Certified Ethical Hacker (CEH v10)

Includes: Lessons, test prep, live lab.

Delivery Methodology: Online, On Demand

Price: $384 $269 (30% discount, Limited time offer!)

Language: English

  • Personal
  • Groups

Certified Ethical Hacker (CEH v10) - $269

Price: $384 $269 (30% discount, Limited time offer!)
Delivery Methodology: Online, On Demand 
Your Advantage:
Lessons: 15+ Lessons, 250+ Quizzes, 70+ Flashcards, 140+ Glossary of terms
Test Preps: 100+ Pre-Assessment Questions, 2+ Full Length Tests, 100+ Post Assessment Questions, 200+ Practice Test Questions
Lab: 38+ Performance lab, 38+ Video tutorials, 16+ Minutes
Video Lessons: 50+ Videos, 08:18+ Hours
Learn at your pace, Certificate of Completion Issued.
Accessed on Mobile/ PC, Unlimited tests& Quizzes.
100% Money back guarantee, 100% Syllabus covered.
Industry Expert Instructors, Regularly Updated content.

Certified Ethical Hacker (CEH v10)
Request for Info: 

    2
    4.9
    4.9/5

    Share:

    Become the industry Guru of Ethical Hacking, with an EC-Council CEH Certificate.

    Course Overview

    The Certified Ethical Hacker (CEH) certification validates the application knowledge of security auditors and site administrators as regards information security. The certification ensures minimum standards of credentialing professional information security specialists in ethical hacking measures. Passing the CEH exam certifies that individuals have the specific network security discipline of ethical hacking from a vendor-neutral perspective.

    Program Outcomes

    • Key issues plaguing the information security world, ethical hacking, information security controls, laws & standards.
    • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
    • Different types of malwares (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
    • Network scanning techniques & scanning countermeasures.
    • Enumeration techniques & enumeration countermeasures.
    • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
    • Perform foot printing and reconnaissance using the latest foot printing techniques and tools as a critical pre-attack phase required in ethical hacking.
    • Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.
    • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

    To enroll for this course, click here. Our expert will be in contact with you shortly thereafter.

    What You will get

    • Lessons: 15+ Lessons, 250+ Quizzes, 70+ Flashcards, 140+ Glossary of terms
    • TestPrep: 100+ Pre-Assessment Questions, 2+ Full Length Tests, 100+ Post Assessment Questions, 200+ Practice Test Questions
    • Live Lab: 38+ Performance Lab, 38+ Video tutorials, 16+ Minutes.
    • Learn at your pace, Certificate of Completion Issued.
    • Accessed on Mobile/ PC, Unlimited tests& Quizzes.
    • 100% Money back guarantee, 100% Syllabus covered.
    • Industry Expert Instructors, Regularly Updated content.
    • You will receive a Certificate like this one on completion of the program.

    Why KnowledgeSpace Training and Consulting?

    • Modern Learning Management System: Our cloud-based device-enabled learning platform supports self-paced, mentor guided, and instructor led learning.
    • Strong Partnerships: We have strategic Partnerships with renowned international organizations for unrivalled training platforms and content.
    • Modern Delivery Methodology: Enhanced course delivery techniques comprising of: Assessments, test preps, Labs, Instructor led training, Self-paced online Training and Blended Solutions
    • Practical Courses: Courses and labs complete with Pre-Assessments, Exercises, Flashcards, Quizzes, and Post Assessments. Our Hands-on labs are virtual and live environments where students learn by doing.
    • Customer Centricity: We listen to you. You are at the epicenter of what we do. Therefore, you ultimately determine the services you receive from us. We have maintained a Customer Satisfaction rating of 99%. This is a testament to the quality of courses that we deliver.
    • Certified Training Experts: Our training team consists of Certified industry experts who facilitate your learning experience.

    Testimonials

    • Course content
    • Career Prospects
    • Prerequisites
    • Exam Info & Requirements
    • Sample Certificate
    • FAQs
    1. Introduction
    • What Is a CEH?
    • About EC-Council
    • Using This Course
    • Objective Map
    • Let’s Get Started!
    1. Ethical Hacking
    • Overview of Ethics
    • Overview of Ethical Hacking
    • Methodology of Ethical Hacking
    • Summary
    1. Networking Foundations
    • Communications Models
    • Topologies
    • Physical Networking
    • IP
    • TCP
    • UDP
    • Internet Control Message Protocol
    • Network Architectures
    • Cloud Computing
    • Summary
    1. Security Foundations
    • The Triad
    • Risk
    • Policies, Standards, and Procedures
    • Security Technology
    • Being Prepared
    • Summary
    1. Foot printing and Reconnaissance
    • Open-Source Intelligence
    • Domain Name System
    • Passive Reconnaissance
    • Website Intelligence
    • Technology Intelligence
    • Summary
    1. Scanning Networks
    • Ping Sweeps
    • Port Scanning
    • Vulnerability Scanning
    • Packet Crafting and Manipulation
    • Evasion Techniques
    • Summary
    1. Enumeration
    • Service Enumeration
    • Remote Procedure Calls
    • Server Message Block
    • Simple Network Management Protocol
    • Simple Mail Transfer Protocol
    • Web-Based Enumeration
    • Summary
    1. System Hacking
    • Searching for Exploits
    • System Compromise
    • Gathering Passwords
    • Password Cracking
    • Client-Side Vulnerabilities
    • Post Exploitation
    • Summary
    1. Malware
    • Malware Types
    • Malware Analysis
    • Creating Malware
    • Malware Infrastructure
    • Antivirus Solutions
    • Summary
    1. Sniffing
    • Packet Capture
    • Packet Analysis
    • Spoofing Attacks
    • Summary
    1. Social Engineering
    • Social Engineering
    • Physical Social Engineering
    • Phishing Attacks
    • Website Attacks
    • Wireless Social Engineering
    • Automating Social Engineering
    • Summary
    1. Wireless Security
    • Wi-Fi
    • Bluetooth
    • Mobile Devices
    • Summary
    1. Attack and Defense
    • Web Application Attacks
    • Denial of Service Attacks
    • Application Exploitation
    • Lateral Movement
    • Defense in Depth/Defense in Breadth
    • Defensible Network Architecture
    • Summary
    1. Cryptography
    • Basic Encryption
    • Symmetric Key Cryptography
    • Asymmetric Key Cryptography
    • Certificate Authorities and Key Management
    • Cryptographic Hashing
    • Summary
    1. Security Architecture and Design
    • Data Classification
    • Security Models
    • Application Architecture
    • Security Architecture
    • Summary 
    1. Performance Labs
    • Hands on Activities (Performance Labs)
    • Security Foundations
    • Footprinting and Reconnaissance
    • Scanning Networks
    • Enumeration
    • System Hacking
    • Malware
    • Sniffing
    • Social Engineering
    • Attack and Defense
    • Cryptography

    Below are some of the career paths and potential opportunities after passing the Certified Ethical Hacker (CEH) certification exam.

    • Ethical Hacker
    • Penetration Tester
    • Site Administrator
    • Security Administrator
    • IT Security Consultant
    • Computer Forensics Analyst
    • Homeland Security Specialist
    • Information Security Analyst/Administrator
    • Information Assurance (IA) Security Officer
    • Information Security Manager/Specialist
    • Information Systems Security Engineer/Manager
    • Information Security Professionals/Officers
    • Information Security/IT Auditors
    • Risk/Threat/Vulnerability Analyst
    • System Administrators
    • Network Administrators and Engineers

    No official Prerequisites.

    • Number of Questions: 125
    • Test Duration: 4 Hours
    • Test Format: Multiple Choice
    • Test Delivery: ECC EXAM, VUE
    • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
    • Passing Score: To maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e., different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

    To learn more about CEH, Click here.

    • What are the prerequisites for this exam? No official prerequisites
    • What is the exam registration fee? USD 500
    • Where do I take the exam? ECC Exam and Pearson VUE
    • What is the format of the exam? Multiple choice questions
    • How many questions are asked in the exam? The exam contains 125 questions.
    • What is the duration of the exam? 240 minutes
    • What is the passing score? This depends on the exam.
    • What is the exam's retake policy?
      • If a candidate hasn’t passed the exam on the first attempt, there is no waiting period is required before attempting again (1st retake).
      • If a candidate doesn’t pass during the second attempt (1st retake), a waiting period of 14 days is required prior to attempting the exam for the third time (2nd retake).
      • If a candidate doesn’t pass the third attempt (2nd retake), a waiting period of 14 days is required prior to attempting the exam for the fourth time (3rd retake).
      • If a candidate doesn’t pass during the fourth attempt (3rd retake), a waiting period of 14 days is required before attempting the exam for the fifth time (4th retake).
      • A candidate is not allowed to take a given exam more than five times in 12-months (1 year) period and a waiting period of 12-months will be imposed before being allowed to attempt the exam for the sixth time (5th retake).
      • Candidates who pass the exam are not allowed to attempt the same version of the exam for the second time.
    • What is the validity of the certification? Three years

    We also Recomend:

    Bespoke/Custom Training

    We can also deliver and customize this training course for larger groups – saving your organization time, money & resources. For more information, please Contact Us or call us on +254702555333. 

    Please check out our Scheduled Training Plan for courses you can enroll. Additionally, you can enlist on our Refer & Earn Program and reap the benefits of recommending your friends and colleagues.

    X