Ethical hacker

COURSE OVERVIEW

Start a lucrative career in cybersecurity

Enjoy a lucrative career in cybersecurity and learn to use white hat techniques to find vulnerabilities within your organization that could be compromised by black hat hackers.

On-Demand, Bootcamp or Virtual Classroom options

Access online course content, videos, exercises, discussions and chats

Pre and post course assessments

Virtual labs for hands-on experience

Live lab add-ons available

Develop real-life skills you can apply in the workplace with Live Labs

Access to over 25,000 e-books and 30,000 downloadable video tutorials

Expert mentoring and coaching to answer questions and guide your learning

Course completion certificates

Cybersecurity Career Guide

*
*
*
*
*

1

GREAT OPPORTUNITY

Excellent employment opportunities exist for security professionals who train for the Certified Ethical Hacker.

2

LEARN IN-DEMAND SKILLS

The growing number of black hat hackers has created a high-demand for qualified talent who can find vulnerabilities before it’s too late.

3

GLOBALLY RECOGNIZED

The CEH is a highly popular cybersecurity certification for specialists around the world because the opportunities for employment are endless.

Course guide

Qualification: CEH – Certified Ethical Hacker

Study time: Full time – one to two weeks | Part time – two to three months

Vendor: EC-Council

Student support: Success Advisors

Prerequisites: CEH approved training or two+ years experience in information security

Assessment: Exam based – CEH

Resources: Internet access and email

Ideal for: Network professionals, information security professionals, security officers, auditors or site administrators

Modules

Essential skills for your career

Exam 312-50 

  • Introduction to ethical hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration System hacking
  • Trojans and backdoors
  • Viruses and worms
  • Sniffers
  • Social engineering
  • Denial of service
  • Session hijacking
  • Hacking webservers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Evading IDS firewalls and honeypots
  • Buffer overflow
  • Cryptography
  • Penetration testing

Get certified the KnowledgeNet way

Professional development that works around you

  • World’s #1 eLearning portal
  • Global community of peers
  • Expert mentors by email
  • Six consecutive days of Practice Labs
  • Interactive exercises
  • Training mapped to Oracle exam curriculum
  • Award winning training used globally by leading corporate clients