Certified Ethical Hacker (CEH)

  • Category
    EcCouncil
  • Course Duration
    40 Hours
  • Course Profile
    Click Here
Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)
Register Now

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks

Course Overview

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Course Outlines

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Course Objectives

After CEH the we will be able to:

  • Setting and ruling minimum standards for credentials for professional information security professionals on ethical hacking measures.
  • Inform the public that accredited individuals meet or exceed minimum standards.
  • Promote ethical piracy as a unique profession and self-regulation.
  • Data encryption and vulnerability analysis
  • Hacked web applications
  • Learn about piracy IoT

Course Prerequisites

There are no prerequisites to take the CEH course.

Course Schedule

 

CourseDateDaysLocation
CEH31-Dec-235Cairo, Egypt + live virtual online
CEH31-Mar-245Cairo, Egypt + live virtual online
CEH07-Jul-245Cairo, Egypt + live virtual online
CEH29-Oct-245Cairo, Egypt + live virtual online

Course Delivery Format

  1. In-Person Training:

Benefits:

Personal Interaction: Participants can interact with the instructor and fellow learners, fostering a sense of community.

Immediate Feedback: Instructors can provide real-time feedback, addressing questions and concerns on the spot.

Hands-on Activities: Practical exercises and group activities can be conducted more effectively in person.


  1. Online Training:

Benefits:

Flexibility: Learners can access the course content at their own pace and time, accommodating diverse schedules.

Cost-Effective: Eliminates the need for travel and accommodation expenses, making it more economical.

Scalability: Can accommodate a large number of participants simultaneously, making it suitable for widespread audiences.


  1. Blended Learning (Combination of In-Person and Online):

Benefits:

Flexibility: Combines the advantages of both in-person and online formats, offering a balance between structure and autonomy.

Cost-Efficiency: Reduces the need for extensive in-person sessions, saving on travel and venue costs.

Adaptability: Can cater to diverse learning styles by incorporating various modes of instruction.


  1. Virtual Classrooms:

Benefits:

Real-Time Interaction: Allows for live Q&A sessions, discussions, and engagement with participants.

Accessibility: Participants from different locations can join without the need for physical presence.

Recording Options: Recordings can be made available for participants who may have missed the live session.


  1. Self-Paced Learning (eLearning Modules, Videos):

Benefits:

Individualized Learning: Participants can progress at their speed, revisiting content as needed.

Consistency: Ensures uniform delivery of content to all participants.

24/7 Accessibility: Learners can access materials whenever and wherever is convenient for them.


  1. Customized Courses:

Relevant Content: Tailored to specific organizational goals.

Industry Focus: Incorporates real industry challenges.

Adapted Learning: Matches varied skill levels of participants.

Focused Skills: Targets key competencies for job success.

Cultural Sensitivity: Respects diverse backgrounds within the organization.

Engaging Content: Uses relatable examples and scenarios.

Flexible Delivery: Adaptable to different learning formats.

Measurable Success: Sets clear objectives for easy evaluation.

Continuous Improvement: Uses feedback for ongoing enhancements.

Cost-Effective: Efficiently directs resources for maximum impact.