0
0
12 weeks
Advanced Level
English
10
Self
Credential to be awarded: Certificate of Completion
Total Hours: 40
ALL Included: All Fees for: Course book, Top Rated Practice Exams and EC-Council Certification Voucher
Total tuition & fees: $5200
This certification preparation program is for individuals seeking the CEH certification. This program will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The CEH, is the first part of a 3 part EC-Council Information Security Certification Focus Area which helps you master hacking technologies. You will become a hacker, but an ethical one!
Course content in online with a structured schedule for keeping on-track to complete the course in 12 weeks or less.
Cyber / IT Practice Range – this is real-world, hands on skills building lab, provided with every course. Learn security scanning and hacking tools using Live Range Targets. All students learn NMAP, Metasploit, BurpSuite, Wireshark and dozens more… learn how to hash files use encryption, identify application and network systems vulnerabilities. ABL Cyber Range facilities are open to every student 6 days a week, or access VPN 24/7.
Cyber and IT MENTORING: in-person and virtual meetings for One-on-One Mentoring by a CEH mentor gets you ready to pass your certification and SHINE in job interviews. Your certification and Cyber IT Range skills get ABL Academy student selected over other job applicants.
Call or email ABL Cyber Academy to discuss a flexible training schedule to meet you work or other demands on your time.
CEH Domains:
Introduction to Ethical Hacking, Foot printing and Reconnaissance, Scanning Networks, and Enumeration
Topic A: Information Security Overview
Topic B: Information Security Threats and Attack Vectors
Topic C: Hacking Concepts, Types, and Phases
Topic D: Ethical Hacking Concepts and Scope
Topic E: Information Security Controls
Topic F: Information Security Laws and Standards
Topic G: Foot printing Concepts
Topic H: Foot printing Methodology
Topic I: Foot printing Tools
Topic J: Foot printing Countermeasures
Topic K: Foot printing Penetration Testing
Topic L: Overview of Network Scanning
Topic M: CEH Scanning Methodology
Topic N: Scanning Pen Testing
Topic O: Enumeration Concepts
Topic P: NetBIOS Enumeration
Topic Q: SNMP Enumeration
Topic R: LDAP Enumeration
Topic S: NTP Enumeration
Topic T: SMTP Enumeration
Topic U: Enumeration Countermeasures
Topic V: SMB Enumeration Countermeasures
Topic W: Enumeration Pen Testing
System Hacking, Malware Threats, and Sniffing
Topic A: CEH Hacking Methodology (CHM)
Topic B: CEH System Hacking Steps
Topic C: Hiding Files
Topic D: Covering Tracks
Topic E: Penetration Testing
Topic F: Introduction to Malware
Topic G: Types of Trojans
Topic H: Virus and Worms Concepts
Topic I: Malware Reverse Engineering
Topic J: Malware Detection
Topic K: Countermeasures
Topic L: Anti-Malware Software
Topic M: Penetration Testing
Topic N: Sniffing Concepts
Topic O: MAC Attacks
Topic P: DHCP Attacks
Topic Q: ARP Poisoning
Topic R: Spoofing Attack
Topic S: DNS Poisoning
Topic T: Sniffing Tools
Topic U: Sniffing Detection Techniques
Topic V: Sniffing Pen Testing
Social Engineering, Denial-of-Service, Session Hijacking, and Hacking Webservers
Topic A: Social Engineering Concepts
Topic B: Social Engineering Techniques
Topic C: Impersonation on Social Networking Sites
Topic D: Identity Theft
Topic E: Social Engineering Countermeasures
Topic F: Penetration Testing
Topic G: DoS/DDoS Concepts
Topic H: DoS/DDoS Attack Techniques
Topic I: Botnets
Topic J: DDoS Case Study
Topic K: Counter-measures
Topic L: DoS/DDoS Protection Tools
Topic M: DoS/DDoS Attack Penetration Testing
Topic N: Session Hijacking Concepts
Topic O: Application Level Session Hijacking
Topic P: Network-level Session Hijacking
Topic Q: Session Hijacking Tools
Topic R: Session Hijacking Pen Testing
Topic S: Webserver Concepts
Topic T: Webserver Attacks
Topic U: Attack Methodology
Topic V: Webserver Attack Tools
Topic W: Patch Management
Topic X: Webserver Security Tools
Topic Y: Webserver Pen Testing
Hacking Web Applications, SQL Injection, Hacking Wireless Networks, and Hacking Mobile Platforms
Topic A: Web App Concepts/Threats
Topic B: Web App Hacking Methodology
Topic C: Web Application Hacking Tools
Topic D: Security Tools
Topic E: Web App Pen Testing
Topic F: SQL Injection Concepts
Topic G: Types of SQL Injection
Topic H: SQL Injection Methodology
Topic I: SQL Injection Tools
Topic J: Evasion Techniques
Topic K: Counter-measures
Topic L: Wireless Concepts
Topic M: Wireless Encryption
Topic N: Wireless Threats
Topic O: Wireless Hacking Methodology
Topic P: Wireless Hacking Tools
Topic Q: Bluetooth Hacking
Topic R: Counter-measures
Topic S: Wireless Security Tools
Topic T: Wi-Fi Pen Testing
Evading IDS, Firewalls, and Honeypots, Cloud Computing, and Cryptography
Topic A: Mobile Platform Attack Vectors
Topic B: Hacking Android OS
Topic C: Hacking iOS
Topic D: Hacking Windows Phone OS
Topic E: Hacking BlackBerry
Topic F: Mobile Device Management (MDM)
Topic G: Mobile Security Guidelines and Tools
Topic H: Mobile Pen Testing
Topic I: IDS, Firewall and Honeypot Concepts/System
Topic J: Evading IDS
Topic K: Evading Firewall
Topic L: IDS/Firewall Evading Tools
Topic M: Detecting Honeypots
Topic N: Penetration Testing
Topic O: Cloud Computing Threats/Attacks
Topic P: Cloud Security
Topic Q: Cloud Security Tools
Topic R: Cloud Penetration Testing
Topic S: Cryptography Concepts
Topic T: Encryption Algorithms
Topic U: Cryptography Tools
Topic V: Public Key Infrastructure(PKI)
Topic W: Email Encryption
Topic X: Disk Encryption
Topic Y: Cryptography Attacks
Topic Z: Cryptanalysis Tools
Recommendations and Prerequisites
EC-Council Organization
Certification Recommendations/Prerequisites
To be eligible for the CEH certification, you must attend an official training class (from an EC-Council Authorized Training Provider) OR have at least two years of Internet Security related experience.
Students who complete an Advanced Business Learning EC-Council program are automatically eligible to sit for the certification exam due to their Authorized Training Provider status.
EC-Council Organization
Certification Exam Requirements
To be certified, students must pass the certification exam in the allotted period to complete the 125-question exam.
ABL Cyber Range and Academy
an Arizona Licensed School
ABL Cyber Academy - All Rights Reserved ©