Certified Ethical Hacker

We are pleased to offer our brand-new Certified Ethical Hacker training course as a virtual workshop. This completely online course will be offered over five days as a complete solution that will prepare you to take and pass the CEH v11 exam.

What We Offer:

  • 30 hours of intensive live instruction over five sessions taught by a CEH Master
  • Official CEH v11 courseware and labs
  • Exam voucher
  • Post-course full-day review session
  • Discord Q&A and disussion channel
  • Extended access to online resources
  • Our exam pass guarantee

Your Instructor:

Mr. Tyrone E. Wilson (CEH Master) is a passionate information security professional with 25 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. As a former cybersecurity analyst for the United States Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Aside from being a Sr. InfoSec Engineer at Equinix Wilson is also the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.

Course Outline:

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT & OT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography