Loading...

Certified Ethical Hacker V10

Certified Ethical Hacker (CEH v10) Course Summary

The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5 day hands on class by our Certified EC-Council Instructor. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.


Course Outcomes

By the end of this Certified Ethical Hacking Program, you will be able to accomplish the following:

  • Students are able to discover the key issues plaguing the information security world, incident management process, and penetration testing
  • Students are able to determine different threats to IoT platforms and learn how to defend IoT devices securely
  • Students are able to perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
  • Students are able to understand mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools
  • Students are able to implement wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools

Course Outline

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Who should Attend the Program?

The Certified Ethical Hacking training course will significantly benefit

  • IT Security officers
  • IT Auditors
  • IT Security professionals
  • IT administrators
  • Anyone who is concerned about the integrity of the network infrastructure

Course Outcomes

By the end of this Certified Ethical Hacking Program, you will be able to accomplish the following:

  • Students are able to discover the key issues plaguing the information security world, incident management process, and penetration testing
  • Students are able to determine different threats to IoT platforms and learn how to defend IoT devices securely
  • Students are able to perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
  • Students are able to understand mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools
  • Students are able to implement wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools

Course Outline

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Who should Attend the Program?

The Certified Ethical Hacking training course will significantly benefit

  • IT Security officers
  • IT Auditors
  • IT Security professionals
  • IT administrators
  • Anyone who is concerned about the integrity of the network infrastructure

Contact Us

We moved to below new address! Suite 610 - The Business Center, Opp to Burjuman Centre, Adjacent to Burjuman Metro Station Exit 4, Khalid Bin Walid Street. P.O.Box: 94743 Dubai, UAE.

metro learnerspoint

Adjacent Building of Burjuman Center Metro Exit #4.

Follow Us  

News & Events

LearnersPoint is proud to announce that they have been associated with...

Read More

Join now the advance level courses and get trained with our industry e...

Read More

Do you have desire to work, study or migrate to English Speaking Count...

Read More

Locate Us

Map online payment

Make secure payment here