Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

Certified Ethical Hacker Training (CEH) v11

Certified Ethical Hacker Training (CEH) v11

Certified Ethical Hacker Training (CEH) v11:

Certified Ethical Hacker Training (CEH) v11 with real-world hands-on labs (Online or Onsite Live)

Prepare for the Certified Ethical Hacker (CEH) v11 and learn to think like a hacker while looking for system weaknesses and vulnerabilities.

The goal of this Certified Ethical Hacker Training (CEH) v11 course is to help you master an ethical hacking methodology that can be used in penetration testing to lawfully assess the security of a system. This Certified Ethical Hacker (CEH) v11 course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker certification exam (312-50) from EC-Council.

EC Council security experts have designed over 140 labs, which mimic real-time scenarios to help you “live” through an attack as if it were real. You’ll also be given access to over 2,200 commonly used hacking tools to immerse you into the hacker world.

Why take Certified Ethical Hacker?

Given the many cybersecurity attacks and great volume of personal data at risk, plus the potential legal liabilities, the need for certified ethical hackers is quite high. This Certified Ethical Hacker (CEH) v11 course is a must-take for anyone responsible for network and data security who is looking to get CEH certified.

This Certified Ethical Hacker (CEH) v11 course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

What’s included

  • 5 days of hands-on Certified Ethical Hacker Training (CEH) v11 with an expert instructor
  • EC-Council approved CEH Training Student Guide
  • EC-Council approved CEH Training Labs
  • EC-Council approved CEH Training Practice Exams
  • 1 CEH exam voucher
  • 100% Satisfaction Guarantee


Related Courses:

Customize It:

  • If you are familiar with some aspects of CEH Certification Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CEH Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CEH Certification Training course in a manner understandable to lay audiences.

Audience / Target Group:

The intended audience for our CEH training program is an IT professional who is focused on network security, specifically ethical hacking from a vendor-neutral perspective. CEH is generally a great fit for those working in roles such as, but not limited to:

  • Security Officers
  • Auditors
  • Security Professionals
  • Site Administrators
  • Any Professional who is Concerned About the Integrity of the Network Infrastructure.


Upon completing this Certified Ethical Hacker (CEH) course, learners will be able to meet these objectives:

  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS attacks
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing
  • Hacking challenges on steroids
  • Emerging attack vectors
  • Malware reverse engineering
  • Operation technology
  • WPA3

Course Syllabus:

This official EC-Council training seminar reviews all 20 comprehensive modules that were created by EC-Council for CEH (v11), ensuring our students successfully prepare for the CEH certification exam while also enhancing their overall competencies in ethical hacking.

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: Vulnerability Analysis
  • Module 6: System Hacking
  • Module 7: Malware Threats
  • Module 8: Sniffing
  • Module 9: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Request More Information

    Time frame: