CEH (v10) – Certified Ethical Hacking Course


Add to wishlist

    CEH (v10) – Certified Ethical Hacking Course

    Learn advanced processes in this Certified Ethical Hacking (CEH) course. In this online ethical hacking training, you will master advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers.

    Ethical Hacking Course Overview

    Simplilearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. This ethical hacking course is aligned with the latest CEH v10 by EC-Council and will adequately prepare you to increase your blue team skills.


    This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.


    There are no prerequisites to take up this ethical hacking certification training course.

    Course Syllabus

    Lesson 01 – Information Security Overview

    1. Demo of Aspen and iLabs
    2. Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
    3. Essential Terminology
    4. Elements of Information Security
    5. The Security, Functionality, and Usability Triangle

    Lesson 02 – Information Security Threats and Attack Vectors

    1. Motives, Goals, and Objectives of Information Security Attacks
    2. Top Information Security Attack Vectors
    3. Information Security Threat Categories
    4. Types of Attacks on a System
    5. 5 Information Warfare

    Lesson 06 – Penetration Testing Concepts

    1. Penetration Testing
    2. Why Penetration Testing
    3. Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
    4. Blue Teaming/Red Teaming
    5. Types of Penetration Testing
    6. Phases of Penetration Testing
    7. Security Testing Methodology

    Lesson 03 – Hacking Concepts

    1. What is Hacking
    2. Who is a Hacker?
    3. Hacker Classes
    4. Hacking Phases

    Lesson 04 – Ethical Hacking Concepts

    1. What is Ethical Hacking?
    2. Why Ethical Hacking is Necessary
    3. Scope and Limitations of Ethical Hacking
    4. Skills of an Ethical Hacker

    Lesson 05 – Information Security Controls

    1. Information Assurance (IA)
    2. Information Security Management Program
    3. Enterprise Information Security Architecture (EISA)
    4. Network Security Zoning
    5. Defense in Depth
    6. Information Security Policies
    7. Physical Security
    8. What is Risk?
    9. Threat Modeling
    10. Incident Management
    11. Security Incident and Event Management (SIEM)
    12. User Behavior Analytics (UBA)
    13. Network Security Controls
    14. Identity and Access Management (IAM)
    15. Data Leakage
    16. Data Backup
    17. Data Recovery
    18. Role of AI/ML in Cyber Security

    Lesson 07 – Information Security Laws and Standards

    1. Payment Card Industry Data Security Standard (PCI-DSS)
    2. ISO/IEC 27001:2013
    3. Health Insurance Portability and Accountability Act (HIPAA)
    4. Sarbanes Oxley Act (SOX)
    5. The Digital Millennium Copyright Act (DMCA)
    6. Federal Information Security Management Act (FISMA)
    7. Cyber Law in Different Countries

    The importance of ethical hacking isn’t in the breaking, it’s in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.

    Who this course is for:

    1. IT or IS professionals looking to obtain their CEH certification
    2. IT professionals looking to expand their careers into security
    3. Students who want a better understanding of information security components

    What you’ll learn:

    1. Assess technical vulnerabilities for the potential for exploitation
    2. Apply a code of ethics to testing situations
    3. Perform technical vulnerability assessments
    4. Determine appropriate remediations for vulnerabilities
    5. Operate tools and utilities used in security testing
    6. Describe a basic penetration testing methodology
    7. Compare differences between testing methodologies that exist
    8. Assess a testing request to identify the scope and remain within that scope


    There are no reviews yet.

    Be the first to review “CEH (v10) – Certified Ethical Hacking Course”

    Your email address will not be published. Required fields are marked *