Description
CEH – The Most Advanced Hacking Course
To master the hacking technologies, you need to become an ethical hacker! Our course is accredited and provides you with the advanced hacking techniques and tools used by information security professionals and hackers to break into an organisation or business!
Our CEH Certified Ethical Hacker bundle is here to give you the knowledge you need to defend against future attacks, and immerse you into the mindset of a hacker!
You will learn how to scan, test, hack and secure your own systems as well as be taught the 5 phases of ethical hacking. You’ll learn how to approach your target and succeed at breaking in every time.
What is an Ethical Hacker?
A Certified Ethical Hacker is a highly skilled professional that uses the same tools and knowledge as a malicious hacker, but in a lawful and legitimate manner. They know how to look for vulnerabilities and weaknesses in target systems and are able to assess the security posture of a target system(s).
The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
The most comprehensive Ethical Hacker course
Our CEH Certified Ethical Hacker bundle has 18 of the most current security domains that anyone will ever want to know when they plan to improve the security of their business!
Our courses cover 270 attack technologies, commonly used by hackers in 18 comprehensive modules.
What’s included?
Alongside the CEH course you also get 8 courses that have been developed and designed to get your online security knowledge to the next level!
These courses include CompTIA SY0-501 Security+, Cisco 640-554: CCNA Security, PMI Risk Management Professional and many more!
FREE 5 Day Classroom Training or Webinar!
You are able to chose between 5 days of free Classroom Training, or a free online Live Tutor Webinar!
The Classroom Training will be in Harlow, Essex in the UK or you can log in wherever you are and access the Live Tutor Webinar via your PC.
What’s Included?
Unlimited access for 12 months
Access anywhere, any time
Fast effective training, written and designed by industry experts
Track your progress with our Learning Management System
Unlimited support
Save money, time and travel costs
Learn at your own pace and leisure
Easier to retain knowledge and revise topics than traditional methods
Contact us NOW for HUGE Discounts on this course 0203 282 7122
$6,460.99Add to basket
Modules
CEH Certified Ethical Hacker
What is New in CEH Version 9 Course
Focus on New Attack Vectors
Emphasis on Cloud Computing Technology
- CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
- Covers wide-ranging countermeasures to combat cloud computing attacks
- Provides a detailed pen testing methodology for cloud systems to identify threats in advance
Emphasis on Mobile Platforms and Tablet Computers
- CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
- Coverage of latest development in mobile and web technologies
New Vulnerabilities Are Addressed
Heartbleed CVE-2014-0160
- Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
- Detailed coverage and labs in Module 18: Cryptography.
Shellshock CVE-2014-6271
- Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
- Detailed coverage and labs in Module 11: Hacking Webservers
Poodle CVE-2014-3566
- POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
- Case study in Module 18: Cryptography
Hacking Using Mobile Phones
- CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
- Courseware covers latest mobile hacking tools in all the modules
Coverage of latest Trojan, Virus, Backdoors
Courseware covers Information Security Controls and Information
Security Laws and Standards
Labs on Hacking Mobile Platforms and Cloud Computing
More than 40 percent new labs are added from Version 8
More than 1500 new/updated tools
CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)
Other Courses Included:
Cisco 640-554: CCNA Security – Implementing Cisco IOS Network Security – IINS
CompTIA: Advanced Security Practitioner (CASP)
Cloud Computing Security Knowledge (CCSK)
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
PMI Risk Management Professional
PMI Risk Management Professional
CompTIA Security+ SY0-501
System Requirements
Minimum specifications for the computer are:
Windows:
Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)
MAC/iOS:
OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)
All systems:
Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)