Certified Ethical Hacker (CEH) Training

Course Description

ALPI offers a hands-on approach to the most desired information security training program in the industry.

Why choose ALPI for CEH training?

  • We use live, seasoned instructors in both our in-person and virtual classes so you can ask questions and get answers right away.
  • We focus on real-world examples.
  • We teach using interactive, hands-on exercises.
  • Our course includes a complete hard-copy set (3 books) of accredited course materials.
  • Your will receive a Certificate of Achievement for attending the class.
  • Registration includes 6 months access to iLabs, with over 140 different exercises!
  • And only ALPI offers our free refresher guarantee so you can re-take a course within 4 months at no additional charge. Contact us for information about this unique benefit that gives you peace of mind.

ALPI's accredited CEH course gives you the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

Why CEH? A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Upon successful completion of the course, you will receive a Certificate of Achievement.

This course includes the certification exam in order to attain the CEH Certification. See prerequisites, below.


Duration

5 day(s)

Time

9 - 5 PM

Price

$3,664

Labs

When you take this course from ALPI, you receive 6 months of access to iLabs for over 140 different exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflow
  • Cryptography

  • Intended Audience

    ALPI's Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, testing professionals, QA professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


    Prerequisites

    Information Security experience is suggested but contact us if you have questions.


    Outline

    ALPI CEH Course Outline: Certified Ethical Hacker (CEH) Version 9

    01  Introduction to Ethical Hacking

    • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
    • Information Security Overview
    • Information Security Threats and Attack Vectors
    • Hacking Concepts, Types, and Phases
    • Ethical Hacking Concepts and Scope
    • Information Security Controls
    • Information Security Laws and Standards

    02  Footprinting and Reconnaissance

    • Footprinting Concepts
    • Footprinting Methodology
    • Footprinting Tools
    • Footprinting Countermeasures
    • Footprinting Penetration Testing

    03  Scanning Networks

    • Overview of Network Scanning
    • CEH Scanning Methodology

    04  Enumeration

    • Enumeration Concepts
    • NetBIOS Enumeration
    • SNMP Enumeration
    • LDAP Enumeration
    • NTP Enumeration
    • SMTP Enumeration
    • Enumeration Countermeasures
    • SMB Enumeration Countermeasures
    • Enumeration Pen Testing

    05  System Hacking

    • Information at Hand Before System Hacking Stage
    • System Hacking: Goals
    • CEH Hacking Methodology (CHM)
    • CEH System Hacking Steps
    • Hiding Files
    • Covering Tracks
    • Penetration Testing

    06  Malware Threats

    • Introduction to Malware
    • Trojan Concepts
    • Types of Trojans
    • Virus and Worms Concepts
    • Malware Reverse Engineering
    • Malware Detection
    • Countermeasures
    • Anti-Malware Software
    • Penetration Testing

    07  Sniffing

    • Sniffing Concepts
    • MAC Attacks
    • DHCP Attacks
    • ARP   Poisoning
    • Spoofing Attack
    • DNS Poisoning
    • Sniffing Tools
    • Sniffing Tool: Wireshark
    • Follow TCP Stream in Wireshark
    • Display Filters in Wireshark
    • Additional Wireshark Filters
    • Sniffing Tool
    • Packet Sniffing Tool: Capsa Network Analyzer
    • Network Packet Analyzer
    • Counter measures
    • Sniffing Detection Techniques
    • Sniffing Pen Testing

    08  Social Engineering

    • Social Engineering Concepts
    • Social Engineering Techniques
    • Impersonation on Social Networking Sites
    • Identity Theft
    • Social Engineering Countermeasures
    • Penetration Testing

    09  Denial-of-Service    

    • DoS/DDoS Concepts
    • DoS/DDoS Attack Techniques
    • Botnets
    • DDoS Case Study
    • DoS/DDoS Attack Tools
    • Counter-measures
    • DoS/DDoS Protection Tools
    • DoS/DDoS Attack Penetration Testing

    10  Session Hijacking

    • Session Hijacking Concepts
    • Application Level Session Hijacking
    • Network-level Session Hijacking
    • Session Hijacking Tools
    • Counter-measures
    • Session Hijacking Pen Testing

    11  Hacking Webservers

    • Webserver Concepts
    • Webserver Attacks
    • Attack Methodology
    • Webserver Attack Tools
    • Counter-measures
    • Patch Management
    • Webserver  Security Tools
    • Webserver  Pen Testing

    12  Hacking Web Applications

    • Web App Concepts
    • Web App Threats
    • Web App Hacking Methodology
    • Web Application Hacking Tools
    • Countermeasures
    • Security Tools
    • Web App Pen Testing

    13  SQL Injection

    • SQL Injection Concepts
    • Types of SQL Injection
    • SQL Injection Methodology
    • SQL Injection Tools
    • Evasion Techniques
    • Counter-measures

    14 Hacking Wireless Networks

    • Wireless Concepts
    • Wireless Encryption
    • Wireless Threats
    • Wireless Hacking Methodology
    • Wireless Hacking Tools
    • Bluetooth Hacking
    • Counter-measures
    • Wireless Security Tools
    • Wi-Fi Pen Testing

    15 Hacking Mobile Platforms

    • Mobile Platform Attack Vectors
    • Hacking Android OS
    • Hacking iOS
    • Hacking Windows Phone OS
    • Hacking BlackBerry
    • Mobile Device Management (MDM)
    • Mobile Security Guidelines and Tools
    • Mobile Pen Testing

    16  Evading IDS, Firewalls, and Honeypots

    • IDS, Firewall and Honeypot Concepts
    • IDS, Firewall and Honeypot System
    • Evading IDS
    • Evading Firewalls
    • IDS/Firewall Evading Tools
    • Detecting Honeypots
    • IDS/Firewall Evasion Counter-measures
    • Penetration Testing

    17  Cloud Computing

    • Introduction to Cloud Computing
    • Cloud Computing Threats
    • Cloud Computing Attacks
    • Cloud Security
    • Cloud Security Tools
    • Cloud Penetration Testing

    18  Cryptography

    • Market Survey 2014: The Year of Encryption
    • Case Study: Heartbleed
    • Case Study: Poodlebleed
    • Cryptography Concepts
    • Encryption Algorithms
    • Cryptography Tools
    • Public Key Infrastructure(PKI)
    • Email Encryption
    • Disk Encryption
    • Cryptography Attacks
    • Cryptanalysis Tools