EC-Council Certified Ethical Hacker (CEH) v13

Training for Your Group

Training for Individuals

$3495

Upcoming Dates

                                   12-16-24  – 12-20-24                                                                   Five Day Bootcamp                                                                   Monday – Friday                                                                       9AM –  4PM 

 

 

Course Overview

If you’re concerned about the integrity of your network’s infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you’ll also learn how intruders operate and the steps to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

Course Length: 5 Days

Audience: Security officers, auditors, security professionals, site administrators, and individuals concerned about the integrity of network infrastructure.

Prerequisites: At least two years of IT security experience. A strong working knowledge of TCP/IP. Security+ Prep Course is highly recommended.

What You're Going To Learn

  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing

Register for an Upcoming Date

Date Location Price Register

Course Outline

Lesson 1: Introduction to Ethical Hacking
Information Security Overview

  • Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
  • Essential Terminology
  • Elements of Information Security
  • The Security, Functionality, and Usability Triangle

Information Security Threats and Attack Vectors

  • Motives, Goals, and Objectives of Information Security Attacks
  • Top Information Security Attack Vectors
  • Information Security Threat Categories
  • Types of Attacks on a System
  • Information Warfare

Hacking Concepts

  • What is Hacking?
  • Who is a Hacker?
  • Hacker Classes
  • Hacking Phases
    • Reconnaissance
    • Scanning
    • Gaining Access
    • Maintaining Access
    • Clearing Tracks

What to Expect at LeapFox

Knowledgeable Instructors

Our instructors are certified professionals. They are trained on the latest features and how to get the most out of software programs.

Hands-on Labs

No boring lectures! Our courses are designed to give students lots of time to practice what they are learning with hands-on exercises and projects.

Certificate of Completion

Receive a certificate of completion at the end of every course.

Up-to-date Curriculum

Each course comes with a helpful and up-to-date ebook which will contain instruction and practice exercises.

Time Saving Tips N Tricks

In each course, your instructor will show you tips and tricks that will save you time and make you more efficient.

Friendly and Helpful Staff

Our staff is dedicated to your success. Each team member is trained to provide the absolute best customer service possible.

Satisfaction Guarantee

If you aren't 100% satisfied with your experience at LeapFox, simply let us know, and we will make it right.

Look who Else is Using LeapFox

See What Our Customers Say