Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Certified Ethical Hacker (CEH)

Price
2,199 USD
5 Days
EC-SVC-CEH
Self-Paced Training
EC-Council ATC

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

View Global Schedule

Course Description

Overview

The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases,?various attack vectors,?and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps?students learn to protect their organizations and strengthen?their?security controls?in order to?minimize the risk of a malicious attack.

CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker.

Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits,?and technologies.

CEH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines.

Ethical Hacking Labs

With over 200 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems on the market. Our range is web accessible, allowing you to study and practice from anywhere with a connection.

iLearn course includes:
  • Instructor-led, streaming video training modules – 1 year access
  • Official EC-Council e-courseware – 1 year access
  • iLabs, virtual lab platform – 6 months access
  • Certification Exam Voucher
  • Certificate of Attendance


Once course is activated, no refund. No refunds for mobile security tool kit. No refunds on courseware once it has been opened.
 

Objectives

The C|EH® v12 is a specialized and one-of-a-kind training program to teach you everything you need to know about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and global hacking competition. Stay on top of the game with the most in-demand skills required to succeed in the field of cybersecurity.
 

Audience

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems. Job Roles:
  • Cyber Security Forensic Analyst
  • Cyber Security Analyst
  • CND Security Specialist
  • CND Fusion Analyst
  • Cyberspace Network Defense (CND) Technician
  • Cyber Red Team Operator
  • Cyber Network Defense (CND) Analyst
  • Cyber Security Forensic Analyst
  • Computer Network Defense Intrusion Analyst
  • Cyber Security Engineer
  • Information Security Engineer
  • CND Cyber Analyst
  • Network Security Engineer
  • Cyber Threat Analyst
  • SOC Security Analyst
  • Information Security Analyst
  • IT Security Compliance Specialist
  • Global Security Assurance Analyst
  • Security Analyst Tier 3
  • Security Operations Analyst
  • Security Incident Response Analyst
  • Penetration Tester
  • Vulnerability Analyst
  • Sr. Security Threat Analyst
  • Tier 3 NSOC Analyst
  • Security Information Assurance Analyst
  • Technical Security Analyst
  • Information Security Manager
  • Risk and Remediation Manager
  • Systems Administrator
  • Cybersecurity Network Analyst
  • Cyber Security Vulnerability Analyst
  • Risk Assessment- Security Consultant
  • Information Security Associate – Insider Threat Analyst
  • Security Architect, Manager
  • Application Security Analyst
  • Cyber Security System Engineer
  • Software Security Analyst
  • Network Analyst
  • Information System Security Officer
  • SOC Security Analyst
  • Cyber Security Engineer II
  • Senior Cyber Security Monitoring Analyst
  • Cyber Security Incident Response, Incident Analyst
  • Cyber Security Incident Response Engineer
  • L2 Security Analyst
  • Senior Information Assurance/ Security Specialist
  • Technical Operations Network Engineer
  • IT Security Administrator

Prerequisites


     

Topics

The C|EH® v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application through our cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.” 20 Modules That Help You Master the Foundations of Ethical Hacking and Prepare to Take the C|EH Certification Exam
  • Introduction to Ethical Hacking Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
  • Foot Printing and Reconnaissance Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
  • Scanning Networks Learn different network scanning techniques and countermeasures.
  • Enumeration Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.
  • Vulnerability Analysis Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools.
  • System Hacking Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities.
  • Malware Threats Learn different types of malware (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures.
  • Sniffing Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
  • Social Engineering Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
  • Denial-of-Service Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
  • Session Hijacking Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
  • Evading IDS, Firewalls, and Honeypots Get introduced to firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
  • Hacking Web Servers Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
  • SQL Injection Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures.
  • Hacking Wireless Networks Understand different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi sedcurity tools, and countermeasures.
  • Hacking Mobile Platforms Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
  • IoT Hacking Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
  • Cloud Computing Learn different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.
  • Cryptography Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
     
  • 2023 Top 20 Training Industry Company - IT Training

    Need Help?

    Call us at 877-206-0106 or e-mail us at info@learnquest.com

    Personalized Solutions

    Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

    Contact Us

    Need Help?

    Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

    Talk to us

    20% Off All AI Training Courses

    Achieve more with AI-powered tools and strategies.

    PROMO CODE: AI20
    VALID THROUGH APRIL 30, 2024

    20% Off All AI Training Courses

    Self-Paced Training Info

    Learn at your own pace with anytime, anywhere training

    • Same in-demand topics as instructor-led public and private classes.
    • Standalone learning or supplemental reinforcement.
    • e-Learning content varies by course and technology.
    • View the Self-Paced version of this outline and what is included in the SPVC course.
    • Learn more about e-Learning

    Course Added To Shopping Cart

    bla

    bla

    bla

    bla

    bla

    bla

    Self-Paced Training Terms & Conditions

    EC Council iLearn courses are available for 1 year. You will have 1 year access to the instructor-led, streaming video training modules and the Official EC-Council e-courseware. You will have 6 months access to the iLabs and virtual lab platform. There are no refunds on self-paced courses once an order is submitted.

    EC Council iLearn courses are available for 1 year. You will have 1 year access to the instructor-led, streaming video training modules and the Official EC-Council e-courseware. You will have 6 months access to the iLabs and virtual lab platform.

    This is a Self-Paced virtual class; it is intended for students who do not need the support of a classroom instructor. If you feel you would better benefit from having access to a Subject Matter Expert, please enroll in the Instructor-Led version instead. Minimal technical support is provided to address issues with accessing the platform or problems within the lab environment.

    ONCE YOU ARE ENROLLED IN THIS COURSE, YOU WILL NOT BE ABLE TO CANCEL YOUR ENROLLMENT. You are billed for the course when you submit the enrollment form. Self-Paced Virtual Classes are non-refundable. Once you purchase a Self-Paced Virtual Class, you will be charged the full price.

    After you receive confirmation that you are enrolled, you will be sent further instructions to access your course material and remote labs. A confirmation email will contain your online link, your ID and password, and additional instructions for starting the course.

    Your 1 year access begins once you receive your confirmation from EC Council.

    ??group-training-form-area??
    ??how-can-we-help-you-area??
    ??personalized-form-area??
    ??request-quote-area??

    Sorry, there are no classes that meet your criteria.

    Please contact us to schedule a class.
    Close

    self-paced
    STOP! Before You Leave

    Save 0% on this course!

    Take advantage of our online-only offer & save 0% on any course !

    Promo Code skip0 will be applied to your registration

    Close
    Nothing yet
    here's the message from the cart

    To view the cart, you can click "View Cart" on the right side of the heading on each page
    Add to cart clicker.

    Purchase Information

    ??elearning-coursenumber?? ??coursename??
    View Cart

    Need more Information?

    Speak with our training specialists to continue your learning journey.

     

    Delivery Formats

    Close

    By submitting this form, I agree to LearnQuest's Terms and Conditions

    heres the new schedule
    This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
    Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.