Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Applied Technology Academy
  4. EC Council - Certified Ethical Hacker - CEH

EC Council - Certified Ethical Hacker - CEH

EC-Council released the most advanced computer forensic investigation program in the world. This course covers major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Students will learn how to excel in digital evidence acquisition, handling, and forensically sound analysis. These skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats, and other intricate cases involving computer systems.

Course Overview

Overall Proficiency Level
1 - Basic
Course Catalog Number
CEH
Course Prerequisites

Being well-versed in cyber security fundamentals is recommended. A strong working knowledge of TCP/IP with one to five years of network, host, or application administration

Training Purpose
Functional Development
Skill Development
Specific Audience
All
General Public
Federal Employee
Delivery Method
Classroom
Online, Instructor-Led
Online, Self-Paced
Course Locations

1992 Lewis Turner Blvd
Suite 131
Fort Walton Beach, FL 32547

1700 North Tampa Street
Tampa, FL 33602

1320 E 9th Ave
Suite 100
Tampa, FL 33605

722 E. 9th Court
Panama City, FL 32401

317 S. 6th Street
Las Vegas, NV 89101

445 Dexter Avenue
Suite 4050
Montgomery, AL 36104

5835 Callaghan Road
Suite 105
San Antonio, TX 78225

560 Warner Robins Street
Warner Robins, GA 31098

3165 Washington Road
Suite D
Augusta, GA 30907

164 NW Promontory
Suite 200
Farmington, UT 84025

6950 Columbia Gateway Dr
Suite 450
Columbia, MD 21046

620 Herndon Pkwy
Herndon, VA 20170

  • Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

  • Module 01: Introduction to Ethical Hacking.
  • Module 02: Footprinting and Reconnaissance.
  • Module 03: Scanning Networks.
  • Module 04: Enumeration.
  • Module 05: Vulnerability Analysis.
  • Module 06: System Hacking.
  • Module 07: Malware Threats.
  • Module 08: Sniffing.
  • Module 09: Social Engineering.
  • Module 10: Denial-of-Service.
  • Module 11: Session Hijacking.
  • Module 12: Evading IDS, Firewalls, and Honeypots.
  • Module 13: Hacking Web Servers.
  • Module 14: Hacking Web Applications.
  • Module 15: SQL Injection.
  • Module 16: Hacking Wireless Networks.
  • Module 17: Hacking Mobile Platforms.
  • Module 18: IoT Hacking.
  • Module 19: Cloud Computing.
  • Module 20: Cryptography.
  • Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Feedback

    If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov(link sends email). Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

    Last Published Date: