EC-Council Certified Ethical Hacker v11 (CEHv11)

Catalog Home Cybersecurity, Hacking & IT Auditing EC-Council
18.215.62.41
Your Training Location:  

EC-Council Certified Ethical Hacker v11 (CEHv11)

  Add Course To Watch List
  View Full Course Outline
  Request A Public Course
         In Your Area

  Request A Quote For A
        Private Class

Delivery Options & Status:
Building to GUARANTEED-TO-RUN
Instructor Led
Loading Course Dates...
Failed
No available dates in this city.

  Available by Request
{{date.date_begin | date:'M/d'}} - {{date.date_end | date:'M/d/yyyy'}}
   Free{{date.date_price}}
 
ViewHide Additional Dates

In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student - the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

5 Days/Lecture & Lab

This course is designed for:

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat / Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography




< >

Copyright © 2020 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media