We offer Certified Ethical Hacker (CEH) by EC-Council along with our CPH & CISC certifications. This course will significantly benefit all those who are interested to know more about how hackers break into networks, build the capability of testing your own infrastructure, and enhancing your vulnerability assessment and penetration testing capabilities.

EC-Council_logo

Certification

The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification

Exam Details

  1. Exam Title: Certified Ethical Hacker (ANSI accredited)
  2. Exam Code: 312-50 (IBT), 312-50 (VUE) or EC0-350 (APTC)
  3. Number of Questions: 125
  4. Duration: 4 hours
  5. Availability: Prometric Prime/ Prometric APTC/ VUE
  6. Test Format: Multiple Choice
  7. Passing Score: 70%

Key Features of CEHv8

  1. Updated Content: CEHv8 contains updated information including concepts, methodologies, and tools.
  2. It’s not what you know. It’s what you can do. Lab manuals in CEHv8 provide step-by-step walk-throughs of highly technical concepts and are designed to enforce the classroom learning
  3. A result oriented, descriptive, and analytical lab manual – the labs showcased in the courseware are tested against the latest Operating Systems (including all patches and hot fixes applied)
  4. Access to CEHv8 course at ASPEN, 24×7 from any geographical location with Internet access
  5. CEHv8 includes more realistic hack websites to practice the learning and labs that are presented as a part of large case studies
  6. Well organized DVD-ROM content – a repository of approximately 24GBs of the latest hacking and security tools
  7. Focus on the attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
  8. CEHv8 courseware is enriched with stunning graphics and animations to demonstrate various hacking concepts and techniques
  9. Concepts are presented in an easy-to-understand manner with diagrammatic representation of various hacking concepts for a better understanding and learning experience
  10. CEHv8 is optimized for multi-platform delivery including pads, smartphones, and touch screens

Course Contents

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffing
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hacking Webservers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Networks
  16. Hacking Mobile Platforms
  17. Evading IDS, Firewalls and Honeypots
  18. Buffer Overflows
  19. Cryptography
  20. Penetration Testing

 

The following two tabs change content below.