The Certified Ethical Hacker (CEH v11) training from EC-Council proves your understanding of core security essentials. It benefits you get recognized as a Certified Ethical Hacker (CEH v11 Training) and Penetration Tester with the most sought-after security credentials globally. This internationally valued security training validates your ability to identify the vulnerabilities in the organization’s network infrastructure and effectively combat cyber-attacks.
|Start Date||End Date||Start/End Time||Batch Type||Training Mode||Batch Status|
|03 Oct 2021||06 Nov 2021||19:00 - 23:00 (IST)||Weekend||Online||[ Open ]||Enroll|
|18 Oct 2021||09 Nov 2021||20:00 - 23:00 (IST)||Weekday||Online||[ Open ]||Enroll|
|23 Oct 2021||21 Nov 2021||09:00 - 13:00 (IST)||Weekend||Online||[ Open ]||Enroll|
|07 Nov 2021||11 Dec 2021||19:00 - 23:00 (IST)||Weekend||Online||[ Open ]||Enroll|
|14 Nov 2021||02 Jan 2022||09:00 - 15:00 (IST)||Weekend||Online||[ Open ]||Enroll|
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run
Flexibility, Convenience & Time Saving
Learning Cost Savings
5th Sep: Weekend
15th Sep: Weekday
Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training
The Certified Ethical Hacker (CEH v11 Training) program by EC-Council upgrades your understanding of core security fundamentals. Certified Ethical Hacker (CEH V11 Certification Course) is one of the most sought-after security certifications globally that is considered in high regard. This internationally valued security training validates your abilities to identify the vulnerabilities in the organization’s network infrastructure and helps to combat cyber-attacks effectively.
CEH v11 Training is the second course in the new Vulnerability Assessment and Penetration Testing (VAPT) Track developed by EC-Council. In the latest version, EC-Council has added topics and concepts considering the recent advancements in the field of cybersecurity. The course equips you with the understanding of the latest commercial hacking tools, practices, and methodologies used by real-world hackers.
Since its introduction in 2003, CEH continues to be considered a standard within the information security community. With the increasing number of cyberattacks and the advancement in these attack methods, organizations endeavour to search for security enthusiasts who have a thorough understanding of security concepts to aid the construction and maintenance of a hack-proof environment.
CEH v11 Certification Course exposes you to such a posture that aims to impart the idea and measures necessary to maintain security. The newly introduced topics echo with the current cybersecurity market requirements.
EC-Council has introduced a new hacking challenge called “Break the code challenge” as a part of their Gamification Platform that contains challenges of different complexities covering various attack vectors. It provides you an extensive hands-on experience of the various scenarios that you might have to face as a security defender in an organization.
CEH v11 certification Course Needs:
For EC-Council Certified Ethical Hacker (CEH) certification
EC council provides exam in the form of different question banks with varying difficulty levels. Cut scores can range from 60% to 85%, depending on which Exam information of CEH v11 form is challenged.
Successful completion of the CEH v11 certification training empowers you with across the board understanding of:
The courseware of CEH v11 Certification Training is designed to provide you a strong and deep understanding of various verticals of security, starting with preparing a base and advancing to the latest scenarios. Provided is the list of modules with a brief description of what it talks about.
Module 01: Introduction to Ethical Hacking: This module introduces you to the basic concepts of hacking, what is hacking, who are hackers, their intent, and other related terminologies.
The next modules dive deeper into the various phases of hacking, which would help you in thinking with the mindset of a hacker.
Module 02: Footprinting and Reconnaissance: Gathering information from various sources using footprinting tools and how to defend against the same.
Module 03: Scanning Networks: Different techniques to identify and scan the network, host, and port discovery by utilizing various scanning tools.
Module 04: Enumeration: Finding detailed information about the hosts and ports discovered during scanning. This module now includes sub-domains like NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking, along with the countermeasures.
Module 05: Vulnerability Analysis: It introduces the concepts of vulnerability assessment, its types, along with a hands-on experience of tools that are currently used in the industry.
Module 06: System Hacking: It focuses on the “how” part. How to gain access of the system, how to escalate privileges, how to maintain access, and how to clear your tracks.
The next modules help to develop a deeper understanding of various defense and attack methodologies and concepts that aid the process of hacking.
Module 07: Malware Threats: Malware threat terminologies, viruses, worms, trojans, their analysis, and countermeasures to prevent data loss. The introduction and analysis of malware like, Emotet and fileless that are gaining popularity have been updated under this section. APT concepts have also been added.
Module 08: Sniffing: Packet sniffing techniques, associated tools, and related defensive techniques.
Module 09: Social Engineering: Since humans are the most significant vulnerability for any organization, it becomes essential to understand how attackers use them for their purpose for carrying out attacks like identity theft, impersonation, insider threat, and how to defend against such social engineering attacks.
Module 10: Denial-of-Service: As DoS and DDoS are some of the most common purposes of attackers, this module talks about these attacks, use cases, and the related attack and defense tools.
Module 11: Session Hijacking: To provide a deeper understanding of the technique, its purpose, tools used along with the countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots: Understand the terminologies and working of these inline defenses and techniques to learn how to evade these while performing an attack.
Module 13: Hacking Web Servers: Web servers based attacks, methodologies, tools used, and defense
Module 14: Hacking Web Applications: Web application-based attacks, techniques, and mitigation.
Module 15: SQL Injection: An in-depth understanding of the top OWASP top 10 web app vulnerability, it’s working and the mitigation.
Module 16: Hacking Wireless Networks: Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
Module 17: Hacking Mobile Platforms: Management of mobile devices, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
Module 18: IoT Hacking: Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices. Operational Technology (OT) essentials, introduction to ICS, SCADA, and PLC, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
Module 19: Cloud Computing: Cloud computing, threats, and security. Additionally, the essentials of container technology and serverless computing have been added.
Module 20: Cryptography: Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis.
Bharat served as a corporate trainer & Consultant with nearly 8+ years of experience across the diverse industry. Good hands-on experience in vulnerability assessment, Penetration Testing
Karan is a multi talented Cyber Security Enthusiast. Since he himself has earned various certification like CEI,CND, CEH(Master), CHFI,ECIH, CTIA, ECSAv10,LPT(Master) ,OSWP, he very well understands the basic
Information security Instructor and a security researcher . Performed Web App. Security assessment, identifying various application related vulnerabilities.Performing Internal and external pen-test
I was Deepak's CEH student. He is highly knowledgeable, hands-on and adept at using various tools and scripting. He gave us a deep insight into the subject. He is very passionate about teaching and teaches beyond the syllabus with great emphasis on practical learning. I would definitely recommend infosectrain to anyone who is zealous to learn more about security.... Read More
I had the opportunity to take CEH Training in Infosectrain. His trainer has sound & in-depth knowledge of each module of CEH. Trainer always provides real world example from our daily life which helped me in understanding the concepts. Demonstration of the labs on his lab environment was the real key in cracking the CEH exam. I strongly recommend Infosectrain for CEH Training. Best of Luck!!!... Read More
Infosectrain's trainer is very knowledgeable and an excellent trainer who can teach in a language that you can understand. He is very approachable and has a lot of patience! He has a vast amount of knowledge in Cyber Security. Very well presented and can deliver a tailored course for your needs. A strong recommendation from me for Infosectrain.... Read More
No, it is not mandatory to attend EC-Council’s authorized training to attempt this exam. If a candidate has
EC council is completely aware about its social responsibility and therefore, has set a minimum eligibility criteria of 2 years of security related work experience for the course.
Eligibility criteria to apply to sit for the CEH (ANSI) Exam are:
The exam is proctored by a proctor authorised at the testing centre for the candidates sitting for the exam at a physical testing centre (ETC). Those candidates who wish to attempt the exam remotely (ECC/ ProctorU), it will be proctored remotely by an authorised proctor.
Retake exam requests can only be purchased by writing to firstname.lastname@example.org, should a candidate fail the exam.