• Courses
  • > Certified Ethical Hacker Training

Certified Ethical Hacker Training

Certified Ethical Hacker Training is required to to scan, test, hack and secure systems and applications. You will definitely gain in-depth knowledge and practical approach to the current essential security systems through this training.


Online training – Anytime Anywhere

Certified Ethical Hacker Training

Demo Date Course Duration (Hrs)  
28 Oct 2016 30
29 Oct 2016 30
30 Oct 2016 30
, Contact Us Now!    

Drop Us A Query

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for vulnerabilities in target systems and use the same knowledge and tools in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Certified Ethical Hacker Training Overview

This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture. You will scan, test, hack and secure your own systems. The overall training covers five phases that include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Certified Ethical Hacker Training Curriculum

curriculum_moduleIntroduction to Ethical Hacking

Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts, Types, and Phases
Ethical Hacking Concepts and Scope
Information Security Controls
Physical Security
Incident Management
What is Vulnerability Assessment?
Penetration Testing
Information Security Laws and Standards

curriculum_moduleFootprinting and Reconnaissance

Footprinting Concepts
Footprinting Methodology
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing

curriculum_moduleScanning Networks

Overview of Network Scanning
CEH Scanning Methodology


Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
SNMP Enumeration Tools
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures
Enumeration Pen Testing

curriculum_moduleSystem Hacking

Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps
Hiding Files
Covering Tracks
Penetration Testing

curriculum_moduleMalware Threats

Introduction to Malware
Trojan Concepts
Types of Trojans
Virus and Worms Concepts
Malware Reverse Engineering
Anti-Malware Software
Penetration Testing


Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Sniffing Tool: Wireshark
Follow TCP Stream in Wireshark
Display Filters in Wireshark
Additional Wireshark Filters
Packet Sniffing Tool: Capsa Network Analyzer
Network Packet Analyzer
Counter measures
Sniffing Detection
Sniffing Pen Testing

curriculum_moduleSocial Engineering

Social Engineering Concepts
Social Engineering Techniques
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Penetration Testing


DoS/DDoS Concepts
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Tools and Counter-measures
DoS/DDoS Protection Tools
DoS/DDoS Attack Penetration Testing

curriculum_moduleSession Hijacking

Session Hijacking Concepts
Application Level Session Hijacking
Network-level Session Hijacking
Session Hijacking Tools
Session Hijacking Pen Testing

curriculum_moduleHacking Webservers

Webserver Concepts
Webserver Attacks
Attack Methodology
Webserver Attack Tools
Patch Management
Webserver Security Tools
Webserver Pen Testing

curriculum_moduleHacking Web Applications

Web App Concepts
Web App Threats
Web App Hacking Methodology
Web Application Hacking Tools
Security Tools
Web App Pen Testing
Web Application Pen Testing Framework

curriculum_moduleSQL Injection

SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques

curriculum_moduleHacking Wireless Networks

Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security Tools
Wi-Fi Pen Testing

curriculum_moduleHacking Mobile Platforms

Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management (MDM)
Mobile Security Guidelines and Tools
Mobile Pen Testing

curriculum_moduleEvading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot System
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Counter-measures
Penetration Testing

curriculum_moduleCloud Computing

Introduction to Cloud Computing
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing


Market Survey 2014: The Year of Encryption
Case Study: Heartbleed
Case Study: Poodlebleed
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptography Attacks
Cryptanalysis Tools


Certified Ethical Hacker Course FAQs

Our trainers have relevant experience in implementing real-time solutions on different queries related to different topics. Mindmajix verifies their technical background and expertise.

We record each LIVE class session you undergo through and we will share the recordings of each session/class.

Trainer will provide the Environment/Server Access to the students and we ensure practical real-time experience and training by providing all the utilities required for the in-depth understanding of the course.

If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within 48 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.

The Training itself is Real-time Project Oriented.

Yes. All the training sessions are LIVE Online Streaming using either through WebEx or GoToMeeting, thus promoting one-on-one trainer student Interaction.

There are some Group discounts available if the participants are more than 2.

As we are one of  the leading providers of Online training, We have customers from USA, UK, Canada, Australia, UAE and other parts of the world. We are located in USA.

Mindmajix Technologies Inc

14 Pasco Drive
East Windsor, Connecticut, 06088
United States (US)
Phone: 201 378 0518



Job Support

Mindmajix Job support’s aim is to train and support as many young IT professionals as possible in achieving their tasks for attaining quality jobs in the regular workforce.

For a fresher in IT, the actual requirement of programming and development standards could be partially or completely different in the job environment. Job support gives graduates that extra guidance before or after they attempt employment into IT sector by assisting them with the Certified Ethical Hacker training by highly experienced and real time professionals with full stack technical background in the Certified Ethical Hacker field. They address your complete issues that you face periodically.

We have wide-spread services across India, USA, Australia and other countries, assisting software employed people to excel in their jobs when they have an onset of a worsening condition.

Our trainers support you solve your technical problem and guide you to the right path in order to obtain a favourable solution. Once we understand your project, the subsequent problems are solved even better and faster.

What we assure?

* Our trainers make it a point to make you capable of understanding the real world scenarios.

* Our trainers will provide exceptional Technical assistance and help you out solve your Technical problems at your jobs in an efficient way.

* We assist the person learn a new job, and ensure extra assistance or a different format for learning the role vividly.

We Specialize in providing most reliable support and you can entirely entrust to us.

Course Reviews


314 ratings
  • 5220
  • 447
  • 331
  • 213
  • 13
Course Adviser

Fill your details, course adviser will reach you.

Copy Rights Reserved © Mindmajix.com All rights reserved. Disclaimer.