During our five day EC-Council Certified Ethical Hacker Certification (CEH v8) training course students will learn to look for the vulnerabilities and weaknesses within different target systems using the same knowledge and tools as a malicious hacker. Through our CEH course, students will begin to understand how perimeter defenses work and, through hands-on exercises, will be monitoring and attacking a network specifically designed for this course. Students will then learn what steps to take to properly secure a system and how intruders escalate privileges. In addition, students will learn about policy creation, intrusion detection, virus creation, DDoS attacks, buffer overflows, and social engineering. At the end of the CEH training course, students will walk out the door with hacking skills that are highly in demand as well as the internationally recognized Certified Ethical Hacker certification!
Identify and use advanced tools and techniques used by hackers and information security professionals
Scan, test, hack and secure an information system
Implement the five phases of ethical hacking
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.