Class Details

Course Includes:

Enroll in this Course with Federal Training Dollars - Learn More!

  • Expert instruction from experienced CEH
  • iLabs for the duration of the course, plus 6 months additional access
  • Courseware books, notepads, pens, highlighters and other materials
  • Course retake option
  • Exam Voucher
  • A second voucher included with full purchase 
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

The Certified Ethical Hacker (CEH) certification training course by EC-Council is offered both online and in-person. Over a 5-day period, students will cover all of the CEH exam objectives, take multiple practice exams and engage in hands-on labs as preparation for the certification exam administered on the last day of class.

CEH is featured on our Top Security Infographic below, click the link to see the average salaries these credentials demand:

View the Top 5 Security Certifications Infographic

Course Outline

Module 1: Introduction to Ethical Hacking 

  • Information security overview
  • Skills of an ethical hacker
  • HAcking concepts and phases 
  • Types of attacks
  • Information security threats, attack vectors, and controls 
  • Information Assurance (IA)
  • Information Security LAws and Standards
  • Security Policies: types, HR/legal implicantions 
  • Physical security 
  • Threat modeling 
  • Enterprise Information Security Architecture (EISA) 
  • network Security Zoning 

Module 2: Footprinting and Reconnaissance 

  • Footprinting concepts, threats, attack vectors, and controls 
  • Footprinting through Search Engines
  • Footprinting through Social Networking sites 
  • Website footprinting 
  • Competitive Intelligence 
  • WHOIS Footprinting 
  • Footprinting tools 

Module 3: Scanning Networks

  • Scanning methodology, techniques and counter-measures
  • Techniques for IDS evasion, scanning, HTTP tunneling, and IP spoofing 
  • Drawing network diagrams - latest network discovery and mapping tools, network discovery tools for mobile
  • Proxy chaining - latest proxy tools, proxy tools for mobile

Module 4: Enumeration 

  • Protocols: NetBios, SNMP, LDAP, NTP, SMTP, DNS
  • Countermeasures 
  • Techniwues 

Module 5: System Hacking

  • Cracking passwords, escalating provoleges, executing applications, hiding files and covering tracks
  • Steganography - application and classification, tools, methods/attacks on steganography, steganography detection tools

Module 6: Malware Threats

  • Introduction to malware
  • Trojans--attacks, how to infect a system, crypters, how to deploy, latest types, analysis, countermeasures
  • Viruses--stages, types, latest virus maker, analysis, countermeasures
  • Worms--types, makers, analysis, countermeasures
  • Malware analysis
  • Antivirus tools
  • Penetration testing

Module 7: Sniffing

  • Attacks: MAC, DHCP, and spoofing
  • Poisoning: ARP and DNS
  • Tools
  • Concepts, techniques, impersonation, identity theft, and countermeasures
  • Phases of an attack
  • Common targets of an attack
  • Impersonation scenario
  • Computer based, mobile based, social networking based

Module 8: Social Engineering

  • Concepts, techniques, impersonation, identity theft, and countermeasures
  • Phases of an attack
  • Common targets of an attack
  • Impersonation scenario
  • Computer based, mobile based, social networking based

Module 9: Denial of Service

  • Concepts, case study, tools, attack techniques, and countermeasures
  • Botnet
  • Scanning methods for vulnerable machines
  • Detection Techniques and tools

Module 10: Session Hijacking

  • Concepts, case study, tools, attack techniques, and countermeasures
  • Five stages of a web malware attack
  • Application level session hijacking
  • Network level session hijacking
  • TCP/IP Hijacking

Module 11: Hacking Webservers

  • Webserver market shares
  • Web servers
  • Web server security issues
  • Webserver attacks, attack methodology, attack tools, and countermeasures
  • Patch management
  • Webserver security tools
  • Webserver pen testing

Module 12: Hacking Web Applications

  • Web application threats
  • Concepts, hacking methodology, tools, and countermeasures
  • Analyze web applications
  • Web application pen testing

Module 13: SQL Injection

  • Concepts methodologies, types of SQL injection
  • Evasion techniques and tools
  • Information gathering

Module 14: Hacking Wireless Networks

  • Concepts, encryption, threats, Bluetooth hacking methodology, and countermeasures
  • Wireless security tools and hacking tools

Module 15: Hacking Mobile Platforms

  • Android OS, IOS,Windows Phone OS, Blackberry
  • Mobile device management, security guidelines and tools
  • OWASP Mobile Top 10 Risks
  • Latest Sniffers
  • Latest Jailbreaking tools
  • Mobile spyware
  • Bring Your Own Device (BYOD)
  • Mobile Anti-spyware

Module 16: Evading IDS, Firewalls, and Honeypots

  • Concepts and countermeasures
  • Honeypots, firewalls, IDS for mobile
  • Evading IDS, firewalls
  • Detecting honeypots

Module 17: Cloud Computing

  • Concepts, methodologies, examples, detection, and countermeasures
  • Separation of responsibilities
  • Virtualization
  • Threats and attacks
  • Cloud security control layers
  • Tools
  • Cloud penetration testing

Module 18: Cryptography

  • Concepts, encryption algorithms, email encryption, disk encryption, and attacks
  • Public key infrastructure (PKI)
  • Cryptanalysis and cryptography tools
  • Hash calculators for Mobile

 

Class Exam

EC Council CEH Test Voucher

$500.00

Details:

  • 125 Questions
  • Passing Score: 70%
  • Test Duration: 4 hours
  • Test Format: Multiple choice
  • Test Delivery: Prometric or Pearson VUE

The exam code varies when taken at different testing centers.

  • Exam 312-50-ANSI: Web based ‘Prometric Prime’ at Accredited Training Centers (ATC).
  • Exam 312-50: Pearson VUE Testing centers
  • Exam 350CEH: Proctored test at Authorized Prometric Testing Centers (APTC) globally.

Objectives:

Exam 312-50 tests CEH candidates on each of the 18 domains covered in-depth through the training course, including:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Malware Threats
  7. Sniffing
  8. Social Engineering
  9. Denial of Service
  10. Session Hijacking
  11. Hacking Webservers
  12. Hacking Web Applications
  13. SQL Injection
  14. Hacking Wireless Networks
  15. Hacking Mobile Platforms
  16. Evading IDS, Firewalls, and Honeypots
  17. Cloud Computing
  18. Cryptography

Phoenix TS is an authorized testing center for both Pearson VUE and Prometric. 

Percent Breakdown of Exam Objectives 

  • Background - 4%
  • Analysis/Assessment - 13% 
  • Security - 25%
  • Tools/Systems/Programs - 32%
  • Procedures/Methodology - 20%
  • Regulation/Policy - 4%
  • Ethics - 2%

Register for Class

Date Location
06/06/16 - 06/10/16, 5 days, 8:30AM – 4:30PM Gaithersburg, MD Register
06/06/16 - 06/10/16, 5 days, 8:30AM – 4:30PM Columbia, MD Register
06/06/16 - 07/11/16, 10 days, 6:00PM – 10:00PM Columbia, MD Register
06/06/16 - 06/10/16, 5 days, 8:30AM – 4:30PM Columbia, MD Register
06/13/16 - 06/17/16, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
06/27/16 - 07/01/16, 5 days, 8:30AM – 4:30PM Columbia, MD FULL
07/25/16 - 07/29/16, 5 days, 8:30AM – 4:30PM Gaithersburg, MD Register
08/02/16 - 09/01/16, 10 days, 6:00PM – 10:00PM Columbia, MD Register
09/12/16 - 09/16/16, 5 days, 8:30AM – 4:30PM Gaithersburg, MD Register
10/03/16 - 10/07/16, 5 days, 8:30AM – 4:30PM Columbia, MD Register
10/31/16 - 11/04/16, 5 days, 8:30AM – 4:30PM Gaithersburg, MD Register
11/14/16 - 11/18/16, 5 days, 8:30AM – 4:30PM Columbia, MD Register