Ethical Hacking Certification

COURSE OVERVIEW

Ethical hacking is one of the fastest growing cybersecurity careers

Enjoy a lucrative career in cybersecurity with an Ethical Hacking certification and learn to use white hat techniques to find vulnerabilities within your organization that could be compromised by black hat hackers.

On-Demand, Bootcamp or Virtual Classroom Ethical Hacking options

Access online course content, videos, exercises, discussions and chats

Pre and post course assessments

Virtual labs for hands-on cybersecurity experience

Live lab add-ons available

Develop real-life skills you can apply in the workplace with Live Labs

Access to over 25,000 e-books and 30,000 downloadable video tutorials

Expert mentoring and coaching to answer questions and guide your learning

Course completion certificates

Cybersecurity Career Guide

*
*
*
*
*

1

GREAT OPPORTUNITY

Excellent employment opportunities exist for security professionals who train for the Certified Ethical Hacker.

2

LEARN IN-DEMAND SKILLS

The growing number of black hat hackers has created a high-demand for qualified talent who can find vulnerabilities before it’s too late.

3

GLOBALLY RECOGNIZED

The CEH is a highly popular cybersecurity certification for specialists around the world because the opportunities for employment are endless.

Course guide

Qualification: CEH – Ethical Hacker

Study time: Full time – one to two weeks | Part time – two to three months

Vendor: EC-Council

Student support: Success Advisors

Prerequisites: CEH approved training or two+ years experience in information security

Assessment: Exam based – CEH

Resources: Internet access and email

Ideal for: Network professionals, information security professionals, security officers, auditors or site administrators

Modules

Essential skills for your career

Exam 312-50 

  • Introduction to ethical hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration System hacking
  • Trojans and backdoors
  • Viruses and worms
  • Sniffers
  • Social engineering
  • Denial of service
  • Session hijacking
  • Hacking webservers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Evading IDS firewalls and honeypots
  • Buffer overflow
  • Cryptography
  • Penetration testing

Get certified the KnowledgeNet way

Professional development that works around you

  • World’s #1 eLearning portal
  • Global community of peers
  • Expert mentors by email
  • Six consecutive days of Practice Labs
  • Interactive exercises
  • Training mapped to Oracle exam curriculum
  • Award winning training used globally by leading corporate clients
DON'T MISS OUT
Ask about our monthly promotions. Save big on training and certifications to sharpen your skills!
First Name * Last Name *
* *
close-link