Filter by
Certified Ethical Hacker
Show more filters
Displaying 1-7 of 7 results

Popular places

Case studies within Certified Ethical Hacker

CEH Training and Certification - Identify and Eliminate Weaknesses

CEH training is the pathway towards becoming an EC-Council Certified Ethical Hacker (CEH). Aimed at information security professionals, becoming CEH training involves preparation for the completion of a rigid examination that tests an individuals ability to utilize 'black hat' hacking techniques as a means for finding and eliminating security flaws of target systems.

By definition, a Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner to assess security measures.

CEH Training and Information Security 

Ethical hacking is vital to modern networks and computer systems. With so much sensitive information stored digitally today, we are at constant risk of malicious attempts to exploit weaknesses, manipulate virtual environments and steal valuable data. It is vital that those at the forefront of information security remain one step ahead of malicious hackers by being aware of their methods.

Recently a number of unauthorized system intrusions have made global news, with politicians and tech leaders finding themselves under great pressure to reassure the public that their sensitive information is secure and that they are safe from malicious online practices. Without doubt, information security and the hackers that threaten it have  gradually emerged to be some of the biggest technological dilemmas of our time. 

CEH Training Circuit Board

CEH Training Requirements

Because of the potentially malicious uses of the course material, CEH training has a strict code of ethics and conduct that participants are required to abide by following their certification. CEH training course attendees are often required to have three to five years of employer-verified recent experience in a high level information security role.

Who Needs CEH Training?

Here are some examples of roles that CEH training may be most applicable to:

  • Network managers
  • Support specialists
  • IT security professionals
  • System administrators
  • Defense and military personnel
  • Computer forensics consultants

What to Expect From CEH Training 

CEH training will offer hands-on lab experience and allow you to learn about the tools used by real security threats. CEH training provides an opportunity to learn how to scan for, experiment, hack and secure your own system so you can go away from CEH training and improve the resilience of your own organization's networks and systems.

Topics covered include:

  • Introduction to Ethical Hacking
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Social Engineering
  • Denial-of-Service
  • Cloud Computing
  • Cryptography
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking

CEH Training Outcomes

The purpose of the CEH exam is to prepare participants to pass the EC-Council Certified Ethical Hacker exam. Most CEH training course providers will also offer the chance to take the exam.

On successful completion of the CEH exam, you will be awarded the EC-Council Ethical Hacking Certification, one of the most globally recognized and respected information security qualifications available. The certification verifies you as a skilled professional who understands how to search for and identify the weaknesses and vulnerabilities in target systems. It also authorizes the ethical use of knowledge, tools and tactics used by malicious hackers

Related Training Areas

Looking for a different information security certification? There are many more to choose from at! Check out the following training categories: