The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally.
The C|EH is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
What will you learn?
When compared to Kali Linux, Parrot Security OS offers better performance on lower-powered laptops and machines while offering an intuitive look and feel with a larger repository of general tools.
CEH is mapped rigorously to important Specialty Areas under the NIST/NICE framework’s Protect and Defend (PR) job role category overlapping with other job roles, including Analyze (AN) and Securely Provision (SP).
CEH covers updated Cloud and IoT modules to incorporate CSP’s Container Technologies (e.g., Docker, Kubernetes), Cloud Computing threats, and a number of IoT hacking tools (e.g. Shikra, Bus Pirate, Facedancer21, and more). This is critical as the world moves towards broader and deeper cloud adoptions.
Operational Technology (OT) Attacks
CEH now includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more!
As the security community observed a rise in fileless attacks, it began to raise concerns about fileless malware attacks. As fileless malware is a relatively new form of malware attack, organizations find it difficult to detect with endpoint security solutions. With the CEH, you can now learn various fileless malware techniques with associated defensive strategies, as the course focuses on the taxonomy of fileless malware threats, fileless malware obfuscation techniques to bypass antivirus, launching fileless malware through script-based injection, launching fileless malware through phishing, and more.
This latest iteration of CEH includes new operating systems, including Windows Server 2019, Windows Server 2016, and Windows 10 configured with Domain Controller, firewalls, and vulnerable web applications for practicing and improving hacking skills.
More than 50% of the CEH course is dedicated to practical skills in live ranges via EC-Council labs. EC-Council leads in this aspect of the industry.
The CEH course includes a library of the latest tools required by security practitioners and pen testers across the world.
Who should attend?
Information Security Analyst / Administrator
Information Assurance (IA) Security Officer
Information Security Manager / Specialist
Information Systems Security Engineer / Manager
Information Security Professionals / Officers
Information Security / IT Auditors
Risk / Threat / Vulnerability Analyst
Network Administrators and Engineers
Students will receive their study kit consisting of physical and digital course materials, including their iLabs code. iLabs will be used to complete classroom training sessions. Students will work with the instructor to review the tools and learn how to apply them to the iLabs Cyber Range.