Certified Ethical Hacker



Course Description

Designed to benefit security officers, auditors, security professionals, site administrators, and professionals responsible for the integrity of the enterprise network infrastructure,  CEH - Certified Ethical Hacker - Training Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

To achieve CEH certification, you must pass exam 312-50 that covers the standards and language involved in common exploits, vulnerabilities and countermeasures. You must also show knowledge of the tools used by hackers in exposing common vulnerabilities as well as the tools used by security professionals for implementing countermeasures..

Course Objectives

Conducted in a highly immersive and interactive environment, our CEH Training Course guides participants through the process of scanning, testing, hacking, and securing their own systems. Our state-of-the-art lab is equipped to enable participants to gain an in-depth knowledge and practical experience with the current essential security systems.

Participants begin by understanding how perimeter defenses work, followed by training on how to go about scanning and attacking their own networks - no real network is harmed. Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. Also included in the training are topics such as Intrusion Detection, Policy Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log Interpretation. Participants will leave this class with hands on understanding and experience in internet security; as a Certified Ethical Hacker, the participant will be a precious asset to any organization wanting to test - and secure - their defenses against the increasing threats from the Internet..

Duration : 5 Days

Who should attend

The Certified Ethical Hacker Training Program is a must for networking professionals, IT managers and decision-makers that need to understand the security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people knowledgeable people in information security. This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.


Participants of the Certified Ethical Hacker Training Program are required to have a working knowledge with TCP/IP, Linux & Windows 2000.

Topics Covered

• Certified Ethical Hackers are a valuable asset to an organization that wishes to test - and secure - their networks against the increasing threats from the Internet.

• One of the best ways to test your organization's security is to recruit the services of a Certified Ethical Hacker to try and penetrate your systems - it may leave you a little bit red in the face to discover that your systems aren't as secure as you thought they were, but that's far better than having a malicious hacker sneak in and cripple your networks or steal your data!

· Introduction to Ethical Hacking
· Footprinting
· Scanning
· Enumeration
· System Hacking
· Trojans & Backdoors
· Sniffers
· Denial of Service
· Social Engineering
· Session Hijacking
· Hacking Web Servers
· Web Application Vulnerabilities
· Web based Password Cracking Techniques
· SQL Injection
· Hacking Wireless Networks
· Viruses & Worms
· Physical Security
· Linux Hacking
· Evading Firewalls, IDSs & Honeypots
· Buffer Overflows
· Cryptography
· Penetration Testing


Best CCNA & CCNP Training Center in Pune. Xmetric Solutions Provide 100% Hands on Products