CEH (v10)- Certified Ethical Hacker

This Certified Ethical Hacker-Version 10 (earlier CEHv9) course will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes, and reverse engineering, so you can better protect corporate infrastructure from data breaches. This ethical hacking course will help you master advanced network packet analysis and advanced system penetration testing techniques to build your network security skill-set and beat hackers at their own game.

15,000.00 12,000.00Add to cart

  • Course Overview
  • program highlights
  • Pre Requisites
  • Projects
  • Tools Covered
  • Career Centre
  • Syllabus
  • FAQ
 

 Program Highlights 

 

Why Choose Certified Ethical Hacker Program?

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Program Highlights 

 

Why Choose Certified Ethical Hacker Program?

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Pre Requisites 

 

Learners taking the DevOps online training course must be from a technical background with an understanding of Linux fundamentals, Web Development fundamentals, and Java fundamentals.

 

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 Tools Covered 

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Syllabus 

Week 1

Module 01- Introduction to Ethical HackingPreview
Lesson 01 - Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 06 - Penetration Testing Concepts
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 07 - Information Security Laws and Standards

Module 02- Footprinting and ReconnaissancePreview
Lesson 01 - Footprinting Concepts
Lesson 02 - Footprinting through Search Engines
Lesson 03 - Footprinting through Web Services
Lesson 04 - Footprinting through Social Networking Sites
Lesson 05 - Website Footprinting
Lesson 06- Email Footprinting
Lesson 07- Competitive Intelligence
Lesson 08- Whois Footprinting
Lesson 09- DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11- Footprinting through Social Engineering
Lesson 12- Footprinting Tools
Lesson 13- Countermeasures
Lesson 14- Footprinting Pen Testing

Week 2

Module 03- Scanning NetworksPreview
Lesson 01 - Network Scanning Concepts
Lesson 02 - Scanning Tools
Lesson 03- Scanning Techniques
Lesson 04- Scanning Beyond IDS and Firewall
Lesson 05- Banner Grabbing
Lesson 06- Draw Network Diagrams
Lesson 07- Scanning Pen Testing

Module 04- Enumeration
Lesson 01 - Enumeration Concepts
Lesson 02 - NetBIOS Enumeration
Lesson 03 - SNMP Enumeration
Lesson 04 - LDAP Enumeration
Lesson 05 - NTP Enumeration
Lesson 06 - SMTP Enumeration and DNS Enumeration
Lesson 08 - Enumeration Countermeasures
Lesson 07 - Other Enumeration Techniques
Lesson 09 - Enumeration Pen Testing
Module 05- Vulnerability Analysis

Week 3

Module 05- Vulnerability Analysis
Lesson 01- Vulnerability Assessment Concepts
Lesson 02- Vulnerability Assessment Solutions
Lesson 03- Vulnerability Scoring Systems
Lesson 04- Vulnerability Assessment Tools
Lesson 05- Vulnerability Assessment Reports


Module 06- System Hacking
Lesson 01- System Hacking Concepts
Lesson 02- Cracking Passwords
Lesson 03- Escalating Privileges
Lesson 04- Executing Applications
Lesson 05- Hiding Files
Lesson 06- Covering Tracks
Lesson 07- Penetration Testing

Week 4

Module 07- Malware Threats
Lesson 01- Malware Concepts
Lesson 02- Trojan Concepts
Lesson 03- Virus and Worm Concepts
Lesson 04- Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware Software
Lesson 07- Malware Penetration Testing


Module 08- Sniffing
Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing

Week 5

Module 09- Social Engineering
Lesson 01 - Social Engineering Concepts
Lesson 02 - Social Engineering Techniques
Lesson 04 - Impersonation on Social Networking Sites
Lesson 05 - Identity Theft
Lesson 06 - Countermeasures
Lesson 07 - Social Engineering Penetration Testing
Lesson 03- Insider Threats


Module 10- Denial-of-Service
Lesson 01 - DoS/DDoS Concepts
Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets
Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools
Lesson 06 - Countermeasures
Lesson 07 - DoS/DDoS Protection Tools
Lesson 08 - DoS/DDoS Attack Penetration Testing

Week 6

Module 11- Session Hijacking
Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing


Module 12 - Evading IDS, Firewalls, and Honeypots
Lesson 01- IDS, Firewall and Honeypot Concepts
Lesson 02- IDS, Firewall and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots
Lesson 07- IDS/Firewall Evasion Countermeasures
Lesson 08- Penetration Testing

Week 7

Module 13- Hacking Web Servers
Lesson 01- Web Server Concepts
Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing


Module 14- Hacking Web Applications
Lesson 01 - Web App Concepts
Lesson 02 - Web App Threats
Lesson 03 - Hacking Methodology
Lesson 04 - Web Application Hacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Web App Security Testing Tools
Lesson 07 - Web App Pen Testing

Week 8

Module 15- SQL Injection
Lesson 01 - SQL Injection Concepts
Lesson 02 - Types of SQL Injection
Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools
Lesson 05 - Evasion Techniques
Lesson 06 - Countermeasures


Module 16- Hacking Wireless Networks
Lesson 01 - Wireless Concepts
Lesson 02 - Wireless Encryption
Lesson 03 - Wireless Threats
Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools
Lesson 06 - Bluetooth Hacking
Lesson 07 - Countermeasures
Lesson 08 - Wireless Security Tools
Lesson 09 - Wi-Fi Pen Testing

Week 9

Module 17- Hacking Mobile Platforms
Lesson 01- Mobile Platform Attack Vectors
Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools
Lesson 07- Mobile Pen Testing


Module 18- IoT Hacking
Lesson 01- IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing

Week 10

Module 19- Cloud Computing
Lesson 01 - Cloud Computing Concepts
Lesson 02 - Cloud Computing Threats
Lesson 03 - Cloud Computing Attacks
Lesson 04 - Cloud Security
Lesson 05 - Cloud Security Tools
Lesson 06 - Cloud Penetration Testing


Module 20- Cryptography
Lesson 01- Cryptography Concepts
Lesson 02- Encryption Algorithms
Lesson 03- Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)
Lesson 05- Email Encryption
Lesson 06- Disk Encryption
Lesson 07- Cryptanalysis
Lesson 08- Countermeasures

 

 

 FAQ 

Where and when do the classes takes place?

All the courses are instructor-led and take place online. The online interface lets you and the faculty have a two-way interaction. It’s as good as sitting in a physical classroom.

All classes take place over the weekends in the mornings. There’ll be one class of 2 to 2.5 hours on Saturdays and Sundays each. This means that you can now acquire in-demand skills without compromising on your schedule.

Can i watch recording of the trail sections before enrolling?

Yes, the recordings of the trial classes are uploaded.

What is the benefit of taking online instructor-led courses?

In physical classrooms, students generally feel hesitant to ask questions. If you miss any class or didn’t understand some concepts, you can’t go through the class again. However, in online courses, it’s possible to do that. We share the recordings of all our classes after each class with the student. Also, there’s no hassle of long distance commuting and disrupting your schedule.

what kind of projects will i be working on?

We believe that unless you implement the concepts studied in the classes, you are unable to join the dots and hence can’t see the entire picture. Our capstone projects let you apply the learned concepts to real-world data sets. You’ll be working on real-time data-sets (which can run in 100s of MBs or possibly in GBs!) which you get to choose from a variety of domains such as retail, finance, social media, healthcare, etc. These datasets have been curated from top sources such as World Bank, US Health Department, Carnegie Mellon, Stanford and many more.

Where & how will i practice?

You’ll get access to our virtual computing lab through the login credentials provided to you. The virtual machines will enable you to work on “Big Data” sets for your projects and practice hands-on too.

Do i get a certificate of completion or certification?

We provide certification of completion to students who attend at least 70% of the classes. After the course ends, we conduct a certification exam that evaluates them on the skills they have learnt. Certification from Hatigen is provided to only those who clear the exam. The exam is purely case-based and not even a single theory question is asked.

Do you provide career assistance?

We provide career workshops and industry immersion sessions to help you become ready for roles you are aspiring for. We also help you in resume review and interview preparation. If you diligently follow our advice, you should start getting interview calls as soon as you finish the course.

1
Hello
How can we Help You
Powered by