Certified Ethical Hacker (CEH) Training (312-50)

EC-Council Certified
 Approved Training Centre(ATC)
CEH Training South Africa and World Wide!

Certified Ethical Hacker training (CEH) is in increasing demand across the world as cyber terrorism, state sponsored cyber warfare, organised crime syndicates, and legislation to enforce protection of customer data, increases the risk that poorly implemented cyber security can have on an organisations.This past year alone has seen significant data breaches at large international corporates such as E-Bay and Target. Jumping Bean's Certified Ethical Hacker hands on training by certified instructors can give you the edge to pass the exam and learn how to protect your IT assets. The Certified Ethical Hacker (CEH) course will enable students to master ethical hacking methodology, tools and techniques that can be used in a penetration testing and IT security reviews.

Who should attend Certified Ethical Hacker (CEH) Training?

Audience:This course will significantly benefit

  • security officers and professionals,
  • auditors,
  • site administrators,
  • computer forensic investigators and
  • anyone who is concerned about the integrity of their IT assets and network infrastructure.
Description Days Price (ex vat)
Certified Ethical Hacker (CEH) * 5 ZAR USD

R 17,800* (includes exam voucher of R6000)

$ 1,800 (includes exam voucher of $500)
  • *Includes lunch, tea and training material.
  • *Start time is 9:00am for 9:30am

 

Pre-requisites:Solid networking knowledge and operating system knowledge (Windows or Linux) as well as familiarity with OSI network model and TCP/IP. We recommend our Linux fundamentals course if you need to attain these skills first.

Certified Ethical Hacker Training (CEH) Course Overview

Introduction to Ethical Hacking

  • Security 101
    • Basic Networking
    • Security Essentials
  • Introduction to Ethical Hacking
    • Hacking Terminology
    • The Ethical Hacker
Reconnaissance: Information Gathering
  • Getting Started
    • Vulnerability Research
  • ​Footprinting
    • Passive Footprinting
    • Active Footprinting
    • DNS Footprinting
    • Determining Network Range
    • Google Hacking
    • Footprinting Tools

Scanning and Enumeration

  • Scanning Fundamentals
    • Scanning Methodology
    • The TCP Handshake
    • Identifying Targets
    • Port Scanning
  • Enumeration
    • Windows System Basics
    • Enumeration Techniques
Sniffing and Evasion
  • Fundamentals
    • How It All Works
    • Passive and Active Sniffing
  • Sniffing Tools and Techniques
    • Wireshark
    • Other Tools
  • Evasion
    • IDS
    • Firewalls
Attacking a System
  • Getting Started
    • Methodology
    • Windows Security Architecture
    • Linux Security Architecture
  • Cracking Passwords
    • Passwords 101
    • Password Attacks
  • Privilege Escalation and Executing Applications
    • Privilege Escalation
    • Executing Applications
  • Stealth
    • Hiding Files and Activity
    • Covering Your Tracks
Web-Based Hacking: Servers and Applications
  • Attacking Web Servers
    • Web Server Architecture
    • Attack Methodology
    • Web Server Attacks
  • Attacking Web Applications
    • Web Application Architecture
    • Application Attacks
    • SQL Injection
Wireless Network Hacking
  • Wireless 101
    • Wireless Architecture and Standards
    • Finding and Identifying Wireless Networks
  • Wireless Hacking
    • Wireless Attacks
    • Mobile Platform Attacks
Trojans and Other Attacks
  • “Malware” Attacks
    • Trojans, Backdoors, Viruses, and Worms
  • Remaining Attacks
    • Denial of Service
    • Session Hijacking
Cryptography
  • Cryptography and Encryption Overview
    • Encryption Algorithms and Techniques
  • PKI, the Digital Certificate, and Digital Signatures
    • The PKI System
    • Digital Certificates
    • Digital Signatures
  • Encrypted Communication and Cryptography Attacks
    • Data Encryption: At Rest and While Communicating
    • Cryptography Attacks
Social Engineering & Physical Security
  • Social Engineering
    • Human-Based Attacks
    • Computer-Based Attacks
    • Mobile-Based Attacks
  • Physical Security

The Penetration Test

  • Methodology and Steps
  • Security Assessment
  • Security Assessment Deliverables
  • Guidelines