Course Introduction

Organisations are increasingly investing in formation of “Red Teams” comprising of computer security experts. These teams predominantly assess the security of computer systems, using penetration testing techniques. Certified Ethical Hacker (CEH) from EC Council is the most comprehensive security program and globally recognized credential in this domain. Version 10 of the CEH raises the bar, yet again, going beyond penetration testing and covering 20 most advanced security domains and 340 attack technologies along with Cloud Security and IoT Security. CEH has been a hiring standard for Info-Sec Jobs in firms across the globe. It is also ANSI complaint and earns respect and trust for the certification holder.
Ken and Headway‘s 5 day CEH v10 is an intensive workshop mode training delivered by an EC Council Certified Instructor. Our participants have access to labs where they get an opportunity to participate in simulation programs and get a hands-on experience with the tools. Look no further to be a certified “White Hat” !
  • Module 01: Introduction to Ethical Hacking
  • Module 02: Foot printing and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography
  • EC Council Official CEH v10 – e-book
  • 5 Day classroom training
  • CEH v10 – Test Pass Assurance *
  • CEH v10 – 312-50 Online Exam

(* Pass in your first attempt or your second attempt is on us)

Certification Details

  • EC Council CEH v10 – 312-50 Online Exam
  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice

Who should attend

  • System & Network Engineers
  • Technical Support Engineers
  • Security Engineers
  • Security Analysts
  • IT Managers
  • Site Administrators
  • Any role involved in managing security, within an Organization

Training Outcomes

The candidate will learn

  1. How to manage various types of footprinting, footprinting tools and countermeasures.
  2. Network scanning & enumeration techniques and scanning countermeasures.
  3. System hacking methodology, steganography, steganalysis attacks and covering tracks.
  4. Trojans –Types, Analysis and countermeasures
  5. Working of viruses, virus analysis, computer worms, malware analysis procedure and countermeasures.
  6. Types of webserver & web application attacks, attack methodology and countermeasures.
  7. SQL injection attacks and injection detection tools.
  8. Wireless Encryption, wireless hacking methodology, wireless hacking tools and Wi-Fi security tools.
  9. Mobile platform attack vector, android vulnerabilities, mobile security guidelines and tools.
  10. Firewall, IDS and honeypot evasion techniques, evasion tools and countermeasures.
  11. Various cloud computing concepts, threats, attacks and security techniques and tools.
  12. Types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks and cryptanalysis tools.
  13. Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure and end systems.
  14. Various threats to IoT platforms and learn how to defend IoT devices securely.

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Foot printing and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography


  • EC Council Official CEH v10 – e-book
  • 5 Day classroom training
  • CEH v10 – Test Pass Assurance *
  • CEH v10 – 312-50 Online Exam

(* Pass in your first attempt or your second attempt is on us)

Certification Details

  • EC Council CEH v10 – 312-50 Online Exam
  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice



Who should attend

  • System & Network Engineers
  • Technical Support Engineers
  • Security Engineers
  • Security Analysts
  • IT Managers
  • Site Administrators
  • Any role involved in managing security, within an Organization

Training Outcomes

The candidate will learn

  1. How to manage various types of footprinting, footprinting tools and countermeasures.
  2. Network scanning & enumeration techniques and scanning countermeasures.
  3. System hacking methodology, steganography, steganalysis attacks and covering tracks.
  4. Trojans –Types, Analysis and countermeasures
  5. Working of viruses, virus analysis, computer worms, malware analysis procedure and countermeasures.
  6. Types of webserver & Web application attacks, attack methodology and countermeasures.
  7. SQL injection attacks and injection detection tools.
  8. Wireless Encryption, wireless hacking methodology, wireless hacking tools and Wi-Fi security tools.
  9. Mobile platform attack vector, android vulnerabilities, mobile security guidelines and tools.
  10. Firewall, IDS and honeypot evasion techniques, evasion tools and countermeasures.
  11. Various cloud computing concepts, threats, attacks and security techniques and tools.
  12. Types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks and cryptanalysis tools.
  13. Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure and end systems.
  14. Various threats to IoT platforms and learn how to defend IoT devices securely.


Contact Us

+91 93 848408 00

Request more information

Training Schedules

10th November 2018

Classroom Course Starts in

Days
Hours
Minutes
Seconds

Signup now

Course Curriculum

Introduction to Software Training Details FREE 00:40:00
Object Oriented Design Patterns Details 00:35:00
Software Testing Details 00:30:00
Advanced Database Development Details 00:25:00
Algorithm analysis Details 00:45:00
Multi Threading in Softwares Details 00:40:00
Managing Software Testing Details 00:20:00
The Software Quiz 00:04:00

Course Reviews

4.3

4.3
4 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

Contact Us

+91 93 848408 00


Request more information

39 STUDENTS ENROLLED
    Accredited Partner

    Looking to train your team?

    Contact Us
    © 2018 Ken & Headway - All rights reserved.
    Quick Enquiry
    close slider

    Your contact information

    I authorize Ken and Headway to contact me on the phone number / email provided here by me .

    Yay!

    You just earned Rs. 2000/- Cash

    Please enter your details to redeem

    X