Certified Ethical Hacker (CEH)

Book online today or call us at +49 7031 2024742 if you need help choosing the right course or want to discuss corporate discounts.

On-Site/Virtual

Prices from

€ 3.990

+UmSt

Duration:

5 days

Level:

Fortgeschrittene

Code:

CEH

CPEs:

58

What is included: Exam included, online exam voucher

Book Now

Overview

In this classroom course on Certified Ethical Hacker C|EH® you will learn to uncover vulnerabilities in systems and databases, and you will get to know tools and techniques used by cybercriminals to protect yourself against a variety of attack vectors.

The C|EH® v12 training program includes 20 modules that cover various technologies, tactics, and procedures, providing aspiring Ethical Hackers with the core knowledge they need to be successful in the field of cybersecurity. The 12th version of C|EH® is delivered in a carefully structured training plan that is constantly updated to keep pace with the latest operating systems, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and practical application in our Cyber Range. Each tactic discussed in the training is supported by step-by-step exercises in a virtualized environment with live targets, live tools, and vulnerable systems. Thanks to our lab technology, every participant can learn and apply their knowledge in a comprehensive hands-on exercise.

Requirements

To take the EC-Council C|EH® certification exam, the candidate has two options:

  1. Attend the official Network Security Training by EC-Council. If a candidate has completed an official EC-Council training either in an accredited training center, through the iClass platform, or at a recognized academic institution, the candidate is eligible to take the corresponding EC-Council exam.

  2. Entry to the exam without official EC-Council training is also possible, but subject to conditions. Without having attended an official C|EH® training, the candidate must have verifiable at least 2 years of professional experience in the field of information security. If the candidate has the required work experience, they can submit an application form along with US$100, a non-refundable fee.

Target audience

  1. Analysts such as:

    • Risk Analyst

    • Cybersecurity Analyst

    • Vulnerability Assessment Analyst

    • Cyber Defense Analyst

    • SOC Security Analyst

    • Information Security Analyst

  2. Mid-Level Information Security Auditor

  3. Cybersecurity Auditors and Consultants

  4. IT Security Administrators, Security Officers, and Security Analysts

  5. Network Security Engineers and Technicians

  6. Information Security Managers

  7. Solution Architects

Training plan

20 modules to help you master the fundamentals of Ethical Hacking and prepare for the C|EH® certification exam

Module 1 - Introduction to Ethical Hacking

  • Teaching the basics of the key topics in the world of information security, including the fundamentals of Ethical Hacking, information security controls, relevant laws, and standard procedures.

Module 2 - Footprinting

  • Learn how to perform footprinting and reconnaissance with the latest techniques and tools, a critical phase before an attack in the ethical hacking process.

Module 3 - Scanning Networks

  • Learn various network scanning techniques and countermeasures.

Module 4 - Enumeration

  • Learn about different enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and the associated countermeasures.

Module 5 - Vulnerability Analysis

  • Learn how to identify security vulnerabilities in the network, communication infrastructure, and endpoints of an organization. Various types of vulnerability assessments and tools for vulnerability assessment.

Module 6 - System Hacking

  • Learn about different system hacking methods, including steganography, steganalysis attacks, and cover-up techniques used to uncover system and network vulnerabilities.

Module 7 - Malware Threats

  • Learn about different types of malware (Trojans, viruses, worms, etc.), APTs, and fileless malware, malware analysis procedures, and countermeasures for malware.

Module 8 - Sniffing

  • Learn about packet sniffing techniques and how to use them to discover vulnerabilities in the network, as well as countermeasures to defend against sniffing attacks.

Module 9 - Social Engineering

  • Learn about social engineering concepts and techniques and how to recognize theft attempts, assess vulnerabilities on a human level, and propose countermeasures.

Module 10 - Denial of Service

  • Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques as well as the tools used to assess a target and develop DoS and DDoS countermeasures and protections.

Module 11 - Session Hijacking

  • Understanding the different session hijacking techniques that uncover session management, authentication, authorization, and cryptographic vulnerabilities at the network level, as well as the associated countermeasures.

Module 12 - Evading IDS, Firewalls, and Honeypots

  • You will receive an introduction to techniques for bypassing firewalls, Intrusion Detection Systems (IDS), and honeypots, as well as tools used to assess a network for vulnerabilities and countermeasures.

Module 13 - Hacking Web Servers

  • Learn about attacks on web servers, including a comprehensive attack methodology for testing vulnerabilities in web server infrastructures and countermeasures.

Module 14 - Hacking Web Applications

  • Learn about attacks on web applications, including a comprehensive methodology for hacking web applications to assess vulnerabilities in web applications and countermeasures.

Module 15 - SQL Injection

  • Learn about SQL injection attacks, bypass techniques, and SQL injection countermeasures.

Module 16 - Hacking Wireless Networks

  • Understand different types of wireless technologies, including encryption, threats, hacking methods, hacking tools, WiFi security tools, and countermeasures.

Module 17 - Hacking Mobile Platforms

  • Learn about attack vectors for mobile platforms, Android and iOS hacking, mobile device management, mobile security policies, and security tools.

Module 18 - IoT and OT Hacking

  • Learn about different types of IoT and OT attacks, hacking methods, hacking tools, and countermeasures.

Module 19 - Cloud Computing

  • Learn about different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methods, as well as cloud security techniques and tools.

Module 20 - Cryptography

  • Learning about cryptography, authentication, authorization, and cryptographic vulnerabilities, as well as the associated countermeasures.

Certification

C|EH®- EC Council Certified Ethical Hacker

  • Duration: 4 hours

  • Number of Questions: 125

  • Format: Multiple Choice

  • Language(s): Training German/ Course Material & Exam English

Your advantages

  • You learn in small groups (max. 10 participants / course)

  • In-house modern training room and testing center in a distraction-free, quiet atmosphere (PSI/ Pearson Vue/ EC Council/ Kryterion)

  • Practically experienced, always trained trainers guide you through the course

  • You will receive comprehensive training materials, manuals, and case studies for self-study

  • Interactive discussions and group work help you in application

  • A light breakfast, lunch, snacks, and drinks are provided throughout the day

  • Hotel recommendations near the training and testing center

  • Taking the exam at the Schönbrunn TASC testing center is possible afterwards**

Institute

E-Council accredited training center with modern facilities and dedicated trainers for cybersecurity training.
E-Council accredited training center with modern facilities and dedicated trainers for cybersecurity training.

Appointments

22.-26.07.2024

On-Site

Leonberg

5 days

Guarantee date

€ 3.990

Book Now

Similar courses

CompTIA PenTest+ Certification Training

PENTESTPLUS

On-Site/Virtual

Leonberg

2 Tage

€ 3.290

Beginner

Learn more

Certified Penetration Testing (CPENT)

CPENT

On-Site/Virtual

Leonberg

2 Tage

€ 4.290

Expert

Learn more

© 2024 Schönbrunn TASC GmbH
Schönbrunn TASC GmbH
Riedwiesenstraße 1, 71229 Leonberg
© 2024 Schönbrunn TASC GmbH
Schönbrunn TASC GmbH
Riedwiesenstraße 1, 71229 Leonberg
© 2024 Schönbrunn TASC GmbH
Schönbrunn TASC GmbH
Riedwiesenstraße 1, 71229 Leonberg
call to action