Self-paced

Certified Ethical Hacker (CEH) Version 11

This 3 Course online cyber security ethical hacking program is the first step in becoming an ethical hacker. You will learn advanced hacking concepts how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

 

With internship

$874

$1199

or

Without internship

$279

$599

this course includes

70 Training Hours

482 On-demand Videos

Closed Captions

100 Topics

100 Prep Questions

Certificate of Completion

SERIES INCLUDES:
15 COURSES

01

CEH v11 Advanced Ethical Hacker Course Intro

02

Session Hjacking

03

CEH v11 Defending Against Hijacking

04

CEH v11 Testing Firewallls

05

CEH v11 Implementing Honeypots

06

CEH v11 Attacker Webserver

07

CEH v11 Webserver Defense

08

CEH v11 Intro To Web Apps

09

CEH v11 OWASP Top 5 Web App Vulnerabilities

10

CEH v11 OWASP Additional Web App Vulnerabilities

11

CEH v11 Common Web App Attacks

12

CEH v11 Unauthorized Access Through Web Apps

13

CEH v11 Web App Overflow Attacks

14

CEH v11 Defending Web Apps

15

CEH v11 Defending Web Apps

Learn to be an Ethical Hacker

This is an exciting cyber security training series teaching students hacking techniques and types of attacks to become an ethical hacker. This Extensive CEH v11 Instructional Series Includes 3 Individual online courses covering current security domains and is the path to achieving your ethical hacking certification:

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)

course CURRICULUM

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Content

Module 61 - CEH v11 Advanced Ethical Hacker Course Intro
Module 62 - CEH v11 Session Hjacking
Module 63 - CEH v11 Defending Against Hijacking
Module 64 - CEH v11 Implementing Intrusion Detection
Module 65 - CEH v11 Testing Intrusion Detection
Module 66 - CEH v11 Implementing Firewalls
Module 67 - CEH v11 Testing Firewallls
Module 68 - CEH v11 Implementing Honeypots
Module 69 - CEH v11 Attacker Webserver
Module 70 - CEH v11 Webserver Defense
Module 71 - CEH v11 Intro To Web Apps
Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities
Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities
Module 74 - CEH v11 Common Web App Attacks
Module 75 - CEH v11 Unauthorized Access Through Web Apps
Module 76 - CEH v11 Web App Overflow Attacks
Module 77 - CEH v11 Defending Web Apps
Module 78 - CEH v11 Intro To SQL Injection
Module 79 - CEH v11 Performing SQL Injection
Module 80 - CEH v11 Defending Against SQL Injection
Module 81 - CEH v11 Wireless Networking Overview
Module 82 - CEH v11 Wi-Fi Security
Module 83 - CEH v11 Hacking Wi-Fi
Module 84 - CEH v11 Advanced Wireless Attacks
Module 85 - CEH v11 Defending Wireless Networks
Module 86 - CEH v11 Mobile Platform Overview
Module 87 - CEH v11 Hacking Android
Module 88 - CEH v11 Hacking iOS
Module 89 - CEH v11 Mobile Platform Defense
Module 90 - CEH v11 IoT Hacking
Module 91 - CEH v11 IoT Defense
Module 92 - CEH v11 Operational Technology Overview
Module 93 - CEH v11 Hacking OT
Module 94 - CEH v11 Defending OT
Module 95 - CEH v11 Attacking The Cloud
Module 96 - CEH v11 Cloud Defense
Module 97 - CEH v11 Cryptography Overview
Module 98 - CEH v11 Protecting Data With Crytography
Module 99 - CEH v11 Protecting Data at Home and in Transit
Module 100 - CEH v11 Pentesting Cryptography

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Content

Module 21 - CEH v11 Ethical Hacker Course Intro
Module 22 - CEH v11 Intro to Footprinting
Module 23 - CEH v11 Footprinting Network Services
Module 24 - CEH v11 Defend Against Footprinting
Module 25 - CEH v11 Intro to Scanning
Module 26 - CEH v11 Port Scanning
Module 27 - CEH v11 Vulnerability Scanning
Module 28 - CEH v11 NMAP
Module 29 - CEH v11 Firewalls and Intrusion Detection
Module 30 - CEH v11 Evading Detection
Module 31 - CEH v11 Proxies and VPNs
Module 32 - CEH v11 Accessing Vulnerability
Module 33 - CEH v11 Vulnerability Research
Module 34 - CEH v11 Intro to Enumeration
Module 35 - CEH v11 Service Enumeration
Module 36 - CEH v11 Advanced Enumeration
Module 37 - CEH v11 Command Line Enumeration
Module 38 - CEH v11 Defending Against Enumeration
Module 39 - CEH v11 Intro to System Hacking
Module 40 - CEH v11 System Hacking with Metasploit
Module 41 - CEH v11 Further Attacking a Compromised System
Module 42 - CEH v11 Hacking an Operating System
Module 43 - CEH v11 Password Cracking Overview
Module 44 - CEH v11 Performing Password Attacks
Module 45 - CEH v11 Using Exploits
Module 46 - CEH v11 Hiding Information
Module 47 - CEH v11 Covering Tracks
Module 48 - CEH v11 Malware Overview
Module 49 - CEH v11 Hacking With Malware
Module 50 - CEH v11 Creating Malware
Module 51 - CEH v11 Detecting Malware
Module 52 - CEH v11 Defending Against Malware
Module 53 - CEH v11 Sniffing
Module 54 - CEH v11 Spoofing and MITM
Module 55 - CEH v11 Defending Against Poisoning and Sniffing
Module 56 - CEH v11 Social Engineering
Module 57 - CEH v11 Defending Against Social Engineering
Module 58 - CEH v11 Denial-of-Service
Module 59 - CEH v11 Advanced DoS Attacks
Module 60 - CEH v11 Defending Against Denial-of-Service

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content

Module 1 - CEH v11 Foundations Course Introduction
Module 2 - CEH v11 Introduction To Networking
Module 3 - CEH v11 Lan Components
Module 4 - CEH v11 Routing and Network Access
Module 5 - CEH v11 Intrusion Detection and Network Layers
Module 6 - CEH v11 Networking Protocols and Addressing
Module 7 - CEH v11 Network Services
Module 8 - CEH v11 Access Control
Module 9 - CEH v11 Intro to Linux
Module 10 - CEH v11 Configuring Linux
Module 11 - CEH v11 Practicing Linux Configuration
Module 12 - CEH v11 Managing Linux
Module 13 - CEH v11 Practicing Linux Management
Module 14 - CEH v11 Intro to Windows
Module 15 - CEH v11 Windows Commands
Module 16 - CEH v11 Practicing Windows Commands
Module 17 - CEH v11 Intro to Hacking
Module 18 - CEH v11 Information Security
Module 19 - CEH v11 Protecting Data
Module 20 - CEH v11 Managing Risk

Why become a Cybersecurity Engineer?

Growing Demand for Cybersecurity Professionals

The field of cybersecurity is experiencing rapid growth, driven by the escalating number and complexity of cyber threats. Both public and private sectors are investing heavily in cybersecurity measures to protect sensitive information and secure critical infrastructure. This increased investment has created a substantial demand for cybersecurity professionals, and the job market is teeming with opportunities. By becoming a cybersecurity engineer, you position yourself at the forefront of a booming industry with a multitude of career prospects.

Lucrative Salaries and Career Advancement

Cybersecurity professionals are highly sought after, and as a result, they enjoy attractive salaries and excellent benefits. The specialized skills and expertise required in this field command a premium in the job market. Furthermore, as you gain experience and demonstrate your capabilities, the potential for career advancement becomes significant. Cybersecurity engineers can progress to leadership positions, such as Chief Information Security Officer (CISO), and take on strategic roles in shaping an organization's security posture.

Global Relevance and Job Security

Cybersecurity is a global concern affecting organizations of all sizes and industries worldwide. The need for cybersecurity professionals extends beyond borders, making it a globally relevant field. By becoming a cybersecurity engineer, you equip yourself with skills that are in demand not only locally but also internationally. Job security in the field of cybersecurity is robust, as the increasing threat landscape ensures a constant need for skilled professionals to protect against attacks and mitigate risks.

Continuous Learning and Growth

The field of UX/UI design is dynamic and ever-evolving. To stay competitive, designers need to keep learning and adapting to new technologies and design trends. This continuous learning keeps the work interesting and provides opportunities for personal and professional growth.

Opportunities for growth

As software testers gain experience and develop their skills, they can take on more challenging roles and responsibilities. This can lead to promotions and career advancement opportunities. Most Manual testers progress to QA automation, Software development, DevOps, or Cloud Engineering.

Our Talents Work Here
ti.webp
unicard_ltd_logo.jpeg
onecall.png
ibm.png
Fourth_new-logo-e1678350336847.png

Our talentstories

We connect learners with peers and experts from around the world, facilitating networking and collaboration opportunities.

IBT Training's DevOps course provided a comprehensive and insightful learning experience with valuable hands-on exercises. While the internship placement was beneficial, additional guidance could enhance the overall transition. Overall, IBT Training lays a solid foundation for entering the DevOps field.

Olaniyan Olatunde Kubernetes Admin, Microsoft

Enrolling in this course proved career-defining, offering invaluable knowledge and a guaranteed internship. It set me on a path to success, delivering everything promised—free certification, ongoing learning, and the ability to pass my sec+ on the first try.

Solomon Awuku Cybersecurity Analyst, Tek Computers

Upon completing the class, I felt confident and prepared to embark on a career in cybersecurity. The skills and knowledge I acquired have already proven invaluable, as I find myself better equipped to tackle real-world challenges and contribute to the protection of digital assets.

Raymond A. CYBERSECURITY ANALYST BLUE CROSS

"IBT Learning is an outstanding tech school, with experienced teachers. Graduates gain hands-on experience with management tools such as Git, Maven, Nexus, SonarQube, Ansible, Docker for microservices, Kubernetes for container orchestration, and Terraform for Infras as Code"

Landric N DevOps Engineer, Transportation Insight

Your Questions, Answered

What is the Certified Ethical Hacker (CEH) Version 11 course about?

The Certified Ethical Hacker (CEH) Version 11 course is an online cyber security ethical hacking program designed to teach students advanced hacking concepts. It provides instruction on how to select appropriate tools for a cybersecurity penetration test and understand why they work. This course features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

What is the cost of the Certified Ethical Hacker (CEH) Version 11 course?

The cost of the Certified Ethical Hacker (CEH) Version 11 course is see above pricing on page. Alternatively, you can get access to this training and over 2,500 hours of on-demand content with an All Access Monthly Subscription, with an affordable monthly payment per month after a 7-day free trial period​.

What does the Certified Ethical Hacker (CEH) Version 11 course include?

The Certified Ethical Hacker (CEH) Version 11 course includes 70 hours of training, 482 videos, 100 topics, and 100 practice questions.

Is there a newer version of this course available?

Yes, there is a newer version of this course available, which is the Certified Ethical Hacker Certification Training V12 course​.

What is ethical hacking?

Ethical hacking, also known as “white hat” hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hacking uses expertise to identify and fix vulnerabilities in the system​.