Please read the FAQ before you call us

A Certified Ethical Hacker is a skilled professional with a global certification from EC-Council, who understands and knows how to look for weaknesses and vulnerabilities in target systems (firewall, server, network, software, mobile app, etc); and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Being accredited to the International Council of Electronic Commerce Consultants, popularly known as the EC Council, which is the owner and creator of the Certified Ethical Hacker or the CEH along with many cyber security credentials, it is one of the most sought after GLOBAL certification among security professionals all over the world. The CEH certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral point of view.

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

What's new in CEH v11?

With the CEH v11 we've taken all that the CEH already is and added more to it, to make it even better, more advanced, more detailed, and yet succinct.

Cloud: Container Technology, Docker, Kubernetes

Container Technology, Docker, Kubernetes Parrot Os: WifiPhisher, AnonSurf

WifiPhisher, AnonSurf Operation Technology: ICS, SCADA, PLC; HML based attacks, Side-Channel attacks

ICS, SCADA, PLC; HML based attacks, Side-Channel attacks WPA3: WP3 Encryption and cracking

WP3 Encryption and cracking Malware Reverse Engineering: Static and Dynamic Malware Analysis

Static and Dynamic Malware Analysis Emerging Attack Vectors: Fileless malware, targeted ransomware, Web API threats and Web Shell

Fileless malware, targeted ransomware, Web API threats and Web Shell Hacking Challenges On Steroids

Why Become A Certified Ethical Hacker (CEH)? The EC-Council Certified Ethical Hacker (CEH) course helps you to earn

Advanced Security

Skill-sets

in the worldwide information security domain. Course Syllabus » The CEH training & certification course is one of the

Most Trusted &

Popular

ethical hacking training program. Nowadays IT departments have made

CEH Certification

a compulsory qualification for security-related posts. CEH-certified professionals typically earn

Higher Salaries

than their non-certified colleagues. Jobs » Highlights of some of what sets CEH v11 apart from the rest:

Duration 40 hours - 2 classes per week Eligibility Basic Knowledge of Software, Database and Networking If you do not have the above knowledge, please complete our "INDUSTRY READY" Courses to be eligible -

Industry Ready C Programming

Industry Ready Data Structure

Industry Ready RDBMS Course Fees Class Room Training Rs.34,000/-

Inclusive of all taxes Online Training Rs.44,000/-Rs.34,000/-

Inclusive of all taxes

What You Will Get? 40 Hours

in-depth training by best faculties from cyber security industry Study Materials

and examination voucher CEH Certificate

of completetion after examination and alumni status

Introducing The Break-The-Code Challenge With CEH v11

24 incredible hacking challenges across 4 levels of complexity that cover 18 attack vectors, including the OWASP Top 10 as a part of our Gamification Platform are now included as part of CEH v11!

Course Benefits:

The certification is provided by EC-Council, one of leading certification authorities in the field of cyber security. The certificate is valid in India and abroad as well. This course introduces you to all the techniques and different kind of attacks as well as how to defend these attacks to make your website/network more secure. Compared to other courses in cyber security EC-Council’s CEH is a course which provides vast in-depth understanding of how things are happening with numerous labs and is mainly focused on practical knowledge rather than just being theoretical. To know more about the course please click www.eccouncil.org/programs/certified-ethical-hacker-ceh/ After completing this course, you will be able to successfully identify, stop and prevent latest cyber attacks.

Additional Benefits Included With CEH v11 Worth $1319

*For promo Terms and Conditions contact an Authorized Training Center/Re-seller/Distributor

**Discount – This represents the discount that will be provided from the list price on the EC-Council Store

***Offer valid from September 16 to October 31, 2020

Course Details This course is designed as per latest EC-Council’s CEH exam syllabus (CEH v11). The code for the CEH exam is 312-50 (ECC EXAM), 312-50 (VUE). It is a multiple choice examination at the end of the course. Course duration is 40 hours. Main focus will be on both theoretical and practical parts, with hands on experience of most of the attacks. Module 01: Introduction to Ethical Hacking 2 Hours - 7 Topics Information Security Overview (Day 1)

Information Security Threats and Attack Vectors (Day 1)

Hacking Concepts (Day 1)

Ethical Hacking Concepts (Day 1)

Information Security Controls (Day 1)

Penetration Testing Concepts (Day 1)

Information Security Laws and Standards (Day 1) Module 02: Footprinting and Reconnaissance 2 Hours - 14 Topics Footprinting Concepts (Day 2)

Footprinting through Search Engines (Day 2)

Footprinting through Web Services (Day 2)

Footprinting through Social Networking Sites (Day 2)

Website Footprinting (Day 2)

Email Footprinting (Day 2)

Competitive Intelligence (Day 2)

Whois Footprinting (Day 2)

DNS Footprinting (Day 2)

Network Footprinting (Day 2)

Footprinting Through Social Engineering (Day 2)

Footprinting Tools (Day 2)

Footprinting Countermeasures (Day 2)

Footprinting Penetration Testing (Day 2) Module 03: Scanning Networks 2 Hours - 7 Topics Network Scanning Concepts (Day 3)

Scanning Tools (Day 3)

Scanning Techniques (Day 3)

Scanning Beyond IDS and Firewall (Day 3)

Banner Grabbing (Day 3)

Draw Network Diagrams (Day 3)

Scanning Pen Testing (Day 3) Module 04: Enumeration 2 Hours - 8 Topics Enumeration Concepts (Day 4)

NetBIOS Enumeration (Day 4)

SANP Enumeration (Day 4)

LDP Enumeration (Day 4)

SMTP and DNS Enumeration (Day 4)

Other Enumeration Techniques (Day 4)

Enumeration Countermeasures (Day 4)

Enumeration Pen Testing (Day 4) Module 05: Vulnerability Analysis 2 Hours - 5 Topics Vulnerability Assessment Concepts (Day 5)

Vulnerability Assessment Solutions (Day 5)

Vulnerability Scoring Systems (Day 5)

Vulnerability Assessment Tools (Day 5)

Vulnerability Assessment Reports (Day 5) Module 06: System Hacking 2 Hours - 7 Topics System Hacking Concepts (Day 6)

Cracking Passwords (Day 6)

Escalating Privileges (Day 6)

Executing Applications (Day 6)

Hiding Files (Day 6)

Covering Tracks (Day 6)

Penetration Testing (Day 6) Module 07: Malware Threats 2 Hours - 7 Topics Malware Concepts (Day 7)

Trojan Concepts (Day 7)

Virus and Worm Concepts (Day 7)

Malware Analysis (Day 7)

Countermeasures (Day 7)

Anti-Malware Software (Day 7)

Malware Penetration testing (Day 7) Module 08: Sniffing 2 Hours - 10 Topics Sniffing Concepts (Day 8)

Sniffing Technique: MAC Attacks (Day 8)

Sniffing Technique: DHCP Attacks (Day 8)

Sniffing Technique: ARP Poisoning (Day 8)

Sniffing Technique: Spoofing Attacks (Day 8)

Sniffing Technique: DNS Poisoning (Day 8)

Sniffing Tools (Day 8)

Countermeasures (Day 8)

Sniffing Detection Techniques (Day 8)

Sniffing Pen Testing (Day 8) Module 09: Social Engineering 2 Hours - 7 Topics Social Engineering Concepts (Day 9)

Social Engineering Techniques (Day 9)

Insider Threats (Day 9)

Impersonation on Social Networking Sites (Day 9)

Identity Theft (Day 9)

Countermeasures (Day 9)

Social Engineering Pen Testing (Day 9) Module 10: Denial-of-Service 2 Hours - 8 Topics DoS/DDos Concepts (Day 10)

DoS/DDos Attack Techniques (Day 10)

Botnets (Day 10)

DDoS Case Study (Day 10)

DoS/DDos Attack Tools (Day 10)

Countermeasures (Day 10)

DoS/DDos Protection Tools (Day 10)

DoS/DDos Penetration Testing (Day 10) Module 11: Session Hijacking 2 Hours - 6 Topics Session Hijacking Concepts (Day 11)

Application Level Session Hijacking (Day 11)

Network Level Session Hijacking (Day 11)

Session Hijacking Tools (Day 11)

Countermeasures (Day 11)

Penetration Testing (Day 11) Module 12: Evading IDS, Firewalls, and Honeypots 2 Hours - 8 Topics IDS, Firewall and Honeypot Concepts (Day 12)

IDS, Firewall and Honeypot Solutions (Day 12)

Evading IDS (Day 12)

Evading Firewalls (Day 12)

IDS/Firewall Evading Tools (Day 12)

Detecting Honeypots (Day 12)

IDS/Firewall Evasion Countermeasures (Day 12)

Penetration Testing (Day 12) Module 13: Hacking Web Servers 2 Hours - 8 Topics Web Server Concepts (Day 13)

Web Server Attacks (Day 13)

Web Server Attacks Methodology (Day 13)

Web Server Attack Tools (Day 13)

Countermeasures (Day 13)

Patch Management (Day 13)

Web Server Security Tools (Day 13)

Web Server Pen Testing (Day 13) Module 14: Hacking Web Applications 2 Hours - 7 Topics Web App Concepts (Day 14)

Web App Threats (Day 14)

Hacking Methodology (Day 14)

Web App Hacking Tools (Day 14)

Countermeasures (Day 14)

Web App Security Testing Tools (Day 14)

Web App Pen Testing (Day 14) Module 15: SQL Injection 2 Hours - 6 Topics SQL Injection Concepts (Day 15)

Types of SQL Injection (Day 15)

SQL Injection Methodology (Day 15)

SQL Injection Tools (Day 15)

Evasion Techniques (Day 15)

Countermeasures (Day 15) Module 16: Hacking Wireless Networks 2 Hours - 9 Topics Wireless Concepts (Day 16)

Wireless Encryption (Day 16)

Wireless Threats (Day 16)

Wireless Hacking Methodology (Day 16)

Wireless Hacking Tools (Day 16)

Bluetooth Hacking (Day 16)

Countermeasures (Day 16)

Wireless Security Tools (Day 16)

Wireless Pen Testing (Day 16) Module 17: Hacking Mobile Platforms 2 Hours - 7 Topics Mobile Platform Attack Vectors (Day 17)

Hacking Android OS (Day 17)

Hacking iOS (Day 17)

Mobile Spyware (Day 17)

Mobile Device Management (Day 17)

Mobile Security Guidelines and Tools (Day 17)

Mobile Pen Testing (Day 17) Module 18: IoT Hacking 2 Hours - 6 Topics IoT Concepts (Day 18)

IoT Attacks (Day 18)

IoT Hacking Methodology (Day 18)

IoT Hacking Tools (Day 18)

Countermeasures (Day 18)

IoT Pen Testing (Day 18) Module 19: Cloud Computing 2 Hours - 6 Topics Cloud Computing Concepts (Day 19)

Cloud Computing Threats (Day 19)

Cloud Computing Attacks (Day 19)

Cloud Security (Day 19)

Cloud Security Tools (Day 19)

Cloud Penetration Testing (Day 19) Module 20: Cryptography 2 Hours - 8 Topics Cryptography Concepts (Day 20)

Encryption Algorithms (Day 20)

Cryptography Tools (Day 20)

Public Key Infrastructure (PKI) (Day 20)

Email Encryption (Day 20)

Disk Encryption (Day 20)

Cryptanalysis (Day 20)

Countermeasures (Day 20) Hacking Tutorials Read All Tutorials » Building a career in Digital Forensics - How promising is the future? A thorough career guide Read Details » Hacking Videos Explore All Videos » How to Hiding Your Secret File using Steganography? View On Youtube » Get In Touch 1800 123 500 035 Submit Related Course CEH Master

(CEH Exam + CEH Practical Exam) Course Fees Rs.19,400/-

Inclusive of all taxes Enroll Now »

CEH Exams Prove Your Skills and Abilities With Online, Practical Examinations. Certified Ethical Hacker (CEH) Certification The CEH exam is a 4-hour exam with 125 multiple choice questions. This knowledge based exam will text your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more! Pay & Book Your Seat » CEH Practical Certification Port scanning tools (e.g., Nmap, Hping)

Vulnerability detection

Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)

SQL injection methodology and evasion techniques

Web application security tools (e.g., Acunetix WVS)

SQL injection detection tools (e.g., IBM Security AppScan)

Communication protocols

Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery, proxy chaining, IP spoofing)

Cryptography

Cryptography toolkit (e.g., OpenSSL)

Web server attack methodology

Operating environments (e.g., Linux, Windows, Mac)

Web application hacking methodology

Encryption algorithms

System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)

Vulnerability scanning

Exploitation tools

Application/file server

Database structures

Wireless and Bluetooth hacking methodology

Wireless terminologies

Wireless encryption

Network/wireless sniffers (e.g., Wireshark, Airsnort)

Malware (e.g., Trojan, virus, backdoor, worms)

Botnet

Malware analysis

Network sniffing

Backups and archiving (e.g., local, network)

Data analysis

Log analysis tools

Cryptanalysis tool (e.g., CrypTool) This is the next step to become a CEH Master after you have achieved your CEH certification. Within CEH Practical you will have a limited amount of time to complete 20 challenges testing your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VM’s and applications with solutions to uncover vulnerabilities. CEH (Practical) » CEH Master Upon Completing the CEH (Master) program, consisting of CEH and CEH (Practical), the CEH (Master) designation is awarded. Once you have achieved both the CEH and CEH Practical certifications you are now a CEH Master. CEH Masters have shown proficiency at a master level in the Knowledge, Skills, and abilities of Ethical Hacking with a total 6 hours of testing to prove their competency. CEH (Master) »

Know Your Faculty Mr. Sandeep Sengupta CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer 21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc. He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East. Mr. Kirit Sankar Gupta B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata). Mr. Sanchayan Bhaumik ME (Jadavpur University), MCA (WBUT), CEH, CHFI, CEI With 7 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities. He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML. Mr. Saumitra Biswas M Tech - Computer Science, MSc (Statistics), GATE qualified Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees. Ms. Amrita Acharya M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI) After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as secuity analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time. Mr. Subhendu Bhadra ECSA, CEH, CCNA, Android Pentesting, Reverse Engineering A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python. Mr. Anubhav Khettry Certificate EC-Council Instructor(CEIv2), CEH, CHFI Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty. Mr. Avirup Ukil CEH, CHFI Information Security Analyst & Faculty. His research domain is python (Network programming and hacking toolkits), privilege escalation attack & mitigation, advance penetration testing. Mr. Sagar Neogi MCA, CEH Sagar Neogi is a Certified Ethical Hacker (CEH). His area of interest is Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing. He is proficient in network design & hardening. He has a passion for teaching & likes to guide students to apply cyber security knowledge in the real-life scenario. He is currently a part of ISOEH as a faculty member & research analyst. Mr. Somdeb Chakraborty CEH, CCNA, Android Development Somdeb Chakraborty is a Certified Ethical Hacker (CEH), whose expertise lies in penetration testing. His areas of interest are Networking, Python, Vulnerability Assessment and Penetration Testing. He is also CCNA Global Certified (CISCO ID# CSCO13549504). Previously he worked as a software and web development trainer at The EDGE College in tie up with Vinayaka mission Sikkim University. He is working as an Information Security Analyst in the Indian School of Ethical Hacking. Mr. Md. Imamul Haque MCA, JAVA Developer, ANDROID App Developer Experienced Software Developer and Trainer working as Corporate Android Trainer at ISOEH as well as developing Mobile apps for clients and helping students in their final year projects & internships. Have experience in Client-Server based and Enterprise application development in Android. He had earlier worked as a Software Developer at Oaasa Technologies.< > <

Ratings & Reviews CEH v10.0 5.0

Course Rating

Based On

1749 Students Rating Nitish Tewari Date: 25.10.2019

Course: CEH v10 One of the finest institutes for industrial training in Kolkata. Got an opportunity to learn Ethical Hacking from amazing teachers. Special thanks to Mr. Samyajit Mukherjee (Business Development Executive) for introducing and guiding me through this course. Soumyajit Sarkar Date: 22.10.2019

Course: CEH v10 One of the best institutions for learning ethical hacking in west bengal Saumyajit nody mukharjee a very helpful person, helps during the time of admission and during many times. Ankur Barick (Student of WBUT)

Date: 19.07.2019

Course: CEH v10 Trainers are very friendly and co-operative. Environment is healthy and the course is project based so it is very interesting to learn Topics covered are relevant to our works. > <

Job Prospects & Job Sources The CEH v11 course opens up numerous career advancement opportunities, it helps to prepare you for different roles in infosec domain like computer network defence analyst, infrastructure support, infosec incident responder, infosec auditor, intrusion analyst, security manager, and other related high-profile roles. The following are the career prospects of CEH enumerated. Cyber security is a blooming field Cyber security is a blooming field with excellent potential in the IT market, and is a very important aspect of any company. The rising demands for cyber security The demands for cyber security is rising exponentially both in Indian market as well as abroad. United States faced a shortfall of cyber security professionals According to Cyber Seek, an initiative funded by the National Initiative for Cyber Security Education (NICE), the United States faced a shortfall of almost 314,000 cyber security professionals as of January 2019. Same can be said for India as well. Course designed for cybercrime department or any Government organization This course is not only for IT sector but also for professionals who are in the cybercrime department or any Government organization dealing with cybercrimes, espionage or cyber security as a whole. According to NASSCOM India requires 77,000 ethical hackers As according to a study by NASSCOM India requires 77,000 ethical hackers every year out of which the job market can only provide 15000. The demand being way more than the supply Ethical Hacking is one of the most sought after and promising professions at the moment. Apply Now » Average earning of a Certified Ethical Hacker Financially also this profession is paying and secure enough. In India on an average a certified ethical hacker earns an average salary of Rs 367,249 per year which increases with experience cumulatively upto more than 15 lakh per year. Designation Salary in Rs. Security Analyst 3.7 lakhs Information Security Analyst 4.3 lakhs Certified Ethical Hacker (CEH) 3.5 lakhs Security Consultant (Computing / Networking / Information Technology) 5.5 lakhs Information Security Manager 12 lakhs Experience Salary in Rs. Less than 1 year 3 lakhs 1-4 years 3.8 lakhs 5-9 years 7.7 lakhs 10-19 years 5.5 lakhs 20 years and more 14.4 lakhs Employers Salary in Rs. Tata Consultancy Services Limited 1.5 to 9 lakhs Wipro Technologies Limited 2.5 to 14.5 lakhs International Business Machines (IBM) Corp. 3 to 6 lakhs EY (Ernst & Young) 2.4 to 6 lakhs HCL Technologies Ltd. 2 to 7 lakhs

FAQs What is the course content? The CEH course is the fundamental curriculum on cyber security. It is designed as per latest EC-Council’s CEH exam syllabus (CEH v11). The main focus is on both theoretical and practical parts, with hands on experience of most of the attacks. What is the course Duration? 40 hours What is the course Methodology? The main focus of this course will be on both theoretical and practical parts, with hands on experience of most of the attacks, depending upon the particular student. What is the course Prerequisites? Complete 12th board exam and basic networking knowledge or CCNA. What is the career path after doing this course? After the course you are eligible to apply in the cyber security domain of any corporate house. What is the next step after CEH? After the course you can enroll yourself for customized advanced courses like NPT1, WAPT1, NPT2 and WAPT2 from ISOEH after fulfilling its prerequisites.

Enroll Now Fields marked with * are mandatory. First Name: * Last Name: * Mobile: * Email ID: * Date Of Birth: * Highest Educational Qualification: * Current City: * Home Town: * (If student) Name Of the School / College currently studying: (If employed) Name Of The Organization presently working: Course Applied For: * Previous knowledge in IT: * Tentative day from when you wish to start the class: * From where did you hear about ISOEH? Workshop Seminar Newspaper Internet Facebook Others Enquiry: * Put the Security Code: * Submit Course Fees Rs.44,000/-Rs.34,000/-

Inclusive of all taxes Batches Weekday Batches: Weekend Batches: Pay Now