• USA : +1 973 910 5725
  • INDIA: +91 905 291 3388
  • info@tekslate.com
  • Login

Course Details

CEH Training (Certified Ethical Hacker Training)

According to CEH Prep Guide by Wiley, An ethical hacker attempts to duplicate the intent and actions of malicious hackers without causing harm. Ethical hackers conduct penetration tests to determine what an attacker can find out about an information system, whether a hacker can gain and maintain access to the system, and whether the hacker’s tracks can be successfully covered without being detected. The ethical hacker operates with the permission and knowledge of the organization they are trying to defend and tries to find weaknesses in the information system that can be exploited. In some cases, to test the effectiveness of their information system security team, an organization will not inform their team of the ethical hacker’s activities. This situation is referred to as operating in a double blind environment. To operate effectively, the ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support the ethical hacker’s efforts.

Certified Ethical Hacker Training Course Curriculum

Introduction to Ethical Hacking

What is Hacking? What is Ethical Hacking? Who is an Ethical Hacker, Types of Hacking Methodologies

Fundamentals of Networks and Computer Systems

TCP/IP, SubNet, Network Devices, MAC Addresses, Firewall, DMZ, Proxy Servers, Basics of Operating Systems, Windows, Linux, Mac OS

Cryptography Fundamentals

What is Cryptography? Difference between Symmetric and Assymetric Cryptography, What is Hashing?, IPSec and SSL

Phases of Ethical Hacking

What is Footprint? Scanning, Enumeration and System Hacking, How to scan Ports?, Different types of Scans, Fingerprinting etc, LDAP, Active Directory, SMTP, Authentication, Authorization, System Access


What is Malware? Types of Malware, Trojans, Worms, Viruses


Sniffing Tools, Wireshark, Detecting Sniffing Attacks

Denial of Service

What is Dos? Types of Attacks, DDoS Attacks, Dos Tools, DDoS Tools

Session Hijacking

Spoofing, Stateful and Stateless Sessions, Active and Passive Attacks, Network Hijacking

WebServers and Web Applications

What are WebServers and Web Applications? 2-Tier and 3- Tier Architecture, Common Flaws and Attacking Methods

SQL Injection

Introduction, Examples, Altering Data with SQL, SQL Injection CounterMeasures

Wireless Networking

Overview, Hacking, Locate Wireless Networks

Physical Security

Introduction, Simple Controls, Mobile Devices, Defensive Paths

Course Reviews


540 ratings
    • The online course session was good with a lot of discussion on the subject in depth. Demo's were good and the trainer cleared my doubts clearly.The trainer having a very good command on the subject.
      Profile photo of Suneel Kumar
    • Real time/live scenario's were included in the training sessions. The trainer's has very good command on the subject. Thank you..
      Profile photo of Suneel Kumar
      Claire Edwards
    • I like the training period from Tekslate. The course is very well designed that helps to keep track until we demonstrate subject mastery.
      Profile photo of Suneel Kumar
      Anya Vasilisa
    • Using most innovative teaching techniques, Tekslate intended to help students to learn through online. A great part of the coursework is allowed to use and earn certification by the time they finish t ...
      Profile photo of Suneel Kumar
      Alvin Alicia
drop query

Send us a Query

Enroll into this course

Register for Free Demo

I agree to be contacted via e-mail.

Related Articles

No Related Articles found

Site Disclaimer, Copyright © 2016 - All Rights Reserved.