Certified Ethical Hacker (CEH) Training

Nivå: Intermediate
Snittbetyg: 4,7/5 4,66/5 Based on 280 Reviews

In this award-winning Certified Ethical Hacker (CEH) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

Nyckelfunktioner:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course instructor coaching benefit
  • After-course computing sandbox included

Du kommer lära dig att:

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Välj den utbildningsform som passar dig bäst

BLANDAT LÄRANDE

On Demand & Live Granskningssession

  • On-demand CEH training modules (1-year access)
  • 2 hours of one-on-one after-course instructor coaching
  • Pre-configured EC-Council iLabs (6-month access)
  • Exam voucher included

LIVE, LÄRARLEDD

I klass & Live, Online-utbildning

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition fee can be paid later by invoice -OR- at the time of checkout by credit card

PREMIUM UTBILDNING

Obegränsad tillgång till allt

Unlimited annual access to:

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox included
  • Self-paced lecture videos
  • Pre-configured EC-Council iLabs
  • Exam Voucher included
  • CyberQ Exam Prep
  • Test Pass Guarantee

FÖRETAGSINTERN UTBILDNING

Teamträning

  • Använd denna eller någon annan utbildning i ditt företag
  • Fullskalig programutveckling
  • Levereras när, var och hur du vill
  • Blandade utbildningsmodeller
  • Skräddarsytt innehåll
  • Coaching av ett expertteam

Anpassa kurs och innehåll efter teamets behov

Kontakta oss

Utveckla dig och ditt team med anpassade eller öppna kurser alternativt e-learning

Learning Tree erbjuder kundanpassad utbildning hos er, öppna kurser i Stockholm, London eller Washington, möjlighet att delta via våra Anywhere centers (Malmö, Göteborg, Linköping, Stockholm eller Borlänge) eller olika former av e-learning med lärarstöd. Läs mer på www.learningtree.se/priser .

On Demand & Live Granskningssession

Certified Ethical Hacker On-Demand utbildningsinformation

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

    • Reinforce your skills while practising the CEH exam objectives with CYBRScore Lab Bundles: {course:E002}
  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • Exam voucher is supplied by EC-Council
  • Certification Information

Utbildningsplan Certified Ethical Hacker On-Demand

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

I klass & Live, Online-utbildning

Note: This course runs for 5 dagar

  • 30 mar - 3 apr 9:00 - 4:30 CEST Stockholm Stockholm Boka Din Kursplats

  • 7 - 11 sep 9:00 - 4:30 CEST Stockholm Stockholm Boka Din Kursplats

  • 9 - 13 dec 9:00 - 4:30 GMT London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

  • 9 - 13 mar 9:00 - 4:30 GMT London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

  • 15 - 19 jun 9:00 - 4:30 BST London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

  • 16 - 20 dec 9:00 - 4:30 EST Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 13 - 17 jan 9:00 - 4:30 EST Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Boka Din Kursplats

  • 3 - 7 feb 9:00 - 4:30 EST Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Boka Din Kursplats

  • 20 - 24 apr 9:00 - 4:30 EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

  • 4 - 8 maj 9:00 - 4:30 EDT New York / Online (AnyWare) New York / Online (AnyWare) Boka Din Kursplats

  • 13 - 17 jul 9:00 - 4:30 EDT Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Boka Din Kursplats

  • 10 - 14 aug 9:00 - 4:30 EDT Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Boka Din Kursplats

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Important Certified Ethical Hacker kursinformation

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

    • Reinforce your skills while practising the CEH exam objectives with CYBRScore Lab Bundles: {course:E002}
  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • You can request your voucher from Learning Tree at any time after you complete the course
  • Certification Information

Certified Ethical Hacker Utbildningsplan

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

Obegränsad tillgång till allt

Note: This course runs for 5 dagar

  • 30 mar - 3 apr 9:00 - 4:30 CEST Stockholm Stockholm

  • 7 - 11 sep 9:00 - 4:30 CEST Stockholm Stockholm

  • 9 - 13 dec 9:00 - 4:30 GMT London / Online (AnyWare) London / Online (AnyWare)

  • 9 - 13 mar 9:00 - 4:30 GMT London / Online (AnyWare) London / Online (AnyWare)

  • 15 - 19 jun 9:00 - 4:30 BST London / Online (AnyWare) London / Online (AnyWare)

  • 16 - 20 dec 9:00 - 4:30 EST Online (AnyWare) Online (AnyWare)

  • 13 - 17 jan 9:00 - 4:30 EST Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare)

  • 3 - 7 feb 9:00 - 4:30 EST Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare)

  • 20 - 24 apr 9:00 - 4:30 EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare)

  • 4 - 8 maj 9:00 - 4:30 EDT New York / Online (AnyWare) New York / Online (AnyWare)

  • 13 - 17 jul 9:00 - 4:30 EDT Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare)

  • 10 - 14 aug 9:00 - 4:30 EDT Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare)

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Certified Ethical Hacker Obegränsad åtkomst kursinformation

This product offers the most complete CEH training availble on the market today. With unlimited annual access to all ILT course events (2031), EC Council official videos, exam prep, and labs, and your trusted Learning Tree coach, you have everything you need to have a sucessful learning experience and pass the CEH certification exam.

Utbildningsplan On-Demand

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

Premium Utbildning FAQs

  • What background do I need?

    Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.
  • Is the on-demand content the same as the 5-day instructor class?

    Yes, and it's EC-Council official content!
  • What on-demand content will I receive?

    An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.
  • How many labs will I receive?

    You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.
  • What is CyberQ Exam Prep?

    CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.
  • What is the "test pass guarantee"?

    You will receive one retake exam voucher at no additional cost in the event that you don't pass the exam on the first try.
  • How will I access my course materials if I choose this method?

    Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.

Teamträning

Questions about which training is right for you?

call 08-506 668 00




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition fee!
  • No advance payment required for most products.
  • Tuition fee can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Stockholm
Stockholm
London / Online (AnyWare)
London / Online (AnyWare)
London / Online (AnyWare)
Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Hur föredrar du att bli kontaktad:

Please Choose a Language

Canada - English

Canada - Français