Certified Ethical Hacker (CEH) Training
The Certified Ethical Hacker CEH Training course at UMBC Training is a 40-hour immersion into ethical hacking designed to provide professionals with the expertise and insight necessary to prepare for and react to malicious intrusion.
This class will immerse students in an interactive environment where they will be shown how to scan, test, hack, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then learn to scan and attack their own networks. No real network is harmed during these instructions. Students then learn how intruders escalate privileges and the necessary steps to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation in the process. When a student leaves this class, they will have hands-on understanding and experience in Ethical Hacking.
Topics covered include:
- Trojans and Backdoors
- Viruses and worms
- Hacking Web Servers
- SQL Injection
- Physical Security
- Cryptography
- Data Loss Prevention
- Patch Management
CEH Training Includes:
- 40 hours of instructor-led training by a CEH certified professional, delivered either in-person or virtually
- Official EC Council Ethical Hacking & Countermeasures Materials
- ProctorU Exam Voucher
- 6 Month CEH iLabs Subscription for practical experience outside of the classroom
CEH Certification Exam
Our Certified Ethical Hacker (CEH) Training course prepares students to sit for the EC-Council Certified Ethical Hacker exam 312-50. Included in the cost of this course is an exam voucher which can be used to sit for the CEH exam when the student is ready.
Certified Ethical Hacker (CEH) Training Common Questions
If you want to work in Information Security, then yes it is definitely worth it! The CEH certification is listed as a requirement or desired certification for thousands of job postings worldwide. Additionally, if you support the U.S. Department of Defense as either an employee or contractor it is a required certification through the DoD 8570.01-M Mandate.
In other words, if you want to secure a job then it is definitely worth the investment to meet most job posting requirements.
It can be! To be successful on any certification exam, students need to be comfortable with the exam material and they need to be comfortable in a testing environment. We design our classes to address both needs so that students have the best chance possible to pass on their first attempt. If you have little or no experience in the field prior to the exam, then you should invest a significant amount of time studying the material and applying it in testing environments as much as possible. If you have real-world application of the material, it may take you less time to absorb and apply the concepts related to the CEH Certification Exam.
EC-Council Certified Ethical Hacker (CEH) exam vouchers cost $1,199.00. Additionally, if you have not taken an official CEH Training Course, like the one we offer, you need to apply for eligibility with EC-Council prior to purchasing an exam voucher. The application process requires proof of 2 years of Information Security related experience and a non-refundable application fee of $100.
The CEH certification salary is estimated at $82,469/year, according to Payscale.
Not Sure If CEH Training Is Right For You?
Learn more about CEH Training at UMBC Training Centers by requesting a meeting with our Admissions Team below:
AUDIENCE
The Certified Ethical Hacker CEH Training course is designed for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
PREREQUISITES
Students taking this course should have a working knowledge of Linux and strong Microsoft Windows skills, a solid understanding of computer networking, and CompTIA Security+ and Network+ certification or equivalent knowledge.
Upon completing the Certified Ethical Hacker CEH Training course, students will be able to:
- Identify potential security weaknesses,
- Respond to malicious activity with experiential knowledge, and
- Secure systems with the best methods
- Sit for the EC Council Certified Ethical Hacker Examination
This training prepares individuals for the following positions:
- Ethical Hacker
- Security Analyst
“Great Instructor. I love the way he taught the class. He helped me learn. It was a great experience.”
CEH Student, August 2020 Class
Chapter | Topics |
1 | Intro to Ethical Hacking |
Current trends and security threats | |
Scope and limitations of ethical hacking | |
Information security management, policies, and incident management | |
Vulnerability research, pen test process, and security acts/laws | |
2 | Footprinting and Reconnaissance |
Footprinting terminology | |
Footprinting methodology | |
Footprinting tools | |
Footprinting countermeasures / pen test steps | |
3 | Scanning Networks |
Check for live systems and ports / identifying services | |
Banner grabbing / OS fingerprinting | |
Scanning for vulnerabilities | |
Draw network diagrams | |
Prepare proxies | |
Pen test steps for scanning networks | |
4 | Enumeration |
Extracting user names, machine names, and network resources from a system | |
Enumerate NetBIOS, SNMP, LDAP, NTP, SMTP, and DNS | |
Using various tools extract information | |
Pen test steps for enumeration | |
5 | System Hacking |
Gaining access, maintaining access, and clearing logs | |
Hacking tools (keyloggers, spyware, and root kits) | |
Steganography techniques | |
System attack countermeasures | |
Pen test steps for system hacking | |
6 | Malware Threats |
Malware propagation techniques | |
Trojans, viruses, and worms | |
Malware analysis | |
Detect virus’, worms, and trojans | |
Pen test steps for malware threats | |
7 | Sniffing |
Basic concepts of sniffing on the network | |
MAC flooding, DHCP attacks, ARP spoofing, and ARP/DNS poisening | |
Sniffing tools | |
Pen test steps for sniffing | |
8 | Social Engineering |
Social engineering attack phases | |
Types of social engineering | |
Impersonation based social engineering | |
Social engineering countermeasures | |
Pen test steps in social engineering | |
9 | Denial of Service |
Classify DoS and DDoS attacks and tecniques | |
Botnets and how they infect a system | |
Tools used to perform DoS/DDoS | |
Pen test steps for DoS/DDoS | |
10 | Session Hijacking |
Concepts | |
Techniques and tools | |
Countermeasures | |
Pen test steps for session hijacking | |
11 | Hacking Webservers |
Reasons for webserver compromise | |
Open source and IIS architecture | |
Attack tools and techniques | |
Countermeasures | |
Pen test steps for hacking webservers | |
Hacking Web Applications | |
12 | Intro to web applications |
Web application architecture | |
Threats and attacks | |
Web application hacking and security tools | |
Pen test steps for web applications | |
13 | SQL Injection |
Threats from SQL injection attacks | |
Types of attacks | |
Methodology, injection tools, and detection tools | |
Pen test steps for SQL injection | |
Hacking Wireless Networks | |
14 | Types of wireless networks and standards |
Terminology and encryption | |
Threats and hacking wireless network methodology | |
Pen test steps in hacking wireless networks | |
Hacking Mobile Platforms | |
15 | Mobile attack vectors |
Android OS architecture | |
Jailbreaking IOS | |
Windows phone 8 architecture | |
Pen test steps in hacking wireless networks | |
Evading IDS, Firewalls, and Honeypots | |
16 | IDS, firewall, and honeypot solutions |
IDS, firewall, and honeypot placement | |
Evasion techniques | |
Tools and countermeasures | |
Pen test steps in evading IDS, Firewalls, and Honeypots | |
Cloud Computing | |
17 | Basics of cloud computing and services |
Security considerations | |
Threats, tools, and attacks | |
Pen test steps in cloud computing | |
Cryptography | |
18 | Intro to cryptography concepts |
Tools | |
Public Key Infrastructure (PKI) | |
Cyphers, AES, DES | |
RSA | |
Pen test steps for cryptography | |
Is there a discount available for current students?
UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Online courses are excluded from this offer.
What is the cancellation and refund policy?
Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.