Join CEH Online Training Class

Attend EC-Council's CEH Class




Join a CEH Class Online

  iLearn is EC Council's facilitated self-paced option to become CEH

iLearn Self-paced Online Security Training

iLearn is EC Council's facilitated self-paced option. Facilitated in that all of the same modules taught in the live course are recorded and presented in a streaming video format. Self-paced in that a certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits!

Course Cost: $1,599


  Choose your iLearn package to receive your benefits



One Year Access to the CEH e-courseware, 3 months access to EC-Council's official Online lab environment (iLabs) with all tools loaded into platform, Certification Voucher & expert instructor-led training modules with streaming video presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

iLearn program is available now onto an iPod Touch, an iPad2 or a Netbook! choose your package

iClass Mobile

You might also be interested in the iClass Mobile option which is the iLearn program with the added value of loading your course onto an iPod Touch, an iPad2 or a Netbook! (See total cost of each package below.)

iPod Touch 32 gig: $1,849
iPod Touch 64 gig: $1,949
Netbook: $1,999
iPad2 32 gig: $2,148*
iPad2 64gig: $2,248*

*Your choice of black or white





Upgrade to affordable package to continue your CEH iLearn and Mobile Self-paced online training

iLearn Self-paced Online Security Training

In an effort to keep our base package affordable in this tough economy, the CEH iLearn and Mobile pricing structure were designed to provide the most amount of training for the least amount of budget. We realize that everyone learns differently, so you are welcome to request any of the following additional upgrades:

3G: $200
Physical Courseware: $225 (Includes CEH Tool Kit)
Physical DVDs: $199
CEH Tool Kit: $99
Additional 30 Days iLabs: $299
Additional 60 Days iLabs: $399
Additional 90 Days iLabs: $499

 


Live Information Security Training  Get Live Information Security Training

Course Cost: $2,895
Early Bird: $2,495 
Military/Gov: $2,295
Member: $2,195
Multiple Seat/Group: Inquire











 



In an effort to keep our base package affordable in this tough economy, the CEH iLearn and Mobile pricing structure were designed to provide the most amount of training for the least amount of budget. We realize that everyone learns differently, so you are welcome to request any of the following additional upgrades:


eCourseware w access for one year.
Live, Online iLabs access with tools loaded within.
Certification Voucher




What You Will Learn

Get training in ethical hacking


Ethical Hacking Concepts, Methodologies, and Legal issues

  • Objectives of Footprinting
  • Footprinting Threats
  • Website footprinting
  • Email footprinting
  • Competitive Intelligence Gathering
  • Footprint Using Google
  • WHOIS footprinting
  • Extracting DNS Information
  • Locate the Network Range
  • Footprinting through Social Engineering
  • Footprinting through Social Networking Sites
  • Additional Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Pen Testing



Footprinting, Reconnaissance and Competitive Intelligence

  • Checking for Live Systems
  • Three-Way Handshake
  • TCP Communication Flags
  • Scanning: IDS Evasion Techniques
  • Scanning Countermeasures
  • OS Fingerprinting
  • Banner Grabbing Countermeasures
  • Hiding File Extensions
  • Vulnerability Scanning
  • Network Mappers
  • Proxy Servers
  • Scanning Pen Testing



Learn advanced techniques of ethical hacking technology

  • Techniques for Enumeration
  • NetBIOS Enumeration
  • Enumerating User Accounts
  • Enumerate Systems Using Default Passwords
  • SNMP (Simple Network Management Protocol) Enumeration
  • UNIX/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • DNS Zone Transfer Enumeration Using nslookup
  • Enumeration Countermeasures
  • Enumeration Pen Testing



Enumerating Networks

  • System Hacking: Goals
  • Password Cracking
  • Privilege Escalation
  • Executing Applications
  • Keylogger
  • Spyware
  • Detecting Rootkits
  • NTFS Data Stream
  • Steganography Techniques
  • Steganalysis
  • Covering Tracks





  • System Hacking: Goals
  • Password Cracking
  • Privilege Escalation
  • Executing Applications
  • Detecting Rootkits
  • NTFS Data Stream
  • Steganography Techniques
  • Steganalysis
  • Covering Tracks





  • Architecture of Mobile Operating Systems
  • Risk and Threats to Smartphones and Tablet Computers
  • Hacking iOS Devices
  • Hacking Android Devices
  • Smartphones and Tablet Computers Hacking Methodology
  • Smartphones and Tablet Computers Hacking Tools
  • Guidelines to Secure Smartphones and Tablet Computers
  • Secure Smartphones and Tablet Computer Security Tools



  • Overt and Covert Channels
  • Purpose and Types of Trojans
  • Common Ports used by Trojans
  • How to Infect Systems Using a Trojan?
  • Different Ways a Trojan can Get into a System
  • How to Create, Wrap and Deploy a Trojan?
  • Evading Anti-Virus Techniques
  • How to Detect Trojans?
  • Trojan Horse Construction Kit
  • Pen Testing for Trojans and Backdoors





  • Working of Viruses and Stages of Virus Lifecycle
  • Types of Viruses and How does a Computer get Infected by Viruses?
  • Virus Analysis
  • Writing Virus Code
  • Computer Worms
  • Sheep Dip Computer and Malware Analysis
  • Malware Analysis Procedure
  • Anti-Virus Sensors Systems
  • Online Malware Testing
  • Virus Detection Methods
  • Virus and Worms Countermeasures
  • Penetration Testing for Virus





  • Lawful Intercept
  • Wiretapping
  • Sniffing Threats and Types of Sniffing
  • Protocols Vulnerable to Sniffing
  • Hardware Protocol Analyzers
  • SPAN Port
  • DHCP, ARP and DNS Working
  • Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
  • MAC Flooding and MAC Spoofing/Duplicating
  • DNS Poisoning Techniques
  • Sniffing Prevention Techniques
  • How to Detect Sniffing?





  • Factors that Make Companies Vulnerable to Attacks
  • Why is Social Engineering Effective?
  • Phases in a Social Engineering Attack
  • Impact on the Organization
  • Command Injection Attacks
  • Common Targets of Social Engineering
  • Types of Social Engineering
  • Insider Attack
  • Common Intrusion Tactics and Strategies for Prevention
  • Social Engineering Through Impersonation on Social Networking Sites
  • Risks of Social Networking to Corporate Networks
  • Identity Theft
  • Social Engineering Countermeasures
  • How to Detect Phishing Emails?
  • Identity Theft Countermeasures
  • Social Engineering Pen Testing





  • DoS/DDoS Attack and How does DDoS Attacks Work?
  • Organized Cyber Crime
  • DoS/DDoS Attack Techniques
  • Botnets
  • DoS Attack Tools
  • DoS Detection Techniques
  • Post-attack Forensics
  • Techniques to Defend against Botnets
  • DoS/DDoS Countermeasures
  • Denial of Service (DoS) Attack Penetration Testing





  • Dangers Posed by Hijacking
  • Key Session Hijacking Techniques
  • Session Hijacking Process
  • Packet Analysis of a Local Session Hijack
  • Types of Session Hijacking
  • Common Targets of Social Engineering
  • Types of Social Engineering
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Risks of Social Networking to Corporate Networks
  • Identity Theft
  • Social Engineering Countermeasures
  • Defending against Session Hijack Attacks
  • Session Hijacking Pen Testing





  • IIS Webserver Architecture
  • Website Defacement
  • Why Web Servers are Compromised?
  • Impact of Webserver Attacks
  • Webserver Threats
  • Webserver Attack Methodology
  • Webserver Attack Tools
  • How to Defend Against Web Server Attacks?
  • Webserver Security Tools
  • Web Server Penetration Testing





  • How Web Applications Work?
  • Web Application Architecture
  • Web Attack Vectors
  • Web Application Threats
  • Web Services Architecture
  • Web Application Hacking Methodology
  • Footprint Web Infrastructure
  • Attack Web Servers
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Attack Authorization Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Data Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web Application Hacking Tools
  • Web Application Countermeasures
  • Web Application Pen Testing





  • SQL Injection Threats
  • SQL Injection Attacks
  • Server Side Technologies
  • SQL Injection Detection
  • Types of SQL Injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • Information Gathering
  • SQL Injection Vulnerability Detection
  • Launch SQL Injection Attacks
  • Extract the Data
  • Interact with the Operation System
  • Compromise the Network
  • Advanced SQL Injection
  • SQL Injection Tools
  • IDS Evasion Techniques
  • How to Defend Against SQL Injection Attacks?
  • SQL Injection Detection Tools





  • Types of Wireless Networks
  • Wireless Standards
  • Service Set Identifier (SSID)
  • Wi-Fi Authentication Modes
  • Types of Wireless Encryption
  • Breaking WEP and WPA/WPA2 Encryption
  • Defending Against WPA Cracking
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • How to Defend Against Wireless Attacks?
  • Wireless Security Tools
  • Wireless Penetration Testing





  • Intrusion Detection Systems (IDS) and its Placement
  • How IDS Works and Types of Intrusion Detection Systems
  • Ways to Detect an Intrusion
  • Types of Firewall
  • Firewall Identification Techniques
  • Types of Honeypot
  • How to Set Up a Honeypot?
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewall
  • Detecting Honeypots
  • IDS and Firewall Evading tools
  • Countermeasures
  • Firewall/IDS Penetration Testing





  • Why Programs and Applications are Vulnerable to Buffer Overflows?
  • Stack and Heap Based Buffer Overflows
  • Buffer Overflow Steps
  • How to Mutate a Buffer Overflow Exploit?
  • How to Detect Buffer Overflows in a Program?
  • Testing for Heap Overflow Conditions: heap.exe
  • Steps for Testing for Stack Overflow in OllyDbg Debugger
  • Testing for Format String Conditions using IDA Pro
  • BoF Detection Tools
  • Defense Against Buffer Overflows
  • BoF Security Tools
  • Buffer Overflow Penetration Testing





  • Types of Cryptography
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools





  • Security Assessments
  • Vulnerability Assessment
  • What Should be Tested?
  • Rules of Engagement
  • ROI on Penetration Testing
  • Types of Penetration Testing
  • Common Penetration Testing Techniques
  • Using DNS Domain Name and IP Address Information
  • Enumerating Information about Hosts on Publicly-Available Networks
  • Phases of Penetration Testing
  • Penetration Testing Methodology
  • Outsourcing Penetration Testing Services
  • Pen Testing Tools