks
- 8.1.2 Cloud Security, Tools, and Pen Testing
- 8.2.0 Cryptography Concepts
- 8.2.1 Cryptography Concepts, Encryption Algorithm
- 8.2.2 Cryptography Tools
- 8.2.3 PKI, Email and Disk Encryption
- 8.2.4 Cryptanalysis, Countermeasures
This course includes:
- CPEs/CEUs: 40
- Diagnostic exam
- CEH final exam
- 200+ digital flashcards
- On-demand training videos
- Knowledge check quizzes
- Performance Tracker
- Practical labs
- 300+ practice question bank
- Summary Notes
- CEH All-In-One Exam Guide by Matt Walker
Why N2K?
Data-Driven
Relevant
Efficient
Cost-Effective
Readiness guarantee – We offer an exam readiness or retake guarantee on all certification courses. If an individual completes the course and does not pass the exam on the first try, they can retake our course at no additional charge for up to one full year.
Request Pricing
Why N2K?
DATA-DRIVEN
EFFICIENT
RELEVANT
COST-EFFECTIVE
Request Pricing
Request more information on training options for your cybersecurity teams. Private classes are available.
I’ve attained my share of certifications, and this CEH course was among the best exam prep classes that I’ve ever taken. The pacing and presentation of the content felt very much like a college class, which really aided in effective retention and understanding of the information.
The online resources that are available are also incredibly useful, especially the library of practice questions. Overall, this course would have been a worthy use of my time even if there were no test associated with it, which is the highest praise I can give a training program.