Ethical Hacker Training

  • CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing Program focusing on the latest security threats, advanced attack vectors and practical real-time demonstration of latest methodologies, hacking techniques, tools, tricks and security measures.
  • We can have the newly gained knowledge of exploring, testing, hacking and securing our own systems.

What can you expect?

Complete hands-on workshops & individual mentoring.

A certificate with a unique number

30 % Theory, 60 % training, 10% implementation. Get trained by industry experts.

Training materials & manual for you to follow along. Work on real examples and case study scenarios. Coffee breaks with beverages.

Discounts on all subsequent training from Aatralz

Course Outline

The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As we put it, to beat a hacker, you need to think like a hacker.

Introduction to Ethical Hacking

Lesson 01: Hackers and its Terminologies

Lesson 02: Types of Hackers

Lesson 03: Difference between Ethical Hacker & Hacker

Lesson 04: Threat vs Vulnerability vs Risk

Lesson 05: What is Penetration Testing?

Lesson 06: Why Penetration Testing?

Lesson 07: Penetration Testing Methodology

Lesson 08: Phases of Penetration Testing

Legalities & Ethics

Lesson 01:  Cyber Law

Lesson 02:  Legal Penalties

Lesson 03:  Case Studies

Basics of Networking

Lesson 01:  Introduction

Lesson 02: Network Terminologies

Lesson 03: IP Addresses

Lesson 04: Ports & Protocols

Lesson 05: Routing & Switches

Information Gathering, Foot-printing & Reconnaissance

Lesson 01:  What is Footprinting?

Lesson 02:  Footprinting Terminologies

Lesson 03: Real-World Information Intelligence Techniques

  • WHOIS Lookup
  • Information Gathering using tools and Search Engines
  • Mirroring Company websites
  • Google Hacking
  • Web Spidering using Burp Suite
  • Web Archive
  • Email Tracking
  • Traceroute
  • Social Engineering

Lesson 04: Additional Footprinting Tools

Lesson 05: Footprinting Countermeasures

Lesson 06: Footprinting Penetration Testing

Scanning & Enumeration

Lesson 01:   What is Scanning?

Lesson 02:  Types of Scanning

Lesson 03:  Network Scanning using Nmap& Hping3

Lesson 04: Scanning Techniques

  • TCP Connect/ Full Open Scan
  • Stealth Scan (Half Open Scan)
  • Xmas Scan
  • FIN Scan
  • Null Scan
  • IDLE Scan
  • UDP Scan

Lesson 05: Vulnerability Scanning using Nessus
Lesson 06: Additional Scanning Tools
Lesson 07: Scanning Countermeasures
Lesson 08: Scanning Pen Testing
Lesson 09: What is Enumeration?
Lesson 10: SNMP Enumeration
Lesson 11: Banner Grabbing(OS Fingerprinting)
Lesson 12: Enumeration Countermeasures
Lesson 13: Enumeration Pen Testing

Proxy Servers

Lesson 01: What are Proxy Servers?

Lesson 02: Types of Proxy Servers

Lesson 03: Why Attackers use Proxy Servers?

Lesson 04: Surface Web vs Deep Web

Lesson 05: TOR(The Onion Routing)

Lesson 06: Proxy Tools

Lesson 07: Online Proxy

Lesson 08: HTTP & SSH Tunneling

Lesson 09: IP Spoofing

System Hacking

Lesson 01: Password Cracking

Lesson 02: Password Complexity

Lesson 03: Password Cracking Techniques

Lesson 04: Types of Password Attacks

Lesson 05: Password Sniffing

Lesson 06: Brute Force Attack

Lesson 07: Dictionary Attack

Lesson 08: Hybrid Attack

Lesson 09: Syllable Attack

Lesson 10: Rule-Based Attack

Lesson 11: Manual Password Guessing

Lesson 12: Default Passwords

Lesson 13: Cain Abel

Lesson 14: LOphtCrack

Lesson 15: Ophcrack

Lesson 16: Password Cracking Tools

Lesson 17: Salting

Lesson 18: Password Cracking Countermeasures

Lesson 19: What is Privilege Escalation?

Lesson 20: Privilege Escalation Tools

Lesson 21: Keylogger

Lesson 22: Types of Key Loggers

Lesson 23: Hardware Keylogger

Lesson 24: Software Keylogger

Lesson 25: Spyware

Lesson 26: Types of Spywares

Lesson 27: Desktop Spyware

Lesson 28: Email & Internet Spyware

Lesson 29: GPS Spyware

Lesson 30: How to defend against Key Loggers & Spywares?

Lesson 31: Rootkits

Lesson 32: Steganography

Lesson 33: Steganalysis

Lesson 34: Covering Tracks

Lesson 35: System Hacking Penetration Testing

Virus Worms Trojans& Backdoors

Lesson 01: Introduction to Virus, Worms & Trojans

Lesson 02: Trojan Construction Kit

Lesson 03: Evading Anti-Virus Techniques

Lesson 04: Indication of Trojan & Virus Attack

Lesson 05: Difference between Virus & Worms

Lesson 06: Online Malware Testing

  • VirusTotal

Lesson 07: Countermeasures
Lesson 08: Penetration Testing

Social Engineering

Lesson 01: What is Social Engineering?

Lesson 02: Types of Social Engineering

  • Human-Based Social Engineering
  • Computer-Based Social Engineering
  • Mobile-Based Social Engineering

Lesson 03: Phishing IQ Test
Lesson 04: Countermeasures
Lesson 05: Penetration Testing

Network Attacks

Lesson 01: DOS & DDOS

Lesson 02: Sniffing Attacks

Lesson 03: Types of Sniffing Attacks

  • MAC Attacks
  • DHCP Attacks
  • DNS Poisoning
  • ARP Poisoning Attacks

Lesson 04: Man in Middle Attack
Lesson 05: Wireshark Tool Demonstration
Lesson 06: ARP Poisoning Attacks using Cain Abel
Lesson 07: Countermeasures
Lesson 08: Penetration Testing

Application Hacking

Lesson 01: Introduction to Web Applications

Lesson 02: Web Application Components

Lesson 03: How Web Applications Work?

Lesson 04: Web Application Architecture

Lesson 05: Web Application Vulnerabilities

  • Injection Flaws
  • Cross-Site Scripting (XSS) Attacks
  • Cross-Site Request Forgery (CSRF) Attack
  • Web Application Denial-of-Service (DoS) Attack
  • Buffer Overflow Attacks
  • Cookie/Session Poisoning
  • Session Fixation Attack
  • Insufficient Transport Layer Protection
  • Improper Error Handling
  • Insecure Cryptographic Storage
  • Broken Authentication and Session Management
  • Unvalidated Redirects and Forwards
Wireless Hacking

Lesson 01: Introduction to the Wireless Technologies

Lesson 02: Types of Authentication

Lesson 03: Different Types of Attacks

Lesson 04: Cracking WEP & WPA Encryption

Lesson 05: Wi-Fi Router Password Cracking

Lesson 06: Wireless Hacking Countermeasures

Lesson 07: Penetration Testing

Cloud Computing Hacking

Lesson 01: Cloud Computing Basics

Lesson 02: Cloud Computing Threats

Lesson 03: Clouds Model

Lesson 04: Virtualizations

Lesson 05: Cloud Security

Lesson 06: Cloud Penetration Testing

99%

Participants declare that they would recommend us to their friends

Go to training with your friends and get a discount on enrollment! With a group purchase of a minimum of 3 entries for the training you will pay 10% less.

Invite your friends:

Testimonials about Aatralz

Filled the knowledge gaps I had.

“ The CEH training was very useful as it was tailored to my needs and filled the knowledge gaps I had. It was delivered in a friendly professional manner. ”  

Verizon  - Manimegalai

Mohamed guided us through everything.

“Fantastic CEH training session. Mohamed guided us through everything we were unsure about, and assured us if we needed additional help he would be there for us.”  

Cisco   - Radhashri

Training went with more ease than I had imagined

“Mohamed was highly professional and well-structured, focused training allowed us to accomplish a lot. Mohamed made us all feel comfortable enough to ask questions throughout and was very patient and helpful when we were doing practical exercises. The CEH course was delivered with a light touch and was well broken up with exercises and short breaks. The day went by with more ease than I had imagined”  

Infosys - Latha

Full of important information

“I thoroughly enjoyed the classes for CEH certification. They were full of important information, interesting and moved at a good pace so my attention stayed focused. Mohamed communicated in a way that was easy to understand, provided answers to questions, clarified points and was entertaining. I would highly recommend the course.”  

- Cognizant - Ramesh Kumar

Trusted by people working at

Frequently asked questions.

Don’t know where to get started?

Are you interested in training your peers in your company ?

Reach us. We will gladly answer all your questions.

044 42343939 hello@aatralz.com