top of page

CEH (v10) - Certified Ethical Hacker

CEH (v10) - Certified Ethical Hacker

  • 8 hours
  • Login is required!
  • IND-WEST322

Service Description

What are the Bootcamp's objectives? The Ethical Hacking Bootcamp in Delhi which also globally known as "CEH v10 Certified Ethical Hacker" (earlier CEH v9) provide hands-on online classroom training to help you master the same techniques that hackers use to penetrate network systems and leverage them ethically to protect your own infrastructure. This extensive ethical hacking course focuses on 20 of the most popular security domains to provide a practical approach to essential security systems. You will learn to assess computer system security by using penetration testing techniques; scan, test and hack secure systems and applications, and gain hands-on experience with sniffing, phishing and exploitation tactics. This ethical hacking course in Bangalore will prepare you for the EC-Council CEH Certification Exam 312-50. In the latest CEH v10 EC-Council has introduced the following changes: • Upgraded Vulnerability Assessment material • A module on the Internet of Things(IoT) Security • CEH practical exam • Increased focus on Cloud attack vectors, AI and Machine Learning During this Bootcamp you should learn the: Key issues plaguing the information security world, incident management process, and penetration testing. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures. Enumeration techniques and enumeration countermeasures. System hacking methodology, steganography, steganalysis attacks, and covering tracks. Different types of Trojans, Trojan analysis, and Trojan countermeasures. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures. Packet sniffing techniques and how to defend against sniffing. Social Engineering techniques, identify theft, and social engineering countermeasures. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures. Session hijacking techniques and countermeasures. Different types of webserver attacks, attack methodology, and countermeasures. Different types of web application attacks, web application hacking methodology, and countermeasures. SQL injection attacks and injection detection tools. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.

Cancellation Policy

Please read our policy before anything else! For cancellations, please contact us at least 48 hours in advance to avoid being charged. Best regards, Pheniix

Contact Details


Dubai - United Arab Emirates

bottom of page