Certified Ethical Hacker (CEH) Certification Crash Training

Upcoming Instructor Led Online and Public Certified Ethical Hacker (CEH) Certification Crash classes
Instructor-led and self paced combo course
Certified Ethical Hacker (CEH) Certification Crash Training/Class 11 November, 2019 - 12 November, 2019 $970
HSG Training Center 1624 Market Street, Suite 202
Denver, CO 80202
Hartmann Software Group Training Registration

Answers to Popular Questions:

Yes, this class can be tailored to meet your specific training needs.
Yes, we provide Security consulting services.
Yes, group discounts are provided.

Course Description

This live and interactive training is designed to help you prepare for the EC-Council Certified Ethical Hacker (CEH) version 10 certification exam. In this training we will review Key topics and methodologies that you need to master the CEHv10 exam objectives Step by step examples of security penetration testing methodologies and concepts Sample questions for each of the topics covered in the exam.---------------------------- Learn how to craft exploits used by ethical hackers to perform real-world penetration testing engagements. Understand the methods for conducting wired and wireless network assessments, hacking web servers, and web applications. Explore attack techniques against mobile devices, IoT devices, and cloud deployments.------------------------------------ This Live Virtual Training is for: Participants with an understanding of cybersecurity fundamentals. Candidates studying for the Certified Ethical Hacker (CEH) version 10 certification. Anyone interested in cybersecurity and penetration testing (ethical hacking) will benefit from this training. Professionals wanting to learn different methodologies and best practices to perform security penetration testing assessments.-------------------------------------- You will learn: The main topics covered in the CEHv10 exam. Main topics through step-by-step demonstrations.
Course Length: 2 Days
Course Tuition: $970 (US)


Course participants should have a basic understanding of cybersecurity and networking concepts.

Course Outline


Section 1: Introduction to Ethical Hacking and to the CEHv10 exam(30 minutes)

- An introduction to ethical hacking and penetration testing methodologies.

- Reviewing what is new in the CEHv10 exam.


Section 2: Foot-printing, Enumeration, Reconnaissance, and Network Scanning(50 minutes)

- Introducing passive and active reconnaissance.

- Reviewing network scanning and system enumeration.

- Reviewing example questions.


Break 10 minutes


Section 3: Vulnerability Analysis and System Hacking(40 minutes)

- Reviewing vulnerability analysis methodologies and system hacking.

- Reviewing example questions.


Section 4: Social Engineering(40 minutes)

- Introducing social engineering.

- Reviewing social engineering tools and methodologies.

- Reviewing example questions.


Break 10 minutes


Section 5: Denial-of-Service(30 minutes)

- Introducing denial of service (DoS) attacks.

- Reviewing examples of DoS attacks.

- Reviewing example questions.


Section 6: Session Hijacking, Evading IDS, IPS, Firewalls, and Honeypots(30 minutes)

- Introducing session hijacking.

- Reviewing how to evade intrusion detection systems (IDS), intrusion prevention systems (IPS), and honeypots.

- Reviewing example questions.




Section 7: Cryptography(30 minutes)

- Introducing cryptography concepts.

- Reviewing cryptographic vulnerabilities.

- Reviewing example questions.


Section 8: Hacking Wireless Networks(40 minutes)

- Introducing wireless network vulnerabilities.

- Reviewing how to hack wireless networks.

- Reviewing example questions.


Break 10 minutes


Section 9: Hacking Web Servers and Web Applications(60 minutes)

- Reviewing how to hack web servers.

- Reviewing how to hack web applications.

- Review example questions.


Break 10 minutes


Section 10: Hacking Mobile Platforms(30 minutes)

- Introducing mobile security.

- Reviewing mobile hacking methodologies and techniques.

- Reviewing example questions.


Section 11: IoT Hacking(30 minutes)

- Introducing IoT security.

- Reviewing IoT hacking methodologies and techniques.

- Reviewing example questions.


Section 12: Cloud Computing(30 minutes)

- Introducing cloud computing.

- Reviewing cloud security concepts.

- Reviewing example questions

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.