The Certified Ethical Hacker V11 (CEH-v11) course is a comprehensive program designed to provide learners with advanced knowledge and skills in ethical hacking. It is structured to educate IT professionals on how to think and act like a hacker (a legal one), with a strong emphasis on practical, hands-on learning.
Module 1: Introduction to Ethical Hacking sets the stage by explaining the ethical hacking process, legal considerations, and the different types of hackers.
Module 2: Footprinting and Reconnaissance covers techniques for gathering information about target systems.
Module 3: Scanning Networks teaches methods for identifying live hosts, ports, and services.
Module 4: Enumeration discusses how to extract detailed information about network resources.
Module 5: Vulnerability Analysis focuses on identifying and assessing security weaknesses.
Module 6: System Hacking delves into gaining access to systems and maintaining that access.
Module 7: Malware Threats explores various types of malicious software.
Module 8: Sniffing covers techniques for intercepting and monitoring network traffic.
Module 9: Social Engineering emphasizes manipulating individuals to breach security.
Module 10: Denial of Service examines attacks designed to disrupt service availability.
Module 11: Session Hijacking involves taking control of user sessions.
Module 12: Evading IDS, Firewalls, and Honeypots teaches how to bypass security measures.
Module 13: Hacking Web Servers and Module 14: Hacking Web Applications focus on vulnerabilities specific to web environments.
Module 15: SQL Injection is about exploiting database vulnerabilities.
Module 16: Hacking Wireless Networks covers wireless security breaking techniques.
Module 17: Hacking Mobile Platforms looks at vulnerabilities in mobile systems.
Module 18: IoT and OT Hacking addresses hacking Internet of Things and Operational Technology devices.
Module 19: Cloud Computing examines the vulnerabilities in cloud services.
Module 20: Cryptography provides an understanding of encrypting and decrypting data.
By completing the CEH-v11 course, learners are equipped with the necessary skills for ethical hacking and are prepared to identify, counter, and prevent cyber threats, enhancing the security posture of their organizations.
1-on-1 Training
Schedule personalized sessions based upon your availability.
Customized Training
Tailor your learning experience. Dive deeper in topics of greater interest to you.
4-Hour Sessions
Optimize learning with Koenig's 4-hour sessions, balancing knowledge retention and time constraints.
Free Demo Class
Join our training with confidence. Attend a free demo class to experience our expert trainers and get all your queries answered.
Purchase This Course
♱ Excluding VAT/GST
Classroom Training price is on request
You can request classroom training in any city on any date by Requesting More Information
♱ Excluding VAT/GST
Classroom Training price is on request
You can request classroom training in any city on any date by Requesting More Information
♱ Excluding VAT/GST
Flexi FAQ's1. CompTIA Pentest+ ( PT0-002) Certified Ethical Hacker V11 (CEH-v11) and CompTIA Pentest+ (PT0-002) are courses focused on ethical hacking and penetration testing Read More
To ensure that our students are fully prepared to gain the most from the Certified Ethical Hacker V11 (CEH-v11) course, we recommend that they meet the following minimum required prerequisites:
While prior experience in information security is advantageous, it is not a strict requirement. Our course is designed to guide students through each module progressively, building upon the knowledge as they go along. Regardless of your background, a keen interest in cybersecurity and a willingness to learn are the most important factors for success in the CEH-v11 course.
The Certified Ethical Hacker V11 (CEH-v11) course equips IT professionals with advanced cybersecurity techniques and offensive tactics.
Target Audience for CEH-v11 Course:
The CEH-v11 course equips students with advanced ethical hacking skills, covering reconnaissance, system vulnerabilities, attack vectors, and security measures.
Learning Objectives and Outcomes: