Certified Ethical Hacker (CEH) v11

View cart
Certified Ethical Hacker (CEH) v11


Certified Ethical Hacker (CEH) Preparation Training - EC-Council

Credential to be awarded: Certificate of Completion

Total Hours: 40                        

ALL Included: All Fees for: Course book, Top Rated Practice Exams and EC-Council Certification Voucher 

Total tuition & fees: $5200

Course Description

This certification preparation program is for individuals seeking the CEH certification. This program will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The CEH, is the first part of a 3 part EC-Council Information Security Certification Focus Area which helps you master hacking technologies. You will become a hacker, but an ethical one!

SCHEDULE: Personalized, Flexible IT / Cyber Training - Courses Begin Weekly

Course content in online with a structured schedule for keeping on-track to complete the course in 12 weeks or less.
Cyber / IT  Practice Range - this is real-world, hands on skills building lab, provided with every course. Learn security scanning and hacking tools using Live Range Targets. All students learn NMAP, Metasploit, BurpSuite, Wireshark and dozens more... learn how to hash files use encryption, identify application and network systems vulnerabilities. 
ABL Cyber Range facilities are open to every student 6 days a week, or access VPN 24/7.

Cyber and IT MENTORING: in-person and virtual meetings for One-on-One Mentoring by a CEH mentor gets you ready to pass your certification and SHINE in job interviews. Your certification and Cyber IT Range skills get ABL Academy student selected over other job applicants. 

Call or email ABL Cyber Academy to discuss a flexible training schedule to meet you work or other demands on your time. 

CEH Domains:  
Introduction to Ethical Hacking, Foot printing and Reconnaissance, Scanning Networks, and Enumeration

  • Topic A: Information Security Overview
  • Topic B: Information Security Threats and Attack Vectors
  • Topic C: Hacking Concepts, Types, and Phases
  • Topic D: Ethical Hacking Concepts and Scope
  • Topic E: Information Security Controls
  • Topic F: Information Security Laws and Standards
  • Topic G: Foot printing Concepts
  • Topic H: Foot printing Methodology
  • Topic I: Foot printing Tools
  • Topic J: Foot printing Countermeasures
  • Topic K: Foot printing Penetration Testing
  • Topic L: Overview of Network Scanning
  • Topic M: CEH Scanning Methodology
  • Topic N: Scanning Pen Testing
  • Topic O: Enumeration Concepts
  • Topic P: NetBIOS Enumeration
  • Topic Q: SNMP Enumeration
  • Topic R: LDAP Enumeration
  • Topic S: NTP Enumeration
  • Topic T: SMTP Enumeration
  • Topic U: Enumeration Countermeasures
  • Topic V: SMB Enumeration Countermeasures
  • Topic W: Enumeration Pen Testing

System Hacking, Malware Threats, and Sniffing 

  • Topic A: CEH Hacking Methodology (CHM)
  • Topic B: CEH System Hacking Steps
  • Topic C: Hiding Files
  • Topic D: Covering Tracks
  • Topic E: Penetration Testing
  • Topic F: Introduction to Malware
  • Topic G: Types of Trojans
  • Topic H: Virus and Worms Concepts
  • Topic I: Malware Reverse Engineering
  • Topic J: Malware Detection
  • Topic K: Countermeasures
  • Topic L: Anti-Malware Software
  • Topic M: Penetration Testing
  • Topic N: Sniffing Concepts
  • Topic O: MAC Attacks
  • Topic P: DHCP Attacks
  • Topic Q: ARP Poisoning
  • Topic R: Spoofing Attack
  • Topic S: DNS Poisoning
  • Topic T: Sniffing Tools
  • Topic U: Sniffing Detection Techniques
  • Topic V: Sniffing Pen Testing

Social Engineering, Denial-of-Service, Session Hijacking, and Hacking Webservers 

  • Topic A: Social Engineering Concepts
  • Topic B: Social Engineering Techniques
  • Topic C: Impersonation on Social Networking Sites
  • Topic D: Identity Theft
  • Topic E: Social Engineering Countermeasures
  • Topic F: Penetration Testing
  • Topic G: DoS/DDoS Concepts
  • Topic H: DoS/DDoS Attack Techniques
  • Topic I: Botnets
  • Topic J: DDoS Case Study
  • Topic K: Counter-measures
  • Topic L: DoS/DDoS Protection Tools
  • Topic M: DoS/DDoS Attack Penetration Testing
  • Topic N: Session Hijacking Concepts
  • Topic O: Application Level Session Hijacking
  • Topic P: Network-level Session Hijacking
  • Topic Q: Session Hijacking Tools
  • Topic R: Session Hijacking Pen Testing
  • Topic S: Webserver Concepts
  • Topic T: Webserver Attacks
  • Topic U: Attack Methodology
  • Topic V: Webserver Attack Tools
  • Topic W: Patch Management
  • Topic X: Webserver Security Tools
  • Topic Y: Webserver Pen Testing

 Hacking Web Applications, SQL Injection, Hacking Wireless Networks, and Hacking Mobile Platforms 

  • Topic A: Web App Concepts/Threats
  • Topic B: Web App Hacking Methodology
  • Topic C: Web Application Hacking Tools
  • Topic D: Security Tools
  • Topic E: Web App Pen Testing
  • Topic F: SQL Injection Concepts
  • Topic G: Types of SQL Injection
  • Topic H: SQL Injection Methodology
  • Topic I: SQL Injection Tools
  • Topic J: Evasion Techniques
  • Topic K: Counter-measures
  • Topic L: Wireless Concepts
  • Topic M: Wireless Encryption
  • Topic N: Wireless Threats
  • Topic O: Wireless Hacking Methodology
  • Topic P: Wireless Hacking Tools
  • Topic Q: Bluetooth Hacking
  • Topic R: Counter-measures
  • Topic S: Wireless Security Tools
  • Topic T: Wi-Fi Pen Testing

Evading IDS, Firewalls, and Honeypots, Cloud Computing, and Cryptography 

  • Topic A: Mobile Platform Attack Vectors
  • Topic B: Hacking Android OS
  • Topic C: Hacking iOS
  • Topic D: Hacking Windows Phone OS
  • Topic E: Hacking BlackBerry
  • Topic F: Mobile Device Management (MDM)
  • Topic G: Mobile Security Guidelines and Tools
  • Topic H: Mobile Pen Testing
  • Topic I: IDS, Firewall and Honeypot Concepts/System
  • Topic J: Evading IDS
  • Topic K: Evading Firewall
  • Topic L: IDS/Firewall Evading Tools
  • Topic M: Detecting Honeypots
  • Topic N: Penetration Testing
  • Topic O: Cloud Computing Threats/Attacks
  • Topic P: Cloud Security
  • Topic Q: Cloud Security Tools
  • Topic R: Cloud Penetration Testing
  • Topic S: Cryptography Concepts
  • Topic T: Encryption Algorithms
  • Topic U: Cryptography Tools
  • Topic V: Public Key Infrastructure(PKI)
  • Topic W: Email Encryption
  • Topic X: Disk Encryption
  • Topic Y: Cryptography Attacks
  • Topic Z: Cryptanalysis Tools


Recommendations and Prerequisites

EC-Council Organization
Certification Recommendations/

To be eligible for the CEH certification, you must attend an official training class (from an EC-Council Authorized Training Provider) OR have at least two years of Internet Security related experience.

Students who complete an Advanced Business Learning EC-Council program are automatically eligible to sit for the certification exam due to their Authorized Training Provider status.


EC-Council Organization Certification Exam Requirements

To be certified, students must pass the certification exam in the allotted period to complete the 125-question exam.

Course Features

  • Lectures 0
  • Quizzes 0
  • Duration 12 weeks
  • Skill level Advanced Level
  • Language English
  • Students 10
  • Assessments Self
Curriculum is empty
View cart