18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
100 Queen St W, Brampton, ON L6X 1A4, Canada
country flagUnited States
share button

CEH - Certified Ethical Hacker v10 Training





Course Description

The CEH training enables Ethical Hackers to study a relevant system that seems to be on target and be able to outline the weaknesses and strengths of that system. You will learn about all the latest techniques, including 100% compliance with NICE 2.0 framework, coverage of the newest malware and our lab environment simulates a real-time environment.

This course aims at helping professionals learn an ethical hacking methodology that can be utilized in penetrant testing. It educates individuals with in-demand ethical hacking techniques to help them build credibility and boost their careers. The professional will be equipped with skills such as network scanning, foot-printing, packet sniffing, enumeration, and many others, which will positively impact them in the organizational space.

This Certified Ethical Hacker v10 Training course is designed by the EC-Council team and Microtek Learning is their authorized training partners.

This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

Click here for CEH - Certified Ethical Hacker V11 Training.

  • Different types of footprinting tools covering countermeasures.
  • Scanning countermeasures and Network scanning.
  • Enumeration Scanning.
  • Strategic issues troubling the incident management process, Penetration testing and security world.
  • How to shield against sniff and Packet sniffing.
  • Detect thefts, social engineering countermeasures and Social Engineering techniques.
  • DDoS attack tools, techniques of DoS/DDoS attacks and DoS/DDoS countermeasures.
  • Special techniques for Sessional hijacking
  • Diversified types of Web application attacks and Web server attacks.
  • Detection tools of Injection and SQL injection attacks.
  • Wireless hacking tools, wireless hacking methodology and Wireless Encryption.
  • Numerous Cloud Computing concepts such as attacks, threats, tools and other security techniques.
  • Several types of Cryptography tools, cryptography attacks, cryptography ciphers and PKI.
Who Should Attend?

This Ethical Hacker v10 training is for practitioners and network security professionals. Penetration testers, Site administrators, IT security officers, systems analysts, IT operations managers and IS/IT auditors can enroll for this course.

Course Reviews

Course Details
  • Start Date: May 03, 2021
  • Duration: 5 Days
  • Skill Level: Intermediate
  • More Schedules: Click
  • e-Learning Price: $1899
  • Certification: YES
  • Enrolled: 1879
Get In Touch
Are you being sponsored by your employer to take this class?
* I authorize Microtek Learning to contact me via Phone/Email