Join CEH Online Training Class

Attend EC-Council's CEH Class










Join a CEH
Class Online



iLearn is EC Council's facilitated self-paced option to become CEH

iLearn Self-Paced Online Security Training

iLearn is EC Council's facilitated self-paced option. Facilitated in that all of the same modules taught in the live course are recorded and presented in a streaming video format. Self-paced in that a certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits!


Choose your iLearn package to receive your benefits

The iLearn package includes:

One Year Access to the CEH e-courseware, 3 months access to EC-Council's official Online lab environment (iLabs) with all tools loaded into platform, Certification Voucher & expert instructor-led training modules with streaming video presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

iLearn program is available now onto an iPod Touch, an iPad2 or a Netbook! choose your package

iClass Mobile

You might also be interested in the iClass Mobile option which is the iLearn program with the added value of loading your course onto an iPod Touch, an iPad2 or a Netbook!

 





Upgrade to affordable package to continue your CEH iLearn and Mobile Self-paced online training

iLearn Self-Paced Online Security Training

In an effort to keep our base package affordable in this tough economy, the CEH iLearn and Mobile pricing structure were designed to provide the most amount of training for the least amount of budget. We realize that everyone learns differently.

 


Mobile Pricing

In an effort to keep our base package affordable in this tough economy, the CEH iLearn and Mobile pricing structure were designed to provide the most amount of training for the least amount of budget. We realize that everyone learns differently, so you are welcome to request any of the following additional upgrades:




What You Will Learn

Get training in ethical hacking


Ethical Hacking Concepts, Methodologies, and Legal Issues


  • Objectives of Footprinting
  • Footprinting Threats
  • Website footprinting
  • Email footprinting
  • Competitive Intelligence Gathering
  • Footprint Using Google
  • WHOIS footprinting
  • Extracting DNS Information
  • Locate the Network Range
  • Footprinting through Social Engineering
  • Footprinting through Social Networking Sites
  • Additional Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Pen Testing



Footprinting, Reconnaissance and Competitive Intelligence

 

  • Checking for Live Systems
  • Three-Way Handshake
  • TCP Communication Flags
  • Scanning: IDS Evasion Techniques
  • Scanning Countermeasures
  • OS Fingerprinting
  • Banner Grabbing Countermeasures
  • Hiding File Extensions
  • Vulnerability Scanning
  • Network Mappers
  • Proxy Servers
  • Scanning Pen Testing



Scanning Networks, Vulnerability Analysis, Banner Grabbing,
OS Fingerprinting, Drawing Network Diagrams, and
Attacking Systems using Proxy Servers


  • Techniques for Enumeration
  • NetBIOS Enumeration
  • Enumerating User Accounts
  • Enumerate Systems Using Default Passwords
  • SNMP (Simple Network Management Protocol) Enumeration
  • UNIX/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • DNS Zone Transfer Enumeration Using nslookup
  • Enumeration Countermeasures
  • Enumeration Pen Testing



Enumerating Networks, Users and Active Directive Attacks


  • System Hacking: Goals
  • Password Cracking
  • Privilege Escalation
  • Executing Applications
  • Keylogger
  • Spyware
  • Detecting Rootkits
  • NTFS Data Stream
  • Steganography Techniques
  • Steganalysis
  • Covering Tracks



System Hacking, Password Cracking, Brute Forcing Authentication Tokens
and Hashes, Rootkits, Hiding Files and Steganography

  • System Hacking: Goals
  • Password Cracking
  • Privilege Escalation
  • Executing Applications
  • Detecting Rootkits
  • NTFS Data Stream
  • Steganography Techniques
  • Steganalysis
  • Covering Tracks



Hacking Smartphones and Tablet Computers

  • Architecture of Mobile Operating Systems
  • Risk and Threats to Smartphones and Tablet Computers
  • Hacking iOS Devices
  • Hacking Android Devices
  • Smartphones and Tablet Computers Hacking Methodology
  • Smartphones and Tablet Computers Hacking Tools
  • Guidelines to Secure Smartphones and Tablet Computers
  • Secure Smartphones and Tablet Computer Security Tools

Trojans, Backdoors and Evading Antivirus Techniques

  • Overt and Covert Channels
  • Purpose and Types of Trojans
  • Common Ports used by Trojans
  • How to Infect Systems Using a Trojan?
  • Different Ways a Trojan can Get into a System
  • How to Create, Wrap and Deploy a Trojan?
  • Evading Anti-Virus Techniques
  • How to Detect Trojans?
  • Trojan Horse Construction Kit
  • Pen Testing for Trojans and Backdoors



Virus, Worms and Reverse Engineering Malwares


  • Working of Viruses and Stages of Virus Lifecycle
  • Types of Viruses and How does a Computer get Infected by Viruses?
  • Virus Analysis
  • Writing Virus Code
  • Computer Worms
  • Sheep Dip Computer and Malware Analysis
  • Malware Analysis Procedure
  • Anti-Virus Sensors Systems
  • Online Malware Testing
  • Virus Detection Methods
  • Virus and Worms Countermeasures
  • Penetration Testing for Virus



Sniffing Networks, DHCP, ARP, DNS Poisoning
and Man-in-the-Middle- Attacks

  • Lawful Intercept
  • Wiretapping
  • Sniffing Threats and Types of Sniffing
  • Protocols Vulnerable to Sniffing
  • Hardware Protocol Analyzers
  • SPAN Port
  • DHCP, ARP and DNS Working
  • Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
  • MAC Flooding and MAC Spoofing/Duplicating
  • DNS Poisoning Techniques
  • Sniffing Prevention Techniques
  • How to Detect Sniffing?



Social Engineering, Phishing, Scams, Identity theft and Insider Attacks

  • Factors that Make Companies Vulnerable to Attacks
  • Why is Social Engineering Effective?
  • Phases in a Social Engineering Attack
  • Impact on the Organization
  • Command Injection Attacks
  • Common Targets of Social Engineering
  • Types of Social Engineering
  • Insider Attack
  • Common Intrusion Tactics and Strategies for Prevention
  • Social Engineering Through Impersonation on Social Networking Sites
  • Risks of Social Networking to Corporate Networks
  • Identity Theft
  • Social Engineering Countermeasures
  • How to Detect Phishing Emails?
  • Identity Theft Countermeasures
  • Social Engineering Pen Testing



Denial-of-service Attacks, Botnets, and Organized Crime

  • DoS/DDoS Attack and How does DDoS Attacks Work?
  • Organized Cyber Crime
  • DoS/DDoS Attack Techniques
  • Botnets
  • DoS Attack Tools
  • DoS Detection Techniques
  • Post-attack Forensics
  • Techniques to Defend against Botnets
  • DoS/DDoS Countermeasures
  • Denial of Service (DoS) Attack Penetration Testing



Session Hijacking, Brute Forcing, Spoofing, and
Attacking TCP/IP Layers

  • Dangers Posed by Hijacking
  • Key Session Hijacking Techniques
  • Session Hijacking Process
  • Packet Analysis of a Local Session Hijack
  • Types of Session Hijacking
  • Common Targets of Social Engineering
  • Types of Social Engineering
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Risks of Social Networking to Corporate Networks
  • Identity Theft
  • Social Engineering Countermeasures
  • Defending against Session Hijack Attacks
  • Session Hijacking Pen Testing



Compromising Webservers  and Defacing Websites

  • IIS Webserver Architecture
  • Website Defacement
  • Why Web Servers are Compromised?
  • Impact of Webserver Attacks
  • Webserver Threats
  • Webserver Attack Methodology
  • Webserver Attack Tools
  • How to Defend Against Web Server Attacks?
  • Webserver Security Tools
  • Web Server Penetration Testing



Hacking Web Services, XSS Attacks, Injections Flaws,
Parameter/Form Tampering and Cookie Poisoning

  • How Web Applications Work?
  • Web Application Architecture
  • Web Attack Vectors
  • Web Application Threats
  • Web Services Architecture
  • Web Application Hacking Methodology
  • Footprint Web Infrastructure
  • Attack Web Servers
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Attack Authorization Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Data Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web Application Hacking Tools
  • Web Application Countermeasures
  • Web Application Pen Testing



SQL Injection, Exploitation and
Evasion Techniques

  • SQL Injection Threats
  • SQL Injection Attacks
  • Server Side Technologies
  • SQL Injection Detection
  • Types of SQL Injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • Information Gathering
  • SQL Injection Vulnerability Detection
  • Launch SQL Injection Attacks
  • Extract the Data
  • Interact with the Operation System
  • Compromise the Network
  • Advanced SQL Injection
  • SQL Injection Tools
  • IDS Evasion Techniques
  • How to Defend Against SQL Injection Attacks?
  • SQL Injection Detection Tools



Hacking Wireless Networks, Jamming  Frequencies,
Cracking WPA encryption, Rouge Access Points,
Hacking Bluetooth and PAN Networks

  • Types of Wireless Networks
  • Wireless Standards
  • Service Set Identifier (SSID)
  • Wi-Fi Authentication Modes
  • Types of Wireless Encryption
  • Breaking WEP and WPA/WPA2 Encryption
  • Defending Against WPA Cracking
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • How to Defend Against Wireless Attacks?
  • Wireless Security Tools
  • Wireless Penetration Testing



Evading Intrusion Detection Systems, Bypassing
Network Firewalls, Web Application Filters(WAF)
and Trapping Hackers Using Honeypots

  • Intrusion Detection Systems (IDS) and its Placement
  • How IDS Works and Types of Intrusion Detection Systems
  • Ways to Detect an Intrusion
  • Types of Firewall
  • Firewall Identification Techniques
  • Types of Honeypot
  • How to Set Up a Honeypot?
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewall
  • Detecting Honeypots
  • IDS and Firewall Evading tools
  • Countermeasures
  • Firewall/IDS Penetration Testing



Buffer Overflows, and Writing Advanced
Exploits Using Metasploit Framework

  • Why Programs and Applications are Vulnerable to Buffer Overflows?
  • Stack and Heap Based Buffer Overflows
  • Buffer Overflow Steps
  • How to Mutate a Buffer Overflow Exploit?
  • How to Detect Buffer Overflows in a Program?
  • Testing for Heap Overflow Conditions: heap.exe
  • Steps for Testing for Stack Overflow in OllyDbg Debugger
  • Testing for Format String Conditions using IDA Pro
  • BoF Detection Tools
  • Defense Against Buffer Overflows
  • BoF Security Tools
  • Buffer Overflow Penetration Testing



Cryptography, Encryption, Public Key
Infrastructure and Brute Forcing MD5,
SHA-3 Hashes

  • Types of Cryptography
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools



How to Conduct Penetration Testing
and Auditing Information Systems

  • Security Assessments
  • Vulnerability Assessment
  • What Should be Tested?
  • Rules of Engagement
  • ROI on Penetration Testing
  • Types of Penetration Testing
  • Common Penetration Testing Techniques
  • Using DNS Domain Name and IP Address Information
  • Enumerating Information about Hosts on Publicly-Available Networks
  • Phases of Penetration Testing
  • Penetration Testing Methodology
  • Outsourcing Penetration Testing Services
  • Pen Testing Tools