Next batch starts in

  • DAYS

  • HOURS

  • MINUTES

  • SECONDS

Classes

Recommended Flexible Hours

Start Date

Hiring Partners

Program Overview

  •   Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  •   Inform the public that credentialed individuals meet or exceed the minimum standards.
  •   Reinforce ethical hacking as a unique and self-regulating profession.
  •   Certification Voucher
  •   Access to 140 iLabs - Simulation labs

This Course includes

  •    0 videos
  •    2 documents
  •    20 live sessions
  •    Access on all devices
  •    Certificate of completion

Course Content

You can participate in our Free Discussion forum through query tab below.

Live Sessions

Click on the tilte to expand Live Session details.

  1. Information Security Overview
  2. Information Security Threats and Attack Vectors
  3. Penetration Testing Concepts
  4. Hacking Concepts
  5. Ethical Hacking Concepts
  6. Information Security Controls
  7. Information Security Laws and Standards

  1. Footprinting Concepts
  2. Footprinting through Search Engines
  3. Footprinting through Web Services
  4. Footprinting through Social Networking Sites
  5. Website Footprinting
  6. Email Footprinting
  7. Competitive Intelligence
  8. Whois Footprinting
  9. DNS Footprinting
  10. Network Footprinting
  11. Footprinting through Social Engineering
  12. Footprinting Tools
  13. Countermeasures
  14. Footprinting Pen Testing

  1. Network Scanning Concepts
  2. Scanning Tools
  3. Scanning Techniques
  4. Scanning Beyond IDS and Firewall
  5. Banner Grabbing
  6. Draw Network Diagrams
  7. Scanning Pen Testing

  1.  Enumeration Concepts
  2.  NetBIOS Enumeration
  3.  SNMP Enumeration
  4.  LDAP Enumeration
  5.  NTP Enumeration
  6.  SMTP Enumeration and DNS Enumeration
  7.  Enumeration Countermeasures
  8.  Other Enumeration Techniques
  9.  Enumeration Pen Testing

  1.  Vulnerability Assessment Concepts
  2.  Vulnerability Assessment Solutions
  3.  Vulnerability Scoring Systems
  4.  Vulnerability Assessment Tools
  5.  Vulnerability Assessment Reports

  1.  System Hacking Concepts
  2.  Cracking Passwords
  3.  Escalating Privileges
  4.  Executing Applications
  5.  Hiding Files
  6.  Covering Tracks
  7.  Penetration Testing

  1.  Malware Concepts
  2.  Trojan Concepts
  3.  Virus and Worm Concepts
  4.  Malware Analysis
  5.  Countermeasures
  6.  Anti-Malware Software
  7.  Malware Penetration Testing

  1.  Sniffing Concepts
  2.  Sniffing Technique: MAC Attacks
  3.  Sniffing Technique: DHCP Attacks
  4.  Sniffing Technique: ARP Poisoning
  5.  Sniffing Technique: Spoofing Attacks
  6.  Sniffing Technique: DNS Poisoning
  7.  Sniffing Tools
  8.  Countermeasures
  9.  Sniffing Detection Techniques
  10.  Sniffing Pen Testing

  1.  Social Engineering Concepts
  2.  Social Engineering Techniques
  3.  Insider Threats
  4.  Impersonation on Social Networking Sites
  5.  Identity Theft
  6.  Countermeasures
  7.  Social Engineering Penetration Testing

 1.  DoS/DDoS Concepts

 2.  DoS/DDoS Attack Techniques

 3.  Botnets

 4.  DDoS Case Study

 5.  DoS/DDoS Attack Tools

 6.  Countermeasures

 7.  DoS/DDoS Protection Tools

 8.  DoS/DDoS Attack Penetration Testing

 1.  Session Hijacking Concepts

 2.  Application Level Session Hijacking

 3.  Network Level Session Hijacking

 4.  Session Hijacking Tools

 5.  Countermeasures

 6.  Penetration Testing

 1.  IDS, Firewall and Honeypot Concepts

 2.  IDS, Firewall and Honeypot Solutions

 3.  Evading IDS

 4.  Evading Firewalls

 5.  IDS/Firewall Evading Tools

 6.  Detecting Honeypots

 7.  IDS/Firewall Evasion Countermeasures

 8.  Penetration Testing

 1.  Web Server Concepts

 2.  Web Server Attacks

 3.  Web Server Attack Methodology

 4.  Web Server Attack Tools

 5.  Countermeasures

 6.  Patch Management

 7.  Web Server Security Tools

 8.  Web Server Pen Testing

 1.  Web App Concepts

 2.  Web App Threats

 3.  Hacking Methodology

 4.  Web Application Hacking Tools

 5.  Countermeasures

 6.  Web App Security Testing Tools

 7.  Web App Pen Testing

 1.  SQL Injection Concepts

 2.  Types of SQL Injection

 3.  SQL Injection Methodology

 4.  SQL Injection Tools

 5.  Evasion Techniques

 6.  Countermeasures

 1.  Wireless Concepts

 2.  Wireless Encryption

 3.  Wireless Threats

 4.  Wireless Hacking Methodology

 5.  Wireless Hacking Tools

 6.  Bluetooth Hacking

 7.  Countermeasures

 8.  Wireless Security Tools

 9.  Wi-Fi Pen Testing

 1.  Mobile Platform Attack Vectors

 2.  Hacking Android OS

 3.  Hacking iOS

 4.  Mobile Spyware

 5.  Mobile Device Management

 6.  Mobile Security Guidelines and Tools

 7.  Mobile Pen Testing

 1.  IoT Concepts

 2.  IoT Attacks

 3.  IoT Hacking Methodology

 4.  IoT Hacking Tools

 5.  Countermeasures

 6.  IoT Pen Testing

 1.  Cloud Computing Concepts

 2.  Cloud Computing Threats

 3.  Cloud Computing Attacks

 4.  Cloud Security

 5.  Cloud Security Tools

 6.  Cloud Penetration Testing

 1.  Cryptography Concepts

 2.  Encryption Algorithms

 3.  Cryptography Tools

 4.  Public Key Infrastructure (PKI)

 5.  Email Encryption

 6.  Disk Encryption

 7.  Cryptanalysis

 8.  Countermeasures

Uploaded Documents

Click on the download button to get the respective document.

10 Benefits of becoming a CERTIFIED ETHICAL HACKER
Check out this pdf to know all the prime benefits of becoming a certified ethical hacker.

Format: PDF

CEH (v10) - Certified Ethical Hacking BROCHURE
Download this pdf to see the detailed brochure of CEH(v10).

Format: PDF

Videos

Click on the play button to watch video

No Videos Found



No Queries Found. Be the first person to raise a query.

Educators

Shaping characters, careers, caliber and future.

Enrollment and Futuristic Overview

    • Less than 1 year: 3% 
    • 1-4 years: 30% 
    • 5-9 years: 28% 
    • 10-19 years: 31% 
    • 20 years or more: 9%
    • Below are some of the “hottest” job titles for a CEH and their respective salaries:
    • Information security analyst: $70,721 
    • Penetration tester: $80,334 
    • Information security manager: $108,352 
    • Security engineer: $88,062 
    • Cyber security analyst: $74,360 
    • Information security engineer: $91,075
    • The cert type 
    • The certifying organization 
    • Date earned (Month/Year or simply just the Year)

Alumni

I think the success of any school can be measured by the contribution the alumni make to our national life.
- John F. Kennedy

Certificate Recognition

A qualification is like an empty road without a certification.

Certificate

Click on image to zoom

×

Internship and Placement Partners

Program Fee

  • Online Classes

I’m interested in this program

FAQs

Ethical hackers attempt to penetrate a computer system or network with the aim of finding security vulnerabilities that could otherwise remain undetected. However, unlike malicious hackers, ethical hackers are given permission to undertake these controlled attacks. Without these harmless penetration tests, security holes could remain unseen, leaving the organisation in a position that a malicious hacker could exploit. Become an Ethical Hacker and you’ll learn to use the same techniques and tools as a cybercriminal. However, instead of exploiting these vulnerabilities, as an Ethical Hacker you’ll document security holes and provide actionable advice on how they can be fixed.

Ethical hackers earn an average advertised salary of £55,000 according to data from ITJobsWatch.

The CEH is a brilliant introduction into the world of Ethical Hacking. You’ll finish your certification with an in demand set of skills covering Intrusion Detection, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Plus, if you need to break into the field of ethical hacking or penetration testing, the CEH will put you ahead of other uncertified job applicants (assuming you similar experience). It’s a benchmark certification for ethical hackers - “CEH is the original standard,” says Albert Whale, president and chief security officer at IT Security, Inc.

The CEH is the most well-known certification in Ethical Hacking, but it’s not an absolute requirement. At their most basic, certifications are simply a supplement to real-world experience - without this you will only get so far. This certification will help you break into the Ethical Hacking profession, but you’re not guaranteed a career. You’ll get great skills and a renowned certification, but you’ll still need experience to back it all up.

This cert sits in the sweet spot between entry level qualifications like CompTIA’s Security+ and advanced certs like the CISSP. Before attending a CEH training course you should ideally possess at least two years IT experience, a good knowledge of TCP/IP, Windows Server and a basic familiarity with Linux and/or Unix.

At EC-Council’s accredited training centres you’ll be trained by experienced security professionals. You won’t be taught by a 17-year-old reformed hacker – EC-Council adheres to a strict code of ethics and employs experienced instructors with a clean reputation.

The more we know about how the ‘bad guys’ operate, the more secure our systems, data and networks will be. Whilst the knowledge you’ll gain on a CEH course has the potential to be misused, many would argue this far outweighs the benefits of teaching thousands of IT professionals how to better protect their businesses. To help highlight responsibility, EC-Council requires all of their students to sign an agreement, agreeing to respect the knowledge and not misuse it. You’ll also be required to agree to abide by all legal laws of the land in the use of your new knowledge and skills.

To achieve your CEH v8 certification you’ll need to pass exam 315-50 at a Prometric or Pearson VUE test centre. This exam is a 125 question, multiple choice paper covering the 19 CEH domains. To gain your CEH cert, you’ll need to score at least 70%.

Aspen is a gateway to portals, products and services provided by EC-Council for its registered members. As a member you’ll be able to place orders on products and courseware, view your certification(s) continuing education scheme and maintain your certs with EC-Council.

About EC Council

EC-Council was formed as the result of very disheartening research after the 9/11 attack on the World Trade Center. Founder, Jay Bavisi, after watching the attacks unfold, postured the question, what if a similar attack were to be carried out on the Cyber battlefield? Would the information security community have the tools and resources at their disposal to thwart such an attack? At that time, the answer was no. EC-Council, officially incorporated as the International Council of E-Commerce Consultants was formed to create information security training and certification programs to help the very community our connected economy would rely on to save them from a devastating Cyber Attack. EC-Council rapidly gained the support of top researchers and subject matter experts around the world and launched its first Information Security Program, the Certified Ethical Hacker. With this ever-growing team of subject matter experts and InfoSec researchers, EC-Council continued to build various standards, certifications and training programs in the electronic commerce and information security space.

Reviews

You will be redirected to login page to post a review.

See Reviews

Be the first person to review this course