Sale!

Certified Ethical Hacker (CEH) v12

$1,724.50

  • eCourseware
  • Exam Voucher
  • Next Version eCourseware
  • Unlimited Exam Retakes (5 per year)
  • Ethical Hacking Video Courses (10)
  • 6 Months Official Labs
  • C|EH Engage
  • Global C|EH Challenge
  • Exam Preparation
  • C|EH Practical

In stock

-
+

Specs

SKU: C6S-CEHv12-2201 Categories: , Tags: , Availability:

In stock

Description

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

  • Information Security Overview
  • Hacking Methodologies and Frameworks
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Media
  • Footprinting Tools
  • Footprinting Countermeasures
  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures
  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management
  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • SQL Injection Countermeasures
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • IoT Hacking IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Attack Countermeasures
  • OT Hacking OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Attack Countermeasures
  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Threats
  • Cloud Hacking
  • Cloud Security
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attack Countermeasures

Mr. Tyrone E. Wilson is a passionate information security professional with 26 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.  

Wilson is also the organizer of The D.C. Cybersecurity Professionals. With over 9,400 members, it is the largest #Cybersecurity meetup group in the United States. In addition, Wilson is also on the Review Board of BSides NoVA, Howard University, and Hacker Halted and has presented and/or taught classes at many of the major tech conferences.

Tyrone E. Wilson

Founder & CEO

CEH Master, eJPT, CySA+, Sec+, Net+

  • A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
  • Learn | Certify | Engage | Compete
  • The C|EH® v12 is a specialized and one-of-a-kind training program to teach you everything you need to know about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and global hacking competition. Stay on top of the game with the most in-demand skills required to succeed in the field of cybersecurity.
  • iLearn (self-study) – This solution is an asynchronous, self-study environment in a video streaming format.
  • iWeek (live online) – This solution is a live, online, instructor-led training course.
  • Master Class – The opportunity to learn from world-class instructors and collaborate with top information security professionals.
  • Training Partner (in-person) – This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
  • To have an enjoyable hardware experience, we suggest the following:
    • Processor – 64-bit i5 or higher
    • RAM – 8 GB or higher
    • Memory – 40 GB or higher
    • Operating System – please use the OS you are comfortable with
  • This course begins Tuesday, October 4th, and ends Thursday, November 3rd. We will meet every Tuesday and Thursday from 6 pm to 9:30 pm EDT.
  • There will be a pre-exam review session on Saturday, November 5th from 9 am to 2 pm EDT.
  • Yes. The virtual sessions are recorded and will be available the next day on the website for easy access.
  • Yes, this course is tailored to the 20 primary exam objectives for the C|EH v12 exam.
  • Yes, but in a good way that will grow your skills. We recommend coming with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.
  • Yes. 16 CEUs are available for this course.
  • Yes. Additionally, all alumni receive a 20% discount after completion of their first Cover6 training.
  • As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.
  • Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.
  • Surveys will be sent out during and after the training for you to provide your questions, comments, and concerns.

Additional information

Instructor

Tyrone E. Wilson

Course Title

Certified Ethical Hacker (CEHv12)

Course Dates/Times

– TUE, OCT 4, 2022, 06:00 PM – 09:30 PM EDT
– THU, OCT 6, 2022, 06:00 PM – 09:30 PM EDT
– TUE, OCT 11, 2022, 06:00 PM – 09:30 PM EDT
– THU, OCT 13, 2022, 06:00 PM – 09:30 PM EDT
– TUE, OCT 18, 2022, 06:00 PM – 09:30 PM EDT
– THU, OCT 20, 2022, 06:00 PM – 09:30 PM EDT
– TUE, OCT 25, 2022, 06:00 PM – 09:30 PM EDT
– THU, OCT 27, 2022, 06:00 PM – 09:30 PM EDT
– TUE, NOV 1, 2022, 06:00 PM – 09:30 PM EDT
– THU, NOV 3, 2022, 06:00 PM – 09:30 PM EDT
– SAT, NOV 5, 2022, 09:00 AM – 02:00 PM EDT

Reviews

There are no reviews yet.

Be the first to review “Certified Ethical Hacker (CEH) v12”