Simplilearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. This ethical hacking course is aligned with the latest CEH v11 by EC-Council and will adequately prepare you to increase your blue team skills.

  • About this course

    Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

  • Why should you take this course?

    The CEH is recognized globally as the most advanced certified ethical hacking course in the market. The course covers attack technologies, commonly used by hackers and teaches you exactly how to act in fighting back on these attacks.

    By passing this exam and gaining this certification you prove you’re skilled in understanding how to look for weaknesses and vulnerabilities in target systems. It shows you’ve got the same knowledge and tools as a malicious hacker, but you can use them in a lawful and legitimate manner.

  • What will you learn by taking this course?

    This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base of hacking knowledge that can be leveraged to progress into more advanced security certifications or open up new career roles. 


  • Chaptar 1.INTRODUCTION TO ETHICAL HACKING

    ✅Overview of Current Security Trends

    ✅Understanding Elements of Information Security

    ✅Understanding Information Security Threats and Attack Vectors

    ✅Overview of hacking concepts, types, and phases

    ✅Understanding ethical hacking concepts and scope

    ✅Overview of information security management and defense-in-depth

    ✅Overview of policies, procedures, and awareness

    ✅Overview of physical security and controls

    ✅Understanding incidence management process

    ✅Overview of vulnerability assessment and penetration testing

    ✅Overview of information security acts and laws

     

     

     

  • Chaptar 2.FOOTPRINTING AND RECONNAISSANCE

     ✅ Understanding footprinting concepts

     ✅ Footprinting through search engines

     ✅ Footprint using advance google hacking techniques

     ✅ Footprint through social networking sites

     ✅ Understanding different techniques for website footprinting

     ✅ Understanding different techniques for email footprinting

     ✅ Overview of footprinting Pen Testing

     ✅Understanding different techniques of competitive intelligence

     ✅Understanding different techniques for WHO IS footprinting

     ✅Understanding different techniques for network footprinting

    ✅Understanding different techniques of footprinting through social engineering

     ✅Footprinting tools

     ✅Footprinting countermeasures

     

     

     

  • Chaptar 3.SCANNING NETWORKS

    ✅Overview of networking scanning

    ✅Understanding different techniques to check for Live Systems

    ✅Understanding different techniques to check for Open Ports

    ✅Understanding various scanning techniques

    ✅Understanding various IDS Evasion Techniques

    ✅Overview of scanning and Pen Testing

    ✅Understanding banner grabbing

    ✅Overview of Vulnerability scanning

    ✅Drawing network diagrams

    ✅Using Proxies and Anonymizer for attack

    ✅Understanding IP Spoofing and various detection techniques

     

     

     

  • Chaptar 4. ENUMERATION

    ✅Understanding Enumeration Concepts

    ✅Understanding different techniques for NetBIOS Enumeration

    ✅Understanding different techniques for SNMP enumeration

    ✅Understanding different techniques for LDAP enumeration

    ✅Understanding different techniques for NTP enumeration

    ✅Understanding different techniques for SMTP and DNS enumeration countermeasures

    ✅Overview of enumeration pen testing

     

     

     

  • Chaptar5. VULNERABILITY ANALYSIS

    ✅Vulnerability of the management life cycle

    ✅Understanding various approaches to vulnerability analysis

    ✅Tools used to perform the vulnerability assessments

    ✅Vulnerability analysis tools and technique

     

     

  • Chaptar 6. SYSTEM HACKING

    ✅Overview of CEH Hacking Methodology

    ✅Understanding different techniques to gain access to the system

    ✅Understanding privilege escalation techniques

    ✅Understanding different techniques to create and maintain remote access to the system

     

    ✅Overview of different types of Rootkits

    ✅Overview of Steganograpy and Steganalysis

    ✅Ungderstanding techniques to hide the evidence of compromise

    ✅Overview of system hacking penetration testin

     

     

  • Chaptar 7. MALWARE THREATS

    ✅Introduction to malware and malware propagation techniques

    ✅Overview of Trojans, their types, and how to infect systems

    ✅Overview of viruses, their types, and how they infect files

    ✅Introduction to computer worm

    ✅Understanding the Malware Analysis Process

    ✅Understanding different techniques to detect malware

    ✅Malware countermeasures

    ✅Overview of Malware penetration testing

     

     

  • Chaptar 8:.SNIFFING

    ✅Overview of sniffing concepts

    ✅Understanding MAC attacks

    ✅Understanding DHCP attacks

    ✅Understanding ARP Poisoning

    ✅Understanding MAC Spoofing attacks

    ✅Understanding DNS poisoning

    ✅Sniffing tools

    ✅Sniffing countermeasures

    ✅Understanding various techniques to detect sniffing

    ✅Overview of sniffing Pen Testing

     

     

  • Chaptar 9.SOCIAL ENGINEERING

    ✅Overview of social engineering

    ✅Understanding various social engineering techniques

    ✅Understanding insider threats

    ✅Understanding impersonation on social networking sites

    ✅Understanding identity theft

    ✅Social engineering countermeasures

    ✅Identify theft countermeasures

    ✅Overview of Social Engineering Pen Testing

     

  • Chaptar 10: DENIAL-OF-SERVICE

    ✅Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks

    ✅Overview different DoS/DDoS) attack techniques

    ✅Understanding the botnet network

    ✅Understanding various DoS and DDoS Attack Tools

    ✅DoS/DDoS Countermeasures

    ✅Overview of DoS Attack Penetration Testing

     

     

  • Chaptar 11. SESSION HIJACKING

    ✅Understanding session hijacking concepts

    ✅Understanding application level session hijacking

    ✅Understanding network level session hijacking

    ✅Session hijacking tools

    ✅Session hijacking countermeasures

    ✅Overview of session hijacking penetration testing

     

     

  • Chaptar 12. EVADING IDS, FIREWALLS, AND HONEYPOTS

    ✅Understanding IDS, Firewall, and honeypot concepts

    ✅IDS, Firewall and honeypot solutions

    ✅Understanding different techniques to bypass IDS

    ✅Understanding different techniques to bypass firewalls

    ✅IDS/Firewall evading tools

    ✅Understanding different techniques to detect honeypots

    ✅IDS/Firewall evasion countermeasures

    ✅Overview of IDS and firewall Penetration Testing

     

     

  • Chaptar 13. HACKING WEB SERVERS

    ✅Understanding webserver concepts

    ✅Understanding webserver attacks

    ✅Understanding webserver attack methodology

    ✅Webserver attack tools

    ✅Countermeasures against webserver attacks

    ✅Overview of Patch Management

    ✅Webserver security tools

    ✅Overview of Webserver penetration testing

     

     

  • Chaptar 14. HACKING WEB APPLICATIONS

    ✅Understanding web application concepts

    ✅Understanding web application threats

    ✅Understanding web application hacking methodology

    ✅Web application hacking tools

    ✅Understanding web application countermeasures

    ✅Web application security tools

    ✅Overview of web application penetration testing

     

     

     

  • Chaptar 15. SQL INJECTION

    ✅Understanding SQL injection concepts

    ✅Understanding various types of SQL injection attacks

    ✅Understanding SQL injection methodology

    ✅SQL injection tools

    ✅Understanding different IDS evasion techniques

    ✅SQL injection countermeasures

    ✅SQL injection detection tools

     

     

  • Chaptar 16.HACKING WIRELESS NETWORKS

    ✅Understanding wireless concepts

    ✅Understanding wireless encryption algorithms

    ✅Understanding wireless threats

    ✅Understanding wireless hacking methodology

    ✅Wireless hacking tools

    ✅Understanding Bluetooth hacking techniques

    ✅Understanding wireless hacking countermeasures

    ✅Wireless security tools

    ✅Overview of wireless penetration testing

     

     

     

  • Chaptar 17: HACKING MOBILE PLATFORMS

    Understanding mobile attack platform vectors

    ✅Understanding various android threat and attacks

    ✅Understanding various iOS threats and attacks

    ✅Understanding various Windows Phone OS threats and attacks

     

    ✅Understanding various blackberry threats and attacks

    ✅Understanding mobile device management (MDM)

    ✅Mobile Security Guidelines and security tools

    ✅Overview of Mobile Penetration Testing

     

     

     

  • Chaptar 18 : IOT HACKING

    ✅Understanding IoT concepts

    ✅Cryptography tools

    ✅Understanding various IoT threats and attacks

    ✅Understanding IoT Hacking

    ✅Understanding IoT attacks

    ✅IoT security Tools

     

     

  • Chaptar 19. CLOUD COMPUTING

    ✅Understanding Cloud Computing Concepts

    ✅Understanding Cloud Computing Threats

    ✅Understanding Cloud Computing Attacks

    ✅Understanding Cloud Computing Security

    ✅Cloud computing Security tools

    ✅Overview of Cloud Penetration testing

     

     

  • Chaptar 20: CRYPTOGRAPHY

    ✅Understanding Cryptography concepts

    ✅Overview of encryption algorithms

    ✅Cryptography tools

    ✅Understanding Public Key Infrastructure (PKI)

    ✅Understanding email encryption

    ✅Understanding disk encryption

    ✅Understanding Cryptography attacks

    ✅Cryptanalysis Tool

     


  • Key Features:
  • Created by a Security expert :
  • Access period : 12 months
  • Course duration : 40+ hours
  • Quizzes & revision exams :
  • Certificate of completion :
  • Support : 24/7 hours
Feature Picture

Enroll now to get details on Plans & Pricing

Earn Your CEH Certificate !

  •   Exam Pass Guarantee (live online)
  •   100% Satisfaction Guarantee
  •   CEH exam voucher Networks
  •   Unlimited CEH practice exam attempts
  •   Five days live, expert ethical hacking instruction (live online) Hijacking
  •   Immediate access to Aspire portal for practice exam IDS
  •   90-day access to all boot camp video and materials Web Servers
  •   Knowledge Transfer Guarantee Web Applications

Authorized training partner

Aspire is an authorized training partner of EC-Council. The EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+ are two of the most in-demand hacking certifications. Infosec instructors found around 80% of the material overlaps and students get the best value by training for both certifications at the same time.

Highlights of some of what sets CEH v11 apart from the rest

Mapped to NICE 2.0 - some dummy text

Emerging Attack Vectors

Modern Exploit Tools

Live Cyber Range (No Simulations)

Hands-on Hacking Challanges

Modern Case Studies and Current Events

Enhanced Focus on Malware Analysis

Thousands of Hacking Techniques, Tricks and Tools

Salary Indicator

SALARY PROJECTION

Average

salary after

completing

ADVANCED Training

$180k

You can earn an average of $180,000.00 a year

Why learn with us?

       
  • We're tech career experts
  •    
  • 25,000+ students worldwide
  •    
  • Alternative to traditional university education
  •    
  • Start a new career or advance your current one & land your dream job
       
  • Award winning StudentCareTM
  •    
  • Most in-demand skills for job market
  •    
  • Partnered with biggest accreditors in the world
  •    
  • Exclusive student benefits; CV detox, NUS, industry events & loads more
IT-Parofessional Image
Threat Hunting using Wireshark
Programs : Online Live Class
Location : Live Online / Hi-TechPark
Cost : $550
Date : 1st May, 2021 – 30th May, 2021
Threat Hunting using Wireshark
Programs : Online Live Class
Location : Live Online / Hi-TechPark
Cost : $550
Date : 1st Jun, 2021 – 30th Jun, 2021
Threat Hunting using Wireshark
Programs : Online Live Class
Location : Live Online / Hi-TechPark
Cost : $550
Date : 1st Aug, 2021 – 30th Aug, 2021
Threat Hunting using Wireshark
Programs : Online Live Class
Location : Live Online / Hi-TechPark
Cost : $550
Date : 13th Jun, 2021 – 14th Jul, 2021

Find Your Boot Camp



Boost Engagement with delivering Communication Tools

Bootcamp Image

Increase employee engagement with a different suite of communication tools like:

Posters

Promote your training program with visuals you can customize to brand... more  

Newsletters

Send training updates and security best practice highlights directly... more  

Digital wallpapers and web banners

Increase program engagement with colorful thought-provoking messaging... more  

Training Videos/Animations

Strengthen key awareness concepts and skills through stylish visual... more  

ATTAINING THE CEH CREDENTIAL


Course Fee: 45000 TAKA Only

Course name: CEH (Certified Ethical Hacking)

Location: Live Online/ Hi-Tech Park

Start date : May 2021

End Date : May 2021

Duration : 40 hours

ABOUT THE EXAM


Number of Questions: 125

Test Duration: 4 Hours

Test Format: Multiple Choice

Test Delivery: ECC EXAM, VUE

Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Why Aspire Tech


Award-winning courses

Aspire's award-winning online course and programs are designed and taught by distinguished Cyber Security expert.

The perfect fit for business

Plans for small to large organizations, with flexibility to fit inside your budget. Volume discounting available.

Cost effective training

Train thousands of staff members across multiple locations for a function of the cost of traditional classroom training.

Speak with an expert