Compass Technical Training in Quincy, Massachusetts1-617-481-9141 Compass Technical Training in Quincy,

Certified Ethical

Now Offering
Student Loans

✔ 1-617-481-9141

Call Now
For More Information!

Now Offering
Student Loans

✔ 1-617-481-9141

Call Now
For More Information!

Special Financing Available
Payments as low as $100 per month

Accelerate your career with our Certified Ethical Hacker Training

Our Certified Ethical Hacker Course is a trusted and respected ethical hacking training Program that will enhance your abilities and validate your expertise to employers.

This Course covers how to work with a variety of systems to find out where their weaknesses or vulnerabilities may be, and how you can identify and reinforce these gaps to prevent successful hacking attempts. Ethical hacking is where an IT professional uses the same hacking techniques as malicious hackers to protect and prevent a company's systems from falling into the hands of criminals.

At Compass Technical Training, we will teach you how to think like a hacker. You'll know what tools are needed for the job, how to use the tools properly, and how to conduct an ethical penetration test. By the end of this course you will be ready to thwart hackers and pass your certification testing with confidence!

Certified Ethical Hacker Training

Discover vulnerabilities before the bad guys do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black-hat hackers with attention-getting lectures and hands-on labs.

This course teaches you how to use the tools and techniques used by cybercriminals to perform a white-hat, ethical hack on your organization. You'll learn ethical hacking methodologies and gain hands-on hacking experience including reconnaissance, gaining access to systems, exploiting vulnerabilities and exfiltrating data.

You'll leave with the ability to quantitatively assess and measure threats to information assets - and discover where your organization is most vulnerable to hacking. This course prepares you to earn two in-demand certifications: EC-Council Certified Ethical Hacker (CEHv11) and CompTIA PenTest+.

Key Features of Certified Ethical Hacker Training:
About the course:
  • Official CEHv11 Curriculum
  • Instructor led training and coaching benefit
  • Quiet classroom environment
  • Exam voucher is included with course tuition
Prerequisites to obtain the CEHv11 certification:
  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based operating system
  • Firm grasp of the TCP/IP protocols

  • Note: registration for Certified Ethical Hacker Training must be completed at least 10 days prior to start date
Ethical Hacking Course Objectives

The Certified Ethical Hacker Training will cover a wide variety of topics including:

  • Introduction to Ethical Hacking
    • Information Security Overview
    • Information Security Threats and Attack Vectors
    • Hacking Concepts
    • Ethical Hacking Concepts
    • Information Security Controls
    • Penetration Testing Concepts
    • Information Security Laws and Standards
  • Footprinting and Reconnaissance
    • Footprinting Concepts
    • Footprinting through Search Engines
    • Footprinting through Web Services
    • Footprinting through Social Networking Sites
    • Website Footprinting
    • Email Footprinting
    • Competitive Intelligence
    • Whois Footprinting
    • DNS Footprinting
    • Network Footprinting
    • Footprinting through Social Engineering
    • Footprinting Tools
    • Countermeasures
    • Footprinting Pen Testing
  • Scanning Networks
    • Network Scanning Concepts
    • Scanning Tools
    • Scanning Techniques
    • Scanning Beyond IDS and Firewall
    • Banner Grabbing
    • Draw Network Diagrams
    • Scanning Pen Testing
  • Enumeration
    • Enumeration Concepts
    • NetBIOS Enumeration
    • SNMP Enumeration
    • LDAP Enumeration
    • NTP Enumeration
    • SMTP and DNS Enumeration
    • Other Enumeration Techniques
    • Enumeration Countermeasures
    • Enumeration Pen Testing
  • Vulnerability Analysis
    • Vulnerability Assessment Concepts
    • Vulnerability Assessment Solutions
    • Vulnerability Scoring Systems
    • Vulnerability Assessment Tools
    • Vulnerability Assessment Reports
  • System Hacking
    • System Hacking Concepts
    • Cracking Passwords
    • Escalating Privileges
    • Executing Applications
    • Hiding Files
    • Covering Tracks
    • Penetration Testing
  • Malware Threats
    • Malware Concepts
    • Trojan Concepts
    • Virus and Worm Concepts
    • Malware Analysis
    • Countermeasures
    • Anti-Malware Software
    • Malware Penetration Testing
  • Sniffing
    • Sniffing Concepts
    • Sniffing Technique: MAC Attacks
    • Sniffing Technique: DHCP Attacks
    • Sniffing Technique: ARP Poisoning
    • Sniffing Technique: Spoofing Attacks
    • Sniffing Technique: DNS Poisoning
    • Countermeasures
    • Sniffing Detection Techniques
    • Sniffing Pen Testing
  • Social Engineering
    • Social Engineering Concepts
    • Social Engineering Techniques
    • Insider Threats
    • Impersonation on Social Networking Sites
    • Identity Theft
    • Countermeasures
    • Social Engineering Pen Testing
  • Denial Of Service
    • DoS/DDoS Concepts
    • DoS/DDoS Attack Techniques
    • Botnets
    • DDoS Case Study
    • DoS/DDoS Attack Tools
    • Countermeasures
    • DoS/DDoS Protection Tools
    • DoS/DDoS Penetration Testing
  • Session Hacking
    • Session Hijacking Concepts
    • Application Level Session Hijacking
    • Network Level Session Hijacking
    • Session Hijacking Tools
    • Countermeasures
  • Evading IDS, Firewalls, and Honeypots
    • IDS, Firewall and Honeypot Concepts
    • IDS, Firewall and Honeypot Solutions
    • Evading IDS
    • Evading Firewalls
    • IDS/Firewall Evading Tools
    • Detecting Honeypots
    • IDS/Firewall Evasion Countermeasures
    • Penetration Testing
  • Hacking Web Servers
    • Web Server Concepts
    • Web Server Attacks
    • Web Server Attack Methodology
    • Web Server Attack Tools
    • Countermeasures
    • Patch Management
    • Web Server Security Tools
    • Web Server Pen Testing
  • Hacking Web Applications
    • Web App Concepts
    • Web App Threats
    • Hacking Methodology
    • Web App Hacking Tools
    • Countermeasures
    • Web App Security Testing Tools
    • Web App Pen Testing
  • SQL Injection
    • SQL Injection Concepts
    • Types of SQL Injection
    • SQL Injection Methodology
    • SQL Injection Tools
    • Evasion Techniques
    • Countermeasures
  • Hacking Wireless Networks
    • Wireless Concepts
    • Wireless Encryption
    • Wireless Threats
    • Wireless Hacking Methodology
    • Wireless Hacking Tools
    • Bluetooth Hacking
    • Countermeasures
    • Wireless Security Tools
    • Wireless Pen Testing
  • Hacking Mobile Platforms
    • Mobile Platform Attack Vectors
    • Hacking Android OS
    • Hacking iOS
    • Mobile Spyware
    • Mobile Device Management
    • Mobile Security Guidelines and Tools
    • Mobile Pen Testing
  • IOT Hacking
    • IoT Concepts
    • IoT Attacks
    • IoT Hacking Methodology
    • IoT Hacking Tools
    • Countermeasures
    • IoT Pen Testing
  • Cloud Computing
    • Cloud Computing Concepts
    • Cloud Computing Threats
    • Cloud Computing Attacks
    • Cloud Security
    • Cloud Security Tools
    • Cloud Penetration Testing
  • Cryptography
    • Cryptography Concepts
    • Encryption Algorithms
    • Cryptography Tools
    • Public Key Infrastructure (PKI)
    • Email Encryption
    • Disk Encryption
    • Cryptanalysis
    • Countermeasures

Request Course

Need more information before you make a decision? Use our contact form to request additional details about our courses!

Request Information about this course

Upcoming Schedule

↑ Top
Comodo Positive SSL Certified