• 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
06/03/2019 06/07/2019
  • VLT
  • GTR
Live Online
06/10/2019 06/14/2019
  • ICL
Brampton, Canada
06/17/2019 06/21/2019
  • VLT
  • GTR
Live Online
06/24/2019 06/28/2019
  • ICL
San Antonio,TX
07/01/2019 07/05/2019
  • ICL
Brampton, Canada
07/08/2019 07/12/2019
  • VLT
  • GTR
Live Online
07/15/2019 07/19/2019
  • VLT
  • GTR
Live Online
07/22/2019 07/26/2019
  • VLT
  • GTR
Live Online

CEH - Certified Ethical Hacker v10 Course Overview

It’s a multiple-choice exam which verifies your knowledge of the penetration testing structure and the tools used within that structure. It equips prospective job seekers in the information security industry with a solid start

The main object of this course is to make you proficient in Ethical Hacking methodology in various techniques. We at Microtek Learning offer you with various modules that are critical to obtaining the certification with your best ability.

Some of the modules that we will explain at Microtek Learning  

  • Footprint and Reconnaissance
  • Malware Threat
  • Session Hijacking
  • Social Engineering
  • Sniffing
  • Denial-of-Service
  • Hacking Web Servers
  • Cloud computing
  • Evading IDS, Firewalls and Honeypots
  • SQL Injection


And many more that test various aspects that are essential to obtain the Certified Ethical Hacking certification. This course verifies your advanced security skill-set to thrive in the world-wide information domain. Many of the IT domains have made CEH certification a compulsory qualification for security-related posts.

This course in its 10th Iteration is updated make to use over 2200 hacking tools and gain access to over 140 real-world labs. Learning how hackers use these tools allows you to better secure your network, application, and other assets.

We would require you to have at least two years of IT security experience and strong working knowledge on TCP/IP to be able to gain complete knowledge

This course is popular among

  • Security Officers
  • Auditors
  • Security Professionals
  • Penetration Testers


What do you learn?

You will learn Network scanning techniques and enumeration countermeasures through Microtek Learning program. System hacking methodology, steganography, steganalysis attack, and covering tracks. These methodologies help in abrupt understanding and survival of a “live” attack situation. Microtek Learning teaches you with various cloud computing concepts, mobile platform attack vector, android vulnerability.

Wireless technological development has led to various security tools and hacking tools that will be of great use in the IT domain. The connection of electronic gadgets to the Internet (IoT) has made vulnerable for penetration, additionally, you will be taught to defend IoT devices securely in the course that Microtek Learning offers.

Why CEH?

The CEH course that we offer at Microtek Learning gives “white hat” IT professionals a glimpse into the mindset of a typical hacker. The focus of an IT professional is always on keeping bad guys out and maintaining secure systems. Over time, many IT pros develop a reactionary mindset. Battling with the bad guys will always involve reacting to threats and events as they occur, but it’s far more valuable and powerful to understand how the bad guys think and to be able to anticipate their moves. On learning the hacker mindset, you’ll be able to take a more proactive approach and see beyond current security tools and policies to know where and how an attacker might try to gain access to your network. On the whole, you will be able to

  • Advance your security career
  • Learn to think like a hacker
  • Improve knowledge of risk and vulnerability
  • CEH will boost your salary



CEH - Certified Ethical Hacker v10 Course Outline

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography


At least two years of IT security experience

Strong working knowledge of TCP/IP