Certified Ethical Hacker

  • About CEH Exam
  • IS Lab Access
  • Prerequisites
  • Topics
  • FEE AND DELIVERABLES

EC-Council came up with a certification called CERTIFIED ETHICAL HACKING (CEH) for the people who can use hacking in a ethical way. 

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing Program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest methodologies, Hacking techniques, tools, tricks and security measures.  We can have the newly gained knowledge of exploring, testing, hacking and securing our own systems. 

A Hacker is a skilled person who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but a Ethical hacker does it in a lawful and legitimate manner to assess the security posture of a target systems.

For Query & Registration

For Queries, Contact - 044-39 572 572

Participant Feedback

 

Upcoming events

CISA Certification Training
24-11-2018 9:00 am
EC-Council Certified Security Analyst (ECSA)
24-11-2018 9:30 am
 

There is a myth saying that this is advance level certification, rather it is basic to intermediate level certification.

"There are two types of companies in the world: those that know they've been hacked, and those that don't."- Misha Glenny.

Benefits of CEH

  • This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
  • Have a basic understanding of how the virus, malware, and Trojan work.
  • You can have a hacker mindset to defend the future attacks.
  • You will have knowledge of, How to create code our own hacking and security tools.
  • You will have a knowledge of finding vulnerabilities in a network 
  • You will know How Server crashes, email loss, data loss and virus invasions happen and how it can be prevented?
  • To help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.
  • You can explore the newly gained knowledge to do step by step methods of hacking.

About Trainer

All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL. 

 

server1
Uninterrupted Dedicated Server
work from home
Work From Home
gaming mod threats
Learn With Fun

infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.

Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.

 

Prerequisites

  • should know how to handle a web browsers.
  • Programming knowledge is necessary, although not mandatory to become a hacker
  • should know how to work in various operating systems
  • basis networking will be helpful

 

Who Should Attend

  • security officer
  • auditors
  • security professionals
  • administrators
  • administrators
  • Systems Administrators
  • Network Administrators
  • Wireless Administrators
  • Blackberry Administrators
  • Webhosting Server Administrators
  • Web Developers and Designers
  • Research Analysts
  • IT professionals
  • Banking Professionals
  • Students
  • anyone who is concerned about the integrity of the network infrastructure
  • Anyone who is seeking a break through Career into information security

The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.

certificate flow

FLOW OF CEH COURSE

CEH Topics:

 

S.No Topics Content
1 Introduction to Ethical Hacking Key issues plaguing the information security world, incident management process, and penetration testing
2 footprinting and reconnaissance Various types of footprinting, footprinting tools, and countermeasures
3 scanning networks Network scanning techniques and scanning countermeasures
4 enumeration Enumeration techniques and enumeration countermeasures
5 system hacking System hacking methodology, steganography, steganalysis attacks, and covering tracks
6 trojans and backdoors Different types of Trojans, Trojan analysis, and Trojan countermeasures
7 viruses and worms Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
8 sniffers Packet sniffing techniques and how to defend against sniffing
9 social engineering Social Engineering techniques, identify theft, and social engineering countermeasures
10 denial of service DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
11 session hijacking Session hijacking techniques and countermeasures
12 hacking webservers Different types of webserver attacks, attack methodology, and countermeasures
13 hacking web applications Different types of web application attacks, web application hacking methodology, and countermeasures
14 SQL injection SQL injection attacks and injection detection tools
15 Hacking Wireless Network Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
16 Hacking Mobile Platforms Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
17 Evading IDS, Firewalls and Honeypots Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
18 Cloud Security Various cloud computing concepts, threats, attacks, and security techniques and tools
19 Crytography Different types of cryptography ciphers, Public Key Infrastructur (PKI), cryptography attacks, and cryptanalysis tools
20 Penetration Testing Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap