CertPREP Courseware: Certified Ethical Hacker (CEH 312-50) - Instructor Led
Please select required options above
Summary
Please select required options above
The Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Topics include the basic concepts related to ethical hacking, reconnaissance techniques, system hacking phases and attack techniques, network and perimeter hacking, web application hacking occurs, wireless network hacking, and mobile platforms, IoT, and OT hacking.
The goal of this course is to provide you with all the tools you need to prepare for the Certified Ethical Hacker exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try.
Duration: 5 days of training
Audience
An IT skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner to assess the security posture of a target system(s).
Prerequisites
- Minimum 2 years’ experience in Information Security
- Knowledge of networking, TCP/IP, and basic computer knowledge
Course objectives
Upon successful completion of this course, students should be able to:
- Explain basic concepts related to ethical hacking
- Demonstrate reconnaissance techniques
- Describe system hacking phases and attack techniques
- Identify network and perimeter hacking
- Explain how web application hacking occurs
- Understand wireless network hacking
- Describe hacking on mobile platforms, IoT, and OT hacking
Required course materials:
- Pearson CertPREP Certified Ethical Hacker (CEH 312-50)
Training outline
- Lesson 1: An Introduction to Ethical Hacking
- Lesson 2: The Technical Foundations of Hacking
- Lesson 3: Footprinting, Reconnaissance, and Scanning
- Lesson 4: Enumeration and System Hacking
- Lesson 5: Social Engineering, Malware Threats, and Vulnerability Analysis
- Lesson 6: Sniffers, Session Hijacking, and Denial of Service
- Lesson 7: Web Server Hacking, Web Applications, and Database Attacks
- Lesson 8: Wireless Technologies, Mobile Security, and Attacks
- Lesson 9: Evading IDs, Firewalls, and Honeypots
- Lesson 10: Cryptographic Attacks and Defenses
- Lesson 11: Cloud Computing, IoT and Botnets
Student access for each license to the course content and resources for 6 months including:
- All text, video, and end of lesson questions
- Lab content (where available)
- Practice Test