Online Training Course

EC-Council CEH

EC-Council’s CEH (Certified Ethical Hacker) certification is designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems.  CyberVista’s CEH training course is designed to improve practitioner skills and knowledge to earn the CEH certification.

ECCouncil_CEH-444x110

Who should earn the CEH

The CEH is an intermediate certification designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems in order to improve an organization’s security posture.  The CEH certification also meets the U.S. Department of Defense Directive 8570/8140.


Penetration Tester
Network Security Specialist
Security Consultant
Security Analyst
SOC Analyst
Vulnerability Specialist
Data Analyst

Course Overview

EC-Council’s Certified Ethical Hacking (CEHv10 or “Version 10”) certification is designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems.  CyberVista’s CEH training course is designed to improve cybersecurity practitioner skills and knowledge to help earn the CEH certification.

We offer CEH training in two delivery varieties based on the needs of organizations. The comprehensive Live Online CEH Course is taught online over eight consecutive weeks with a live instruction once per week to complement the all of the tools and materials in the online portal. This option is available for teams of 20 or more participants. For all other needs,  the Video On-Demand CEH Course allows participating practitioners to move at their own pace and is available down to a single participant.

Readiness guarantee – CyberVista offers a course readiness or retake guarantee on all Certify courses. If any individual taking this training course does not pass the exam on the first try or does not feel prepared following the completion of the course can retake the course at no additional charge for up to one full year.
This course includes:
  • 100 question diagnostic exam
  • 125 question final exam
  • 400+ digital flashcards
  • 100 question mid-term practice exam
  • 16+ hours 5-15 minute on-demand training videos
  • Performance Tracker
  • Practical labs
  • 300+ practice question bank
  • Summary Notes
  • Summary Videos
  • Lab Videos
  • CEH All-In-One Exam Guide by Matt Walker

Course Outline

    • 1.0.0 Domain Introduction
    • 1.1.0 Introduction to Ethical Hacking Concepts
      • 1.1.1 Information Security Overview
      • 1.1.2 Information Security Threats and Attack Vectors
      • 1.1.3 Hacking Concepts
      • 1.1.4 Ethical Hacking Concepts
      • 1.1.5 Information Security Controls
      • 1.1.6 Information Security Policies and Physical Security
      • 1.1.7 Risk, Incident Management, and SIEM
      • 1.1.8 Network Security Controls, IAM and Data Concepts
      • 1.1.9 Penetration Testing Concepts
      • 1.1.10 Information Security Laws and Standards
    • 1.2.0 Footprinting and Reconnaissance Concepts
      • 1.2.1 Footprinting Concepts and Footprinting through Search Engines
      • 1.2.2 Footprinting through Web Services and Social Networking Sites
      • 1.2.3 Website and Email Footprinting, Competitive Intelligence
      • 1.2.4 Whois, DNS, Network Footprinting, and Footprinting through Social Engineering
      • 1.2.5 Footprinting Tools
      • 1.2.6 Footprinting Countermeasures and Pen Testing
    • 2.0.0 Domain Introduction
    • 2.1.0 Network Scanning Concepts
      • 2.1.1 Concepts, Tools, Techniques
      • 2.1.2 Scanning Beyond IDS and Firewall
      • 2.1.3 Banner Grabbing, Network Diagrams, Pen Testing
    • 2.2.0 Enumeration Concepts
      • 2.2.1 Enumeration Concepts
      • 2.2.2 NetBIOS, SNMP, and LDAP Enumeration
      • 2.2.3 NTP, SMTP, DNS, and Other Enumeration
      • 2.2.4 Countermeasures and Pen Testing
    • 2.3.0 Vulnerability Analysis Concepts
      • 2.3.1 Vulnerability Assessment Concepts and Solutions
      • 2.3.2 Vulnerability Scoring Systems, Assessment Tools, and Reports
    • 3.0.0 Domain Introduction
    • 3.1.0 System Hacking Concepts
      • 3.1.1 Concepts, Cracking Passwords
      • 3.1.2 Escalating Privileges and Executing Applications
      • 3.1.3 Hiding Files
      • 3.1.4 Covering Tracks, Penetration Testing
    • 3.2.0 Malware Threats Concepts
      • 3.2.1 Malware and Trojan Concepts
      • 3.2.2 Virus and Worm Concepts
      • 3.2.3 Malware Analysis
      • 3.2.4 Countermeasures, Anti-Malware Software, and Malware Pen Testing
    • 4.0.0 Domain Introduction
    • 4.1.0 Sniffing Concepts
      • 4.1.1 Sniffing Concepts
      • 4.1.2 MAC Attacks, DHCP Attacks, ARP Poisoning
      • 4.1.3 Spoofing Attacks, DNS Poisoning, Sniffing Tools
      • 4.1.4 Countermeasures, Detection Techniques, Pen Testing
    • 4.2.0 Social Engineering Concepts
      • 4.2.1 Social Engineering Concepts and Techniques
      • 4.2.2 Insider Threats, Impersonation, Identity Theft
      • 4.2.3 Countermeasures and Pen Testing
    • 5.0.0 Domain Introduction
      • 5.1.0 Denial-of-Service Concepts
      • 5.1.1 DoS/DDoS Concepts and Attack Techniques
      • 5.1.2 Botnets, Case Studies, Attack Tools
      • 5.1.3 Countermeasures, Protection Tools, Pen Testing
    • 5.2.0 Session Hijacking Concepts
      • 5.2.1 Session Hijacking Concepts, Application Level Session Hijacking
      • 5.2.2 Network Level Session Hijacking, Hijacking Tools
      • 5.2.3 Countermeasures and Pen Testing
    • 5.3.0 Evading IDS, Firewalls, and Honeypots Concepts
      • 5.3.1 IDS, Firewall, and Honeypot Concepts
      • 5.3.2 IDS, Firewall, and Honeypot Solutions
      • 5.3.3 Evading IDS
      • 5.3.4 Evading Firewalls
      • 5.3.5 IDS/Firewall Evading Tools, Detecting Honeypots
      • 5.3.6 Countermeasures and Pen Testing
    • 6.0.0 Domain Introduction
    • 6.1.0 Hacking Web Server Concepts and Attacks
      • 6.1.1 Web Server Concepts and Attacks
      • 6.1.2 Web Server Attack Methodology and Attack Tools
      • 6.1.3 Countermeasures, Patch Management, Security Tools, and Pen Testing
    • 6.2.0 Hacking Web Application Concepts
      • 6.2.1 Web App Concepts and Threats
      • 6.2.2 Hacking Methodology
      • 6.2.3 Hacking Tools, Countermeasures, Testing Tools, Pen Testing
    • 6.3.0 SQL Injection Concepts
      • 6.3.1 SQL Injection Concepts and Types
      • 6.3.2 SQL Injection Methodology
      • 6.3.3 Tools, Evasion Techniques, Countermeasures
    • 7.0.0 Domain Introduction
    • 7.1.0 Hacking Wireless Networks Concepts
      • 7.1.1 Wireless Concepts, Wireless Encryption, Wireless Threats
      • 7.1.2 Wireless Hacking Methodology
      • 7.1.3 Hacking Tools, Bluetooth Hacking, Countermeasures, Tools, Pen Testing
    • 7.2.0 Hacking Mobile Platform Concepts
      • 7.2.1 Mobile Platform Attack Vectors
      • 7.2.2 Hacking Android and iOS, Mobile Spyware
      • 7.2.3 MDM, Security Guidelines and Tools, Pen Testing
    • 7.3.0 IoT Hacking Concepts
      • 7.3.1 IoT Concepts, Attacks
      • 7.3.2 IoT Hacking Methodology, Hacking Tools
      • 7.3.3 Countermeasures and Pen Testing
    • 8.0.0 Domain Introduction
    • 8.1.0 Cloud Computing Concepts
      • 8.1.1 Cloud Computing Concepts, Threats and Attacks
      • 8.1.2 Cloud Security, Tools, and Pen Testing
    • 8.2.0 Cryptography Concepts
      • 8.2.1 Cryptography Concepts, Encryption Algorithm
      • 8.2.2 Cryptography Tools
      • 8.2.3 PKI, Email and Disk Encryption
      • 8.2.4 Cryptanalysis, Countermeasures

Why CyberVista?

When it comes to certification training, we know that you and your organization have several options to choose from. This is what separates CyberVista from the pack. 

Data Driven

Live reporting provides an objective view of performance and progress.

Affordable

Total costs average 50% less per person compared to traditional providers.

Effective

Drive real results with high-quality training and practical applications.

Tailored

Designed to adapt to the organization and the individual employee.

Certify Your Workforce

Get your team certified more effectively than ever before. Request more information on training options for your entire cybersecurity and IT teams.