CEH Certified Ethical Hacker 8 Course Bundle 2018

£4,799.00

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

SKU: EC4Y0123 Categories: , , Tags: , , ,

CEH – The Most Advanced Hacking Course

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

What is an Ethical Hacker?

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The most comprehensive Ethical Hacker course

This is the worlds most advanced certified ethical hacking course with 18 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

Become an all round Security Expert!

Included with our CEH course is also 8 courses designed to improve your online security knowledge even further. These courses include CompTIA SY0-501 Security+, Cisco 640-554: CCNA Security, PMI Risk Management Professional and many more! Scroll down to the ‘Units of Study’ tab to see the courses included and their outlines.

FREE 5 Day Classroom Training or Webinar!

Included in this course is a 5 Day Classroom Training Event or Online Live Tutor Webinar. Both events are conducted quarterly and you will either attend a Classroom Event in Harlow, Essex UK or login and access the Live Tutor Webinar via your PC.

What’s Included?

Wiki_tick  Unlimited access for 12 months
Wiki_tick  Access anywhere, any time
Wiki_tick  Fast effective training, written and designed by industry experts
Wiki_tick  Track your progress with our Learning Management System
Wiki_tick  Unlimited support
Wiki_tick  Save money, time and travel costs
Wiki_tick  Learn at your own pace and leisure
Wiki_tick  Easier to retain knowledge and revise topics than traditional methods
Wiki_tick  Exam preparation quizzes, tests and mock exams to ensure that you are 100% ready

Contact us NOW for HUGE Discounts on this course 0203 282 7122

£4,799.00Add to cart

Modules

CEH Certified Ethical Hacker

What is New in CEH Version 9 Course

Focus on New Attack Vectors

Emphasis on Cloud Computing Technology

  • CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
  • Covers wide-ranging countermeasures to combat cloud computing attacks
  • Provides a detailed pen testing methodology for cloud systems to identify threats in advance

Emphasis on Mobile Platforms and Tablet Computers

  • CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
  • Coverage of latest development in mobile and web technologies

New Vulnerabilities Are Addressed

Heartbleed CVE-2014-0160

  • Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
  • Detailed coverage and labs in Module 18: Cryptography.

Shellshock CVE-2014-6271

  • Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
  • Detailed coverage and labs in Module 11: Hacking Webservers

Poodle CVE-2014-3566

  • POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
  • Case study in Module 18: Cryptography

Hacking Using Mobile Phones

  • CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
  • Courseware covers latest mobile hacking tools in all the modules

Coverage of latest Trojan, Virus, Backdoors
Courseware covers Information Security Controls and Information
Security Laws and Standards
Labs on Hacking Mobile Platforms and Cloud Computing
More than 40 percent new labs are added from Version 8
More than 1500 new/updated tools
CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)

Other Courses Included:

Cisco 640-554: CCNA Security – Implementing Cisco IOS Network Security – IINS

CompTIA: Advanced Security Practitioner (CASP)

Cloud Computing Security Knowledge (CCSK)

Certified Information Systems Auditor (CISA)

Certified Information Security Manager (CISM)

PMI Risk Management Professional

PMI Risk Management Professional

CompTIA Security+ SY0-501

System Requirements

Minimum specifications for the computer are:

Windows:

Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS:

OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)

All systems:

Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)