EC-Council - CEH - Certified Ethical Hacker v10
8/17/2020 - 8/21/2020
11/16/2020 - 11/20/2020


COURSE COST: $2899.00

COURSE TIMES: 9:00am - 5:00pm

Printable version of this course
Register for this course


The Certified Ethical Hacker (CEH v10) 5 day course will provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a "Hacker Mindset" in order to teach you how to think like a hacker and better defend against future attacks. It put you in the driver's seat with a hands-on training environment employing a systematic ethical hacking process.

You will learn how to scan, test, hack and secure target systems.

The course covers the Five Phases of Ethical hacking, diving into Reconnaissance. Gaining Access, Enumeration, Maintaining Access, and covering your tracks.


Ethical hackers, System Administrators, Network Administrators and Engineering, Webmanagers, Auditors, Security Professionals in general.

Attaining Industry Trusted and Preferred Credentials CEH and CEH (Practical)

CEH (ANSI) Exam Title: Certified Ethical Hacker (ANSI), Exam Code; 312-50 (ECC Exam), 312-50 (VUE), Number of Questions: 125, Duration 4 hours, Availability: ECCExam/VUE, Test Format: Multiple Choice.

Exam Title: Certified Ethical Hacker (Practical) Number of Practical Challenges: 20, Duration 6 hours, Availability: Aspen-iLabs, Test Format: iLabs cyber range, Passing Score: 70%

One year of experience managing Windows/Unix/Linux systems or equivalent knowledge and skills.
Good understanding of TCP/IP. Software

Professionals with basic knowledge of networking services.


*Course Cost listed includes the cost of Courseware, Exam/ECC, and iLabs. Please refer to your Quote/ Invoice for the additional costs. If you have any questions, please contact us ( or 207-775-0244). This course is subject to a minimum enrollment to run. This course may run as a Live Online if the minimum enrollment is not met. Optional: available Self-Paced.


Top 10 Components of CEH v10
100% Compliance to NICE 2.0 Framework
Vulnerability Analysis and IoT Hacking
Focus on Emerging Attack Vectors (e.g., Cloud, AL, ML, etc.)
Hacking Challenges at the End of Each Module
Coverage of latest Malware
Inclusion of complete Malware Analysis Process
Hands-on Program
Lab environment simulates a real-time environment
Covers latest hacking tools (Based on Windows, MAC, Linux and Mobile)

Course Overview
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Vulnerability Analysis
Malware Threats
Social Engineering
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers

Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing

What will you learn?
Key issues plaguing the information security world, incident management process, and penetration testing.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
System hacking methodology, steganography, steganalysis attacks, and covering tracks.
Different types of Trojans, Trojan analysis, and Trojan countermeasures.
Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
Packet sniffing techniques and how to defend against sniffing.
Social Engineering technique, identify theft, and social engineering countermeasures.
Session hijacking techniques and countermeasures.
Different types of webserver attacks, web application hacking methodology, and countermeasures.
SQL injection attacks and injection detection tools.

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
Various cloud computing concepts, threats, attacks, and security techniques and tools.
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.
Different threats to IoT platforms and learn how to defend IoT devices securely.

Module 01: Introduction to Ethical Hacking
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Penetration Testing Concepts
Information Security LawsandStandards

Module 02: Footprinting and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Competitive Intelligence
Whois Footprinting, DNS, Networking Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Pen Testing

Module 03: Scanning Networks
Network Scanning Concepts
Scanning Tools
Scanning Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Draw Network Diagrams
Scanning Pen Testing

Module 04: Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Enumeration Pen Testing

Module 05: Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports

Module 06: System Hacking
System Hacking Concepts
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing

Module 07: Malware Threats
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Anti-Malware Software
Malware Penetration Testing

Module 08: Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Sniffing Detection Techniques
Sniffing Pen Testing

Module 09: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Pen Testing

Module 10: Denial-of-Service
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing

Module 11: Session Hijacking
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Penetration Testing

Module 12: Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot Solutions
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Penetration Testing

Module 13: Hacking WebServers
WebServer Concepts
WebServer Attacks
WebServer Attack Methodology
WebServer AttackTools
Patch Management
WebServer Security Tools
WebServer Pen Testing

Module 14: Hacking Web Applications
Web App Concepts
Web App Threats
Hacking Methodology
Web App Hacking Tools
Web App Security Testing Tools
Web App Pen Testing

Module 15: SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques

Module 16: Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security Tools
Wireless Pen Testing

Module 17: Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Security Guidelinesand Tools
Mobile Pen Testing

Module 18: IoT Hacking
IoT Concepts
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
IoT PenTesting

Module 19: Cloud Computing
Cloud Computing Concepts
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing

Module 20: Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
PublicKey Infrastructure (PKI)
Email Encryption
Disk Encryption