Online Training Course

EC-COUNCIL CEH

Certify your red team’s skills and get ahead of hackers by training for EC-Council’s Certified Ethical Hacker (CEH) certification. For individuals looking to prepare on their own, we offer a CEH Practice Test.

ECCouncil_CEH-444x110

Course Overview

EC-Council’s Certified Ethical Hacker (CEHv11 or “Version 11”) certification is designed for skilled professionals who want to understand how to find weaknesses and vulnerabilities in target systems. N2K’s CEH certification training course provides your team of security analysts, penetration testers, or vulnerability analysts with foundational red team knowledge and skills in security, procedures, analysis,
and more to better uphold the security posture of the organization.

Our 100% online format makes it easier for your workforce to accommodate training. This Live Online CEH Course is taught online over eight consecutive weeks with live instruction once per week and includes multiple learning tools and materials in our LMS. Resources within the portal are available on-demand for a full six-month access period of the course.

Prerequisites

According to EC-Council, it is recommended to have at least two (2) years of related information security experience. Proof of experience is required.

Related Courses

Equivalent certifications to the CEH include EC-Council’s Certified Network Defender (CND) or Pentest+ from CompTIA.

EC-Council also has a Certified Ethical Hacker Master credential, or CEH (Practical), that serves as a “next level” certification following the actual CEH exam.

Who should earn the CEH?

The CEH is an intermediate-level certification equivalent to 2 years of hands-on experience in a security role. Individuals in the following roles are excellent candidates for this certification. 

  • Junior Penetration Testers or Ethical Hackers who want to take their hacking skills to the next level
  • SOC Analysts and Incident Responders who want a better understanding of “hacker mentality” and tactics
  • Network Security Specialists who oversee enterprise networks to source and mitigate vulnerabilities

Benefits of Training

There are a great number of benefits to achieving the CEH certification, but a few highlights include:

  • Ideal credential to validate Red Team skills and abilities
  • Understand the latest hacking techniques and methodologies used by hackers
  • Mapped to NICE 2.0
  • DoDD 8140/8570 approved for CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, and CSSP Auditor

case study

Improving Certification Pass Rates for the US Army

Course Outline

The Certified Ethical Hacker curriculum spans eight (8) domains within cybersecurity. This course provides training for all domains. Click on the sections below to see topic areas within each domain.

  • Overview of information security, hacking and ethical hacking concepts, footprinting, reconnaissance.

    • 1.0.0 Domain Introduction
    • 1.1.0 Introduction to Ethical Hacking Concepts
      • 1.1.1 Information Security Overview
      • 1.1.2 Information Security Threats and Attack Vectors
      • 1.1.3 Hacking Concepts
      • 1.1.4 Ethical Hacking Concepts
      • 1.1.5 Information Security Controls
      • 1.1.6 Information Security Policies and Physical Security
      • 1.1.7 Risk, Incident Management, and SIEM
      • 1.1.8 Network Security Controls, IAM and Data Concepts
      • 1.1.9 Penetration Testing Concepts
      • 1.1.10 Information Security Laws and Standards
    • 1.2.0 Footprinting and Reconnaissance Concepts
      • 1.2.1 Footprinting Concepts and Footprinting through Search Engines
      • 1.2.2 Footprinting through Web Services and Social Networking Sites
      • 1.2.3 Website and Email Footprinting, Competitive Intelligence
      • 1.2.4 Whois, DNS, Network Footprinting, and Footprinting through Social Engineering
      • 1.2.5 Footprinting Tools
      • 1.2.6 Footprinting Countermeasures and Pen Testing
  • Overview of network scanning concepts, tools and techniques, enumeration concepts, and vulnerability analysis concepts and solutions.

    • 2.0.0 Domain Introduction
    • 2.1.0 Network Scanning Concepts
      • 2.1.1 Concepts, Tools, Techniques
      • 2.1.2 Scanning Beyond IDS and Firewall
      • 2.1.3 Banner Grabbing, Network Diagrams, Pen Testing
    • 2.2.0 Enumeration Concepts
      • 2.2.1 Enumeration Concepts
      • 2.2.2 NetBIOS, SNMP, and LDAP Enumeration
      • 2.2.3 NTP, SMTP, DNS, and Other Enumeration
      • 2.2.4 Countermeasures and Pen Testing
    • 2.3.0 Vulnerability Analysis Concepts
      • 2.3.1 Vulnerability Assessment Concepts and Solutions
      • 2.3.2 Vulnerability Scoring Systems, Assessment Tools, and Reports
  • Understand the different types of hacking concepts and different types. Review different malware threat types and malware analysis.

    • 3.0.0 Domain Introduction
    • 3.1.0 System Hacking Concepts
      • 3.1.1 Concepts, Cracking Passwords
      • 3.1.2 Escalating Privileges and Executing Applications
      • 3.1.3 Hiding Files
      • 3.1.4 Covering Tracks, Penetration Testing
    • 3.2.0 Malware Threats Concepts
      • 3.2.1 Malware and Trojan Concepts
      • 3.2.2 Virus and Worm Concepts
      • 3.2.3 Malware Analysis
      • 3.2.4 Countermeasures, Anti-Malware Software, and Malware Pen Testing
  • Review sniffing concepts, tools, and countermeasures. Social engineering concepts, techniques, countermeasures, and penetration testing.

    • 4.0.0 Domain Introduction
    • 4.1.0 Sniffing Concepts
      • 4.1.1 Sniffing Concepts
      • 4.1.2 MAC Attacks, DHCP Attacks, ARP Poisoning
      • 4.1.3 Spoofing Attacks, DNS Poisoning, Sniffing Tools
      • 4.1.4 Countermeasures, Detection Techniques, Pen Testing
    • 4.2.0 Social Engineering Concepts
      • 4.2.1 Social Engineering Concepts and Techniques
      • 4.2.2 Insider Threats, Impersonation, Identity Theft
      • 4.2.3 Countermeasures and Pen Testing
  • Denial-of-Service, types of session hijacking, IDS, firewall, and honeypot overview, including techniques, tools, and countermeasures.

    • 5.0.0 Domain Introduction
      • 5.1.0 Denial-of-Service Concepts
      • 5.1.1 DoS/DDoS Concepts and Attack Techniques
      • 5.1.2 Botnets, Case Studies, Attack Tools
      • 5.1.3 Countermeasures, Protection Tools, Pen Testing
    • 5.2.0 Session Hijacking Concepts
      • 5.2.1 Session Hijacking Concepts, Application Level Session Hijacking
      • 5.2.2 Network Level Session Hijacking, Hijacking Tools
      • 5.2.3 Countermeasures and Pen Testing
    • 5.3.0 Evading IDS, Firewalls, and Honeypots Concepts
      • 5.3.1 IDS, Firewall, and Honeypot Concepts
      • 5.3.2 IDS, Firewall, and Honeypot Solutions
      • 5.3.3 Evading IDS
      • 5.3.4 Evading Firewalls
      • 5.3.5 IDS/Firewall Evading Tools, Detecting Honeypots
      • 5.3.6 Countermeasures and Pen Testing
  • Understand the different types, methodologies, tools, and countermeasures for both web server and web application hacking and SQL injection.

    • 6.0.0 Domain Introduction
    • 6.1.0 Hacking Web Server Concepts and Attacks
      • 6.1.1 Web Server Concepts and Attacks
      • 6.1.2 Web Server Attack Methodology and Attack Tools
      • 6.1.3 Countermeasures, Patch Management, Security Tools, and Pen Testing
    • 6.2.0 Hacking Web Application Concepts
      • 6.2.1 Web App Concepts and Threats
      • 6.2.2 Hacking Methodology
      • 6.2.3 Hacking Tools, Countermeasures, Testing Tools, Pen Testing
    • 6.3.0 SQL Injection Concepts
      • 6.3.1 SQL Injection Concepts and Types
      • 6.3.2 SQL Injection Methodology
      • 6.3.3 Tools, Evasion Techniques, Countermeasures
  • Concepts, attack types, tools, countermeasures, and pen-testing on hacking wireless networks, mobile, and IoT devices.

    • 7.0.0 Domain Introduction
    • 7.1.0 Hacking Wireless Networks Concepts
      • 7.1.1 Wireless Concepts, Wireless Encryption, Wireless Threats
      • 7.1.2 Wireless Hacking Methodology
      • 7.1.3 Hacking Tools, Bluetooth Hacking, Countermeasures, Tools, Pen Testing
    • 7.2.0 Hacking Mobile Platform Concepts
      • 7.2.1 Mobile Platform Attack Vectors
      • 7.2.2 Hacking Android and iOS, Mobile Spyware
      • 7.2.3 MDM, Security Guidelines and Tools, Pen Testing
    • 7.3.0 IoT Hacking Concepts
      • 7.3.1 IoT Concepts, Attacks
      • 7.3.2 IoT Hacking Methodology, Hacking Tools
      • 7.3.3 Countermeasures and Pen Testing
  • Review cloud computing concepts, threat and attack types, tools, and pen-testing. Understand cryptography concepts, tools, cryptanalysis and countermeasures.

    • 8.0.0 Domain Introduction
    • 8.1.0 Cloud Computing Concepts
      • 8.1.1 Cloud Computing Concepts, Threats and Attacks
      • 8.1.2 Cloud Security, Tools, and Pen Testing
    • 8.2.0 Cryptography Concepts
      • 8.2.1 Cryptography Concepts, Encryption Algorithm
      • 8.2.2 Cryptography Tools
      • 8.2.3 PKI, Email and Disk Encryption
      • 8.2.4 Cryptanalysis, Countermeasures
This course includes:
  • CPEs/CEUs: 40
  • Diagnostic exam
  • CEH final exam
  • 200+ digital flashcards
  • On-demand training videos
  • Knowledge check quizzes
  • Performance Tracker
  • Practical labs
  • 300+ practice question bank
  • Summary Notes
  • CEH All-In-One Exam Guide by Matt Walker

Why N2K?

When it comes to certification training, we know that you and your organization have several options to choose from. This is what separates N2K from the pack.

Data-Driven

Measure improvements with robust performance analytics

Relevant

Build the right knowledge and skills specific to roles

Efficient

Foster long-term retention without wasting time on cramming

Cost-Effective

Total costs average 50% less per person compared to the leading bootcamp
Readiness guarantee – We offer an exam readiness or retake guarantee on all certification courses. If an individual completes the course and does not pass the exam on the first try, they can retake our course at no additional charge for up to one full year.

Request Pricing

Why N2K?

When it comes to certification training, we know that you and your organization have several options to choose from. This is what separates N2K from the pack.

DATA-DRIVEN

Measure improvements with robust performance analytics

EFFICIENT

Foster long-term retention without wasting time on cramming

RELEVANT

Build the right knowledge and skills specific to roles

COST-EFFECTIVE

Total costs average at least 50% less per person compared to the leading bootcamp

Request Pricing

Request more information on training options for your cybersecurity teams. Private classes are available.