• Home
  • Course Catalog
  • Contact Us
Loading... Loading... Please wait...
Request info
Contact Us
First Name*
Last Name*
Email
Phone
Questions/Comments
Lead Status
Lead Source*
External Referrer
Partner SMEC ID
Enter text from the pic*

Certified Ethical Hacker v.9 (Voucher Included) (CA-CEHv9-V)

$2,895.00

Course Description

This course provides learners with an introduction to ethical hacking. learners will also learn about footprinting and reconnaissance, scanning networks, enumeration, system hacking, trojans and backdoors, viruses and worms, sniffing, social engineering, denial of service, session hijacking, hacking webservers, hacking web applications, SQL injection, hacking wireless networks, hacking mobile platforms, evading IDS, firewalls, and honeypots, buffer overflow, cryptography, and penetration testing.

Outline

Focus on New Attack Vectors
Emphasis on Cloud Computing Technology
CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
Covers wide-ranging countermeasures to combat cloud computing attacks
Provides a detailed pen testing methodology for cloud systems to identify threats in advance
Emphasis on Mobile Platforms and Tablet Computers
CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
Coverage of latest development in mobile and web technologies
New Vulnerabilities Are Addressed
Heartbleed CVE-2014-0160
Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
Detailed coverage and labs in Module 18: Cryptography.
Shellshock CVE-2014-6271
Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
Detailed coverage and labs in Module 11: Hacking Webservers
Poodle CVE-2014-3566
POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
Case study in Module 18: Cryptography
Hacking Using Mobile Phones
CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
Courseware covers latest mobile hacking tools in all the modules
Coverage of latest Trojan, Virus, Backdoors
Courseware covers Information Security Controls and Information
Security Laws and Standards
Labs on Hacking Mobile Platforms and Cloud Computing
More than 40 percent new labs are added from Version 8
More than 1500 new/updated tools
CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)

Duration

6 months

Hours

80

Audience

The intended audience for this program are individuals who are interested in learning about or pursuing a career in Certified Ethical Hacker v.9

Certification

The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
About the Exam:
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Language

English

Instructor

Our solution offers interactive learning support on selected IT Certification programs across the Internet which sustains students using self-paced learning materials. This is achieved through online access to tutors, interactive chat sessions with other students, bulletin boards and continuous assessment and feedback. Train around the clock, around the world. Our certified online instructors are located at global support centers in the U.S., U.K., Australia, and Singapore to provide real-time answers to technology- and soft-skill-related questions 24x7. This means access to a live subject matter expert no matter where you are - day or night. This level of student/instructor interaction provides real-time training specific support and extends training beyond content and instructor-led solutions by providing flexibility to accommodate individual needs and schedules

Requirements

This program does not require any additional purchases of supplementary materials.

Find Similar Courses by Category