Certified Ethical Hacker (CEH) V9

Get Certified

Training Workshop

03rd - 06th December, 2017

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

Certified Ethical Hacker (CEH)

Course Outline

Duration: 4 DAYS
Certification: CEH - Certified Ethical Hacking

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: System Hacking
  • Module 06: Trojans and Backdoors
  • Module 07: Viruses and Worms
  • Module 08: Sniffers
  • Module 09: Social Engineering
  • Module 10: Denial of Service
  • Module 11: Session Hijacking
  • Module 12: Hijacking Webservers
  • Module 13: Hacking Web Applications
  • Module 14: SQL Injection
  • Module 15: Hacking Wireless Networks
  • Module 16: Evading IDS, Firewalls, and Honeypots
  • Module 17: Buffer Overflow
  • Module 18: Cryptography
  • Module 19: Penetration Testing

Our Expert Trainer

Sunder Singh Khari

Information Security Consultant

Koenig Solutions Ltd

Sunder Singh Khari, is a recognized information security professional, specialized in delivering all in-house and onsite training and seminars to different government and non-government organizations around the globe.

At present Iconic Trainer at Koenig, an offshore technical training and certifications company on all popular IT technologies available globally. Sunder leads the portfolio with providing support and Training to the corporate client and Internal Staff, Managing and Maintaining Security Datacenter for Training Delivery, Designing and Introducing Training on new Hacking and Security Technologies.

In his over a decade’s experience in the security field, Sunder has delivered diverse trainings to corporate clients, namely: Commercial Bank of Ethiopia, Trade and Development Bank of Mongolia, Central Bank Nigeria, Oman Police, Dubai Police, Qatar Gas Transport Company, Orange Business Services, Ernst & Young, HCL, DEL, KPMG, Accenture and much more.

Gaurav Pandya

Gaurav Pandya carries with him over 17 years of diversified training experience in different disciplines of Service Management, Security, Project Management and IT Governance. Gaurav had multi-vendor exposure with expertise on enterprise solutions from Oracle, Solaris, Microsoft, Citrix, Cisco, Nokia, Red Hat, HP and Other vendors.

Gaurav’s qualification in the security domain includes CEI, CEH, CCA, CCI, CCNA, CCSI, MCT, APS, ASE, AIS, SCSA, MCITP, RHCT, CLP, COBIT, CIW and much more.

Some of the partners were Gaurav has delivered trainings are Dubai Police, Dubai Chamber of Commerce, Abu Dhabi Finance Department, UAE university, Deloitte, Microsoft, Etisalat, Dubai Islamic Bank, RAK Bank, Al Futtaim, MidEast Data System, Emirates NBD Dubai and many.

Course Includes:

  • Official Courseware
  • Certificate of Attendance
  • Complimentary Pass to Fintech Security Summit
  • Lunch and refreshments during the training program and summit

Eligibility Criteria

The CEH, CHFI v9, and ECSA v9 programs all require proof of 2 years of information security experience as validated through the application process unless the candidate attends official training.