18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
100 Queen St W, Brampton, ON L6X 1A4, Canada
country flagUnited States
share button

CEH - Certified Ethical Hacker v11 Training

Category

EC-Council

Rating
4.6
(4.6)
Price

$2795

Course Description

CEHv11 training courses have been designed with the assistance of top Ethical hackers. It makes you understand weaknesses and vulnerabilities that help companies strengthen their system security controls to control the threat of an incident. The CEHv11 Training course will allow you to act and think like a malicious attacker or hacker to be better positioned to set up security infrastructure and secure future attacks. The CEH 11th version continues to evolve with the most modern and advanced tools, operating systems, tactics, technologies, and exploits.

What's new in CEH v11 Training Course?

With this new version, 11 EC-Council have taken all that the CEH already is and included extra to make it even more advanced, detailed, better, and concise. Here are some important updates of the CEH Training Course to be implemented in CEHv11 (version 11) Training course:

  • Cloud: Container Kubernetes, Docker, Technology,
  • Incorporation of Parrot OS: AnonSurf, WifiPhisher
  • Operation Technology: PLC, SCADA, ICS, Side-Channel attacks, HML based attacks
  • WPA3: WP3 Encryption and cracking
  • New Lab Designs and OSs
  • Re-Mapped to NICE/ NIST Framework
  • Emerging Attack Vectors: Targeted ransomware, Fileless malware, Web Shell, and Web API threats
  • Enhanced Cloud Security, OT, and IoT Modules
  • 1. OT (Operational Technology) Attacks
  • 2. IoT Threats
  • 3. Cloud−Based Threats
  • Malware Reverse Engineering: Dynamic and Static Malware Analysis
  • Hacking Challenges On Steroids
  • Modern Malware Analysis
  • Improved Lab Time and Hands−on Focus
  • The majority of IT departments have made CEH compulsory for security-related positions. CEH v11 certified ethical hacker employees earn 44% higher perks than non-certified workers.

    img4-ceh-certified-ethical-hacker-v11.jpg

Steps to become a certified

The CEH exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test your Information Security Threats and Attack Vectors skills, Attack Detection, Attack Prevention, Procedures, Methodologies, and more!

  • First, enroll for an official CEH v11 training.
  • Take up and clear your official CEH V11 certification exam from either EC-Council or through Pearson Vue
  • Please take part in the CEH practical session, which is for 6 hours with clear it with a 70% score
  • Become a Certified Ethical Hacker Master
img3-ceh-certified-ethical-hacker-v11.jpg
Access our exam for blueprint for CEH

Prerequisites for this training

There are no prerequisites to take up this ethical hacking certification training course.

Who should attend this course?

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security/ITAuditors
  • Risk/Threat/VulnerabilityAnalyst
  • System Administrators
  • NetworkAdministratorsandEngineers

Schedules


Aug 16, 2021
9:00 am - 5:30 pm EST
Online

Aug 23, 2021
9:00 am - 5:30 pm EST
Online

Aug 30, 2021
9:00 am - 5:30 pm EST
Online
question-markCan't find the batch you're looking for?

What you will learn

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.
  • Social engineering techniques and how to identify theft attacks to audit humanlevel vulnerabilities and suggest social engineering countermeasures.
  • DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
  • Session hijacking techniques to discover network-level session management, authentication/authorization, cryptographic weaknesses, and countermeasures.
  • Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
  • Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
  • Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools.
  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.
  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

With Microtek Learning, you’ll receive:

  • Certified Instructor-led training
  • Industry Best Trainers
  • Official Training Course Student Handbook
  • Pre and Post assessments/evaluations
  • Collaboration with classmates (not available for a self-paced course)
  • Real-world knowledge activities and scenarios
  • Exam scheduling support*
  • Learn and earn program*
  • Practice Tests
  • Knowledge acquisition and exam-oriented
  • Interactive online course.
  • Support from an approved ITIL expert
  • For Government and Private pricing*
*For more details call: +1-800-961-0337 or email: info@microteklearning.com

Our Clients

For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.

  • 300+ enterprise clients
  • 100,000+ professionals trained
  • Service 70 of the Fortune 100
  • 96% of our clients would recommend us
our clients

Our Awards

our awards

Skills you will gain

  • Trojans backdoors and countermeasures
  • IDS firewalls and honeypots
  • Advanced hacking concepts
  • Network packet analysis
  • Mobile and web technologies
  • Advanced log management

Why Choose Us?

Best price

Best Price in the Industry

You give better value in the marketplace. We will beat it.

trusted-approved

Trusted & Approved

Our courses are accredited by the authorized vendor.

delivery-methods

Many Delivery Methods

Flexible delivery methods are available here.

high-quality-resources

High-Quality Resources

Resources are included for a comprehensive learning experience.

Curriculum

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography
  • Tools Covered

    Tools Covered

    FAQs

    Yes, our Certified Ethical Hacking course is accredited by EC-Council.

    After the course you are eligible to apply in the cyber security domain of any corporate house.

    CEH training is beneficial for the following professionals:

  • Ethical hackers
  • System Administrators
  • Network Administrators and Engineers
  • Auditors & Security Professionals
  • Network Security Professionals
  • Site Administrators
  • Security Officers
  • Anyone else entrusted with the responsibility of safeguarding the integrity of the network infrastructure
  • Students who have completed their training through an authorized channel will need to provide certificates of attendance (COA) in order to proceed with the exam.

    Upon completing the CEH (Master) program, consisting of CEH ANSI and CEH (Practical), the CEH (Master) designation is awarded. Once the candidate achieves both the CEH ANSI and CEH Practical certifications he/she will become get CEH Master.

    Labs will conduct on EC-Council-designed iLabs and the access period is 6 months.

    The tools you'll need to attend the Ethical Hacking Course are:

  • Windows: Windows XP SP3 or higher
  • Mac: OSX 10.6 or higher
  • Internet speed: Preferably 512 Kbps or higher
  • Headset, speakers, and microphone: You'll need headphones or speakers to hear instructions clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone or separate speakers and microphone.
  • A student who enrolled for Certified Ethical Hacker (CEH) V11 certification training will get:

  • A copy of the course material
  • CEH v11 Sample Papers
  • Access to EC-Council iLabs
  • A course completion certificate from an EC-Council Accredited Training Center
  • The cost of the Certified Ethical Hacker (CEH) V11 certification exam is USD 500.

    Learners who are self-preparing for the examination must pay a USD 100 application fee and submit two years of relevant work experience in the information security domain.

    Your Certified Ethical Hacker certification is valid only for three years. There are recertification requirements to earn 120 credits within the three-year cycle period to maintain your CEH certification.

    CEH (ANSI)

    Exam Title Certified Ethical Hacker (ANSI)
    Exam Type Multiple-choice
    Application Cost USD 100
    Total Questions 125
    Exam Duration 4 Hours
    Passing Score 60% to 85%
    Languages English

    CEH (Practical)

    Exam Title Certified Ethical Hacker (Practical)
    Number of Practical Challenges 20
    Test Format iLabs Cyber Range
    Duration 6 Hours
    Availability Aspen-iLabs
    Passing Score 70%

    REVIEWS ON OUR POPULAR COURSES

    male

    I was sceptical at first whether to enrol with Microtek Learning or not, however, I am glad that I did- I got everything that was promised (maybe more). The trainer was very patient and knowledgeable and with his effort and mine, I was able to clear the exam with ease! Keep up the good work everyone.

    MARTIN

    TORONTO, CANADA

    • (5)
    male

    I'm really impressed with the storytelling skills of the instructor. She makes the session exciting by keeping things simple and easy to understand.

    Prince N.

    Texas

    • (5)
    male

    I was recommended the ITIL 4 Foundation course by an IT professional who had completed the same course at Microtek Learning. The training gave me a thorough understanding of service management that I felt I could take back to my job as an IT Project Management and apply it to improve the value of products and services.

    Marsh George

    Texas

    • (5)
    Accredited By

    Course Details

    • Start Date: Aug 16, 2021
    • Duration: 5 Days
    • Skill Level: Intermediate
    • Certification: YES
    • Enrolled: 712
    • Price: $2795
    • Download PDF: Click Here
    side post

    Talk to Learning Advisor

    CEH v11

    Get In Touch

    * I authorize Microtek Learning to contact me via Phone/Email