Professional Development

Certified Ethical Hacker Certification
Register Today

CEH

A Certified Ethical Hacker is a skilled professional who knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

 The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

 The Purpose of the CEH credential is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

 

 

The CAP certification training leads to the following technology qualification career paths at ITC Technologies:

Duration and Schedule

Duration:

Day time: 3 weeks.
Evenings: 4 weeks.
Weekends: 6 weeks.

Schedule:

Day-time Mornings: Mondays to Thursdays, 8am to 12 noon
Day-time Afternoons: Mondays to Thursdays, 1pm to 5pm
Evenings: Mons /Weds / Fridays, 6pm to 10pm
Saturdays: 9am to 5pm.

Price Per Student: $ 2,800

Included In Fees:
• Tuition
• Certified Instructor
• Official Textbook
• Practice tests and simulation software
• Exam fees valued $600

Topics Covered

Module 01:

Introduction to Ethical Hacking.

Module 02:

Footprinting and Reconnaissance.

Module 03:

Scanning Networks.

Module 04:

 Enumeration.

Module 05:

Vulnerability Analysis.

Module 06:

System Hacking.

Module 07:

Malware Threats.

Module 08:

Sniffing.

Module 09:

Social Engineering.

Module 10:

Denial-of-Service.

Module 11:

Session Hijacking.

Module 12:

Evading IDS, Firewalls, and Honeypots.

Module 13:

Hacking Web Servers.

Module 14:

Hacking Web Applications.

Module 15:

SQL Injection.

Module 16:

Hacking Wireless Networks.

Module 17:

Hacking Mobile Platforms.

Module 18:

IoT Hacking.

Module 19:

Cloud Computing.

Module 20:

Cryptography .

So glad you found us!

So glad you found us!

Let's stay in touch. Sign up to get out technology career guide.
No daily emails, no spammy sales.

You have successfully subscribed. Check your email for our career guide.