Contact Us Now!    

Course Details

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for vulnerabilities in target systems and use the same knowledge and tools in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Certified Ethical Hacker Training Overview

This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture. You will scan, test, hack and secure your own systems. The overall Certified ethical hacking training covers five phases that include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.


Certified Ethical Hacker Training Curriculum

curriculum_moduleIntroduction to Ethical Hacking

Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts, Types, and Phases
Ethical Hacking Concepts and Scope
Information Security Controls
Physical Security
Incident Management
What is Vulnerability Assessment?
Penetration Testing
Information Security Laws and Standards

curriculum_moduleFootprinting and Reconnaissance

Footprinting Concepts
Footprinting Methodology
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing

Overview of Network Scanning
CEH Scanning Methodology

Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
SNMP Enumeration Tools
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures
Enumeration Pen Testing

Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps
Hiding Files
Covering Tracks
Penetration Testing

Introduction to Malware
Trojan Concepts
Types of Trojans
Virus and Worms Concepts
Malware Reverse Engineering
Anti-Malware Software
Penetration Testing

Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Sniffing Tool: Wireshark
Follow TCP Stream in Wireshark
Display Filters in Wireshark
Additional Wireshark Filters
Packet Sniffing Tool: Capsa Network Analyzer
Network Packet Analyzer
Counter measures
Sniffing Detection
Sniffing Pen Testing

Social Engineering Concepts
Social Engineering Techniques
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Penetration Testing

DoS/DDoS Concepts
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Tools and Counter-measures
DoS/DDoS Protection Tools
DoS/DDoS Attack Penetration Testing

Session Hijacking Concepts
Application Level Session Hijacking
Network-level Session Hijacking
Session Hijacking Tools
Session Hijacking Pen Testing

Webserver Concepts
Webserver Attacks
Attack Methodology
Webserver Attack Tools
Patch Management
Webserver Security Tools
Webserver Pen Testing

Web App Concepts
Web App Threats
Web App Hacking Methodology
Web Application Hacking Tools
Security Tools
Web App Pen Testing
Web Application Pen Testing Framework

SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques

Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security Tools
Wi-Fi Pen Testing

Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management (MDM)
Mobile Security Guidelines and Tools
Mobile Pen Testing

IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot System
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Counter-measures
Penetration Testing

Introduction to Cloud Computing
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing

Market Survey 2014: The Year of Encryption
Case Study: Heartbleed
Case Study: Poodlebleed
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptography Attacks
Cryptanalysis Tools


Our trainers have relevant experience in implementing real-time solutions on different queries related to different topics. Mindmajix verifies their technical background and expertise.

We record each LIVE class session you undergo through and we will share the recordings of each session/class.

Trainer will provide the Environment/Server Access to the students and we ensure practical real-time experience and training by providing all the utilities required for the in-depth understanding of the course.

If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within 48 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.

The Training itself is Real-time Project Oriented.

Yes. All the training sessions are LIVE Online Streaming using either through WebEx or GoToMeeting, thus promoting one-on-one trainer student Interaction.

There are some Group discounts available if the participants are more than 2.

As we are one of  the leading providers of Online training, We have customers from USA, UK, Canada, Australia, UAE and other parts of the world. We are located in USA.

Mindmajix Technologies Inc

14 Pasco Drive
East Windsor, Connecticut, 06088
United States (US)
Phone: 201 378 0518


Exam Certification


Certified Ethical Hacker Certification :

You need to pass the CEH Exam(by EC Council) in order obtain Certified Ethical Hacking Certification. This exam tests the individual’s skills in finding the weaknesses and vulnerabilities in target systems using the same tools used by the malicious hacker. You can find the exam details here.

Learning Resources

                         Certified Ethical Hacking Overview

                                                                     “To beat a hacker, you need to think like one”

We live in an era, where all attacks are vulnerable and can arrive from anyplace at any time without any hint. Hence, we need to be skilled, well-funded, and persistent to face the threat.

What is Ethical Hacking?

Ethical hacking is a proactive form of information security. It is also termed as penetration testing, intrusion testing and red teaming.

The objective of ethical hacking is to assess the security of a network and system’s infrastructure. It involves detecting and exploiting any possible vulnerabilities to determine unauthorized access. Vulnerabilities can be either poor system configuration, unknown hardware or software faults, and functional flaws in technical measures.

How does the job market look like for ethical hackers?

According to a survey, it is expected that this IT Security Sector continues to grow 40% by 2022.

In your budding years as an ethical hacker, you’ll be in a position to earn anywhere around $50,000 to $100,000 per year, depending on the company, your IT experience and qualification. But with years of professional experience, you could command nearly $120,000 or more per year.

However, you can’t just dive into an ethical hacker position, without any relevant experience. But experience when included with certifications along with some degree requirements does the job perfectly.


Certified Ethical Hacking training

Course Reviews


314 ratings
  • 5220
  • 447
  • 331
  • 213
  • 13

Drop Us A Query

Copy Rights Reserved © Mindmajix.com All rights reserved. Disclaimer.
Course Adviser

Fill your details, course adviser will reach you.