Welcome to ONLC Training Centers
Certified Ethical Hacker Certification Classes from EC-Council at ONLC Training Centers

Certified Ethical Hacker (CEH) Certification at ONLC

Unlock the potential to safeguard data and networks with EC-Council's Certified Ethical Hacker (CEH) certification, a globally recognized credential that paves the way for lucrative career opportunities in cybersecurity. This comprehensive training equips you with essential skills to think like a hacker, identify vulnerabilities, and implement effective security measures to protect sensitive information from evolving cyber threats.

With the increasing demand for cybersecurity professionals, obtaining your Certified Ethical Hacker (CEH) certification is a strategic investment in your future, providing you with a competitive edge in this thriving field. Whether you're a budding cyber enthusiast or a seasoned IT expert, our CEH certification program is crafted to enhance your cyber defense skills while addressing the growing need for qualified professionals.

Moreover, our interactive, hands-on classes are led by seasoned experts who bring decades of real-world cybersecurity experience and teaching expertise. In addition to participating in practical exercises that reinforce your learning, you'll also be able to interact directly with your online instructor whenever you need assistance.

Certified Ethical Hacker / CEH Classes, Dates & Prices

Ethical Hacking and Countermeasures 12

Overview
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

This course includes an exam voucher.

Course Objectives
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

Who Should Attend?
The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course outline

Introduction to Ethical Hacking
Information Security Overview
Cyber Kill Chain Concepts
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Information Security Laws and Standards

Foot-printing and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Who is Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures

Scanning Networks
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Draw Network Diagrams

Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures

Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Assessment Solutions and Tools
Vulnerability Assessment Reports

System Hacking
System Hacking Concepts
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs

Malware Threats
Malware Concepts
APT Concepts
Trojan Concepts
Virus and Worm Concepts
Fileless Malware Concepts
Malware Analysis
Countermeasures
Anti-Malware Software

Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Countermeasures
Sniffing Detection Techniques

Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures

Denial-of-Service
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
BotnetsDDoS Case Study
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools

Session Hijacking
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Countermeasures

Evading IDS, Firewalls, and Honeypots
IDS, IPS, Firewall, and Honeypot Concepts
IDS, IPS, Firewall, and Honeypot Solutions
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures

Hacking Web Servers
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Countermeasures
Patch Management
Web Server Security Tools

Hacking Web Applications
Web Application Concepts
Web Application Threats
Web Application Hacking Methodology
Web API, Webhooks, and Web Shell
Web Application Security

SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Countermeasures

Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Wireless Security Tools

Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Device Management
Mobile Security Guidelines and Tools

IoT and OT Hacking
IoT Hacking
IoT Concepts
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
Countermeasures
OT Hacking
OT Concepts
OT Attacks
OT Hacking Methodology
OT Hacking Tools
Countermeasures

Cloud Computing
Cloud Computing Concepts
Container Technology
Serverless Computing
Cloud Computing Threats
Cloud Hacking
Cloud Security

Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Countermeasures
Dates Times Location Price
12/2/24 - 12/6/24 Live Online from our site or yours. $3,495

More Dates    Quote

 

ONLC is an EC Council Accredited Training Center

Understanding the Role of a Certified Ethical Hacker (CEH)

A Certified Ethical Hacker (CEH) is a highly skilled professional who employs the same tools and techniques as malicious hackers to identify weaknesses and vulnerabilities in target systems. Typically, this individual is employed by an organization and is entrusted to conduct penetration attempts on networks and computer systems, mirroring the methods used by hackers.

The Certified Ethical Hacking training course and certification offer significant advantages for:

  • Security Officers
  • Auditors
  • Security Professionals
  • Site Administrators
  • Anyone concerned about the integrity of the network infrastructure

CEH v12 certification

Certified Ethical Hacker (CEH) Certification Course Led by Authorized Instructors

Ethical Hacking and Countermeasures 12
CEH Exam Voucher Included!

The Ethical Hacking and Countermeasures course prepares candidates for the Certified Ethical Hacker (CEH) exam administered by the EC-Council. This live, instructor-led program emphasizes hacking techniques and technologies from an offensive perspective.

Regularly updated to reflect the latest advancements in the field, this advanced security course covers emerging hacking techniques, exploits, automated tools, and expert-led defensive strategies. Moreover, each module includes practical hacking challenges designed to enhance hands-on skills.

Accredited and immersive, this course equips participants with the advanced tools and techniques hackers and information security professionals use to penetrate organizational defenses effectively.

CEH Certification Exam

CEH v12 (prefix: 312-50)

To achieve this credential you must pass the 4-hour, multiple choice authorized Ethical Hacking and Countermeasures exam.

The CEH exam is available online. CEH candidates schedule their exam time via the ECC Exam Center

Why Learn Ethical Hacking with ONLC?

  • Interactive Live Instruction: Our virtual classroom training offers live, expert-led instruction with interactive exercises, Q&A sessions, and real-time assistance from your instructor.
  • Hands-On Experience: Our course focuses on hands-on activities that help you apply theoretical concepts in practical scenarios.
  • Authorized Instructors: Our instructors have extensive experience in the field of cybersecurity, providing valuable insights into the latest trends and techniques.
  • Flexible Schedule Options: ONLC offers flexible schedule options, including evening and weekend courses, to accommodate busy professionals' needs.

Next Step

CEH Practical certification

Once you've earned C|EH certification, the next step is C|EH Practical.

The preparatory course for C|EH Practical is the Certified Ethical Hacker course. While there is no additional course or training required, EC Council strongly recommends candidates only attempt the C|EH Practical exam if they have attended the CEH course or equivalent.

C|EH Practical is a rigorous, six-hour exam that requires candidates to demonstrate the application of ethical hacking techniques. It is not a simulated exam but rather, it mimics a real corporate network through the use of live virtual machines, networks, and applications, designed to test your skills. You will be presented with scenarios and will be asked to demonstrate the application of the knowledge acquired in the CEH course to find solutions to real-life challenges.

Exam title is Certified Ethical Hacker (Practical)

Resources

News & Offers

Call an ONLC Education Advisor for certification and course selection assistance

Education Advisors for Assistance
Our advisors can answer questions about our classes and certification. They can also help you find a training path that is right for you based on your background and career goals. Advisors are available weekdays toll free at 1-800-288-8221 or via our chat feature.

 

Classes at ONLC centers coast to coast

ONLC Training Centers Coast to Coast
We schedule every instructor-led (ILT) class for each of our ONLC Training Centers locations -- same dates. Our training rooms are outfitted with the equipment needed for class and provide an interruption-free space so you can concentrate fully on learning. Find ONLC centers near me click link.

 

Train at Home

Live CEH Certificaiton Classes from Your Own Location
You can attend our live, online instructor-led CEH class from the comfort and convenience of your home or office. The setup is really easy and you don't have to have the class software on your device. Follow our easy setup video click link. If you're still not sure about the setup contact an ONLC Advisor toll free for assistance.

spacer

For More Information

To register for training by phone or for more CEH certification information contact our Education Advisors weekdays at:

1.800.288.8221

 

Certified Ethical Hacker Training Locations

Looking for Certified Ethical Hacker training near you? Our CEH certification course is available at all locations listed below. Click the plus sign on the right to expand and show the sites grouped by state.

ONLC TRAINING CENTERS
800-288-8221
www.onlc.com