Certified Ethical Hacker
Are you ready to earn the most respected and well known technical security certification in the world? Join us for the Certified Ethical Hacker class and earn this life changing credential.
Get ready to engage in a training experience like none you’ve ever had before. We have the top instructors in the world, and they will not only act as your instructor, but also your mentor.
With our ground breaking Extended Cognitive Emersion Method, the classes are broken down into weekend sessions. Instead of the traditional 5 day back to back format, we extend the class into 6 days over three weekends.
The classes run all day from 9 to 5 on Saturdays and Sundays. In addition to the regular classes, there will be a couple of evening Skype sessions for any students who’d like to tune in and get additional help or walkthroughs of labs and topics covered on the previous weekend.
The extended time frame allows students to absorb the information in a much more complete way than traditional training methods. One of the most valuable features of this process is each students automatically gets an additional 5 hours of 1 on 1 time with their instructor!
This time can be used during the class run period, after the class, or even before the class begins. The hours don’t have to be consecutive, you can cash your time in as you see fit in 1 hour blocks, such as an hour this week, and hour next week, and 2 hours next month!
They are your hours and you can schedule them as you see fit with the instructor. Maybe the most useful part of the class is the all day capture the flag sessions that happen on the last Saturday of the class run period. This is the most popular part of the class. Below is the breakdown and syllabus of the entire class.
Book the Certified Ethical Hacker Course Now
KM Cyber Security offers a cutting-edge approach to Cyber Security training with the Certified Ethical Hacker (CEH v10). Below are the details regarding the course layout and basic overall activities. Click below to reserve a spot now!
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
5. System Hacking
6. Malware Threats
8. Social Engineering
10. Session Hijacking
11. Hacking Webservers
12. Hacking Web Applications
13. SQL Injection
14. Hacking Wireless Networks
15. Hacking Mobile Platforms
16. Evading IDS, Firewalls and Honeypots
17. Cloud Computing
1.Capture the Flag – Traditional Network Pentest
2. Capture the Flag – Web Application Pentest /w Cloud Services
3. Capture the Flag – Phishing Pentest
3. Combined CTF with reporting
KM Extended Emersion Badges Awarded
CEH Test Review
CEH Test Administered