CEH: Certified Ethical Hacker Course

Length: 5 Day(s)     Cost:$4250 + GST

= Scheduled class     = Guaranteed to run     = Fully booked

Click on the date to book online
Please wait as we are loading the schedules...
LOCATION July August September October
Virtual Class

This CEHv11 class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Exam Voucher included for redemption within 6 months of course.

This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

  • Networking experience
  • Some Linux experience is beneficial as Linux command line will be covered in the course
  • ICND1 or equivalent skills
  • Windows Server Experience
  • TCP/UDP/IP experience
  • Experience with virtual machines

After attending this course:

  • Students are able to apply countermeasures to secure systems against threats and attacks
  • Students are able to test access to organizational data using ethical hacking techniques
  • Students are able to implement real-world hacking techniques to test the security of systems
  • Students are able to employ complex tools to identify and analyze risks and weaknesses
  • Students are able to uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography