Certified Ethical Hacker (CEH)
Book online today or call us at +49 7031 2024742 if you need help choosing the right course or want to discuss corporate discounts.
On-Site/Virtual
Prices from
€ 3.990
+UmSt
Duration:
5 days
Level:
Fortgeschrittene
Code:
CEH
CPEs:
58
What is included: Exam included, online exam voucher
Book Now
Overview
In this classroom course on Certified Ethical Hacker C|EH® you will learn to uncover vulnerabilities in systems and databases, and you will get to know tools and techniques used by cybercriminals to protect yourself against a variety of attack vectors.
The C|EH® v12 training program includes 20 modules that cover various technologies, tactics, and procedures, providing aspiring Ethical Hackers with the core knowledge they need to be successful in the field of cybersecurity. The 12th version of C|EH® is delivered in a carefully structured training plan that is constantly updated to keep pace with the latest operating systems, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and practical application in our Cyber Range. Each tactic discussed in the training is supported by step-by-step exercises in a virtualized environment with live targets, live tools, and vulnerable systems. Thanks to our lab technology, every participant can learn and apply their knowledge in a comprehensive hands-on exercise.
Requirements
To take the EC-Council C|EH® certification exam, the candidate has two options:
Attend the official Network Security Training by EC-Council. If a candidate has completed an official EC-Council training either in an accredited training center, through the iClass platform, or at a recognized academic institution, the candidate is eligible to take the corresponding EC-Council exam.
Entry to the exam without official EC-Council training is also possible, but subject to conditions. Without having attended an official C|EH® training, the candidate must have verifiable at least 2 years of professional experience in the field of information security. If the candidate has the required work experience, they can submit an application form along with US$100, a non-refundable fee.
Target audience
Analysts such as:
Risk Analyst
Cybersecurity Analyst
Vulnerability Assessment Analyst
Cyber Defense Analyst
SOC Security Analyst
Information Security Analyst
Mid-Level Information Security Auditor
Cybersecurity Auditors and Consultants
IT Security Administrators, Security Officers, and Security Analysts
Network Security Engineers and Technicians
Information Security Managers
Solution Architects
Training plan
20 modules to help you master the fundamentals of Ethical Hacking and prepare for the C|EH® certification exam
Module 1 - Introduction to Ethical Hacking
Teaching the basics of the key topics in the world of information security, including the fundamentals of Ethical Hacking, information security controls, relevant laws, and standard procedures.
Module 2 - Footprinting
Learn how to perform footprinting and reconnaissance with the latest techniques and tools, a critical phase before an attack in the ethical hacking process.
Module 3 - Scanning Networks
Learn various network scanning techniques and countermeasures.
Module 4 - Enumeration
Learn about different enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and the associated countermeasures.
Module 5 - Vulnerability Analysis
Learn how to identify security vulnerabilities in the network, communication infrastructure, and endpoints of an organization. Various types of vulnerability assessments and tools for vulnerability assessment.
Module 6 - System Hacking
Learn about different system hacking methods, including steganography, steganalysis attacks, and cover-up techniques used to uncover system and network vulnerabilities.
Module 7 - Malware Threats
Learn about different types of malware (Trojans, viruses, worms, etc.), APTs, and fileless malware, malware analysis procedures, and countermeasures for malware.
Module 8 - Sniffing
Learn about packet sniffing techniques and how to use them to discover vulnerabilities in the network, as well as countermeasures to defend against sniffing attacks.
Module 9 - Social Engineering
Learn about social engineering concepts and techniques and how to recognize theft attempts, assess vulnerabilities on a human level, and propose countermeasures.
Module 10 - Denial of Service
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques as well as the tools used to assess a target and develop DoS and DDoS countermeasures and protections.
Module 11 - Session Hijacking
Understanding the different session hijacking techniques that uncover session management, authentication, authorization, and cryptographic vulnerabilities at the network level, as well as the associated countermeasures.
Module 12 - Evading IDS, Firewalls, and Honeypots
You will receive an introduction to techniques for bypassing firewalls, Intrusion Detection Systems (IDS), and honeypots, as well as tools used to assess a network for vulnerabilities and countermeasures.
Module 13 - Hacking Web Servers
Learn about attacks on web servers, including a comprehensive attack methodology for testing vulnerabilities in web server infrastructures and countermeasures.
Module 14 - Hacking Web Applications
Learn about attacks on web applications, including a comprehensive methodology for hacking web applications to assess vulnerabilities in web applications and countermeasures.
Module 15 - SQL Injection
Learn about SQL injection attacks, bypass techniques, and SQL injection countermeasures.
Module 16 - Hacking Wireless Networks
Understand different types of wireless technologies, including encryption, threats, hacking methods, hacking tools, WiFi security tools, and countermeasures.
Module 17 - Hacking Mobile Platforms
Learn about attack vectors for mobile platforms, Android and iOS hacking, mobile device management, mobile security policies, and security tools.
Module 18 - IoT and OT Hacking
Learn about different types of IoT and OT attacks, hacking methods, hacking tools, and countermeasures.
Module 19 - Cloud Computing
Learn about different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methods, as well as cloud security techniques and tools.
Module 20 - Cryptography
Learning about cryptography, authentication, authorization, and cryptographic vulnerabilities, as well as the associated countermeasures.
Certification
C|EH®- EC Council Certified Ethical Hacker
Duration: 4 hours
Number of Questions: 125
Format: Multiple Choice
Language(s): Training German/ Course Material & Exam English
Your advantages
You learn in small groups (max. 10 participants / course)
In-house modern training room and testing center in a distraction-free, quiet atmosphere (PSI/ Pearson Vue/ EC Council/ Kryterion)
Practically experienced, always trained trainers guide you through the course
You will receive comprehensive training materials, manuals, and case studies for self-study
Interactive discussions and group work help you in application
A light breakfast, lunch, snacks, and drinks are provided throughout the day
Hotel recommendations near the training and testing center
Taking the exam at the Schönbrunn TASC testing center is possible afterwards**