Skip to main content
Page

CEH1 - Certified Ethical Hacker (CEH) v. 12

Completion requirements

CEH1 - Certified Ethical Hacker (CEH) v. 12


ARMY IGNITED CRITERIA

TRAINING NAME:


  • CEH1 - Certified Ethical Hacker (CEH) v. 12
         

FORMAT:

  • Live, Virtual

ASSOCIATED CREDENTIAL:


  • Certified Ethical Hacker (CEH)
  •  
  LOCATION & SCHEDULES:
  • Virtual - Can be taken from any remote location
  • We have many different schedules to accommodate busy people!
COST:
  • Contact Learn@AristaLearn.com for $
                TESTING VOUCHER or CERTIFICATE OF COMPLETION?
  • Testing Voucher 
TARGET STUDENT:
  •  Students furthering their education in a wide range of topics, including modern exploit technologies, malware analysis, and case studies
  PREREQUISITES:

  • While there are no formal educational requirements for CEH certification, successful candidates for certification typically have a strong background in computer programming, computer science, software engineering, mathematics, and/or information security, which may include a bachelor’s and/or a master’s degree in computer science, IT management/security, cybersecurity, or a related field.

COURSE MATERIALS INCLUDE:
  • Materials, study guides, quizzes, case studies, test prep scenarios are provided in the learning portal which is available 24 hours a day, 7 days a week.

                

HOW TO
ENROLL:
  • Email Learn@AristaLearn for a Quote, Detailed Upload instructions



Unlock the world of cybersecurity and become a digital guardian with the Certified Ethical Hacker (CEH) v12 course. Join us to acquire cutting-edge skills that allow you to ethically hack and protect systems, making you an invaluable asset in today's digital landscape.
Important topics in the syllabus include:


• Intro To Ethical Hacking
• Recon Techniques - Foot printing And Recon
• Recon Techniques - Scanning
• Recon Techniques - Enumeration
• System Hacking Phases And Attack Techniques - Vulnerability Analysis
• System Hacking Phases And Attack Techniques - System Hacking
• System Hacking Phases And Attack Techniques - Malware Threats
• Network And Perimeter Hacking - Sniffing
• Network And Perimeter Hacking - Social Engineering
• Network And Perimeter Hacking - Denial Of Service
• Network And Perimeter Hacking - Session Hijacking
• Network And Perimeter Hacking - Evading Firewalls, Ids, And Honeypots
• Web Application Hacking - Hacking Web Servers
• Web Application Hacking - Hacking Web Applications
• Web Application Hacking - Sql Injection
• Wireless Network Hacking - Hacking Wireless Networks
• Mobile Platform, Iot, And Ot Hacking - Hacking Mobile Platforms
• Mobile Platform, Iot, And Ot Hacking - Iot And Ot Hacking
• Cloud Computing - Cloud Computing
• Cryptography - Cryptography