The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it,
To beat a hacker, you need to think like a hacker
What is new in the CEH version 9 Course
Focus on New Attack Vectors
Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
New Vulnerabilities Are Addressed
CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
Emphasis on Mobile Platforms and Tablet Computers
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it,
To beat a hacker, you need to think like a hacker
What is new in the CEH version 9 Course
Focus on New Attack Vectors
Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
New Vulnerabilities Are Addressed
CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
Emphasis on Mobile Platforms and Tablet Computers
Covers wide-ranging countermeasures to combat cloud computing attacks
Provides a detailed pen testing methodology for cloud systems to identify threats in advance
Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
Shellshock CVE-2014-6271
Detailed coverage and labs in Module 18 Cryptography.
Heartbleed CVE-2014-0160
Labs on Hacking Mobile Platforms and Cloud Computing
Courseware covers Information Security Controls and Information Security Laws and Standards
Coverage of latest Trojan, Virus, Backdoors
Courseware covers latest mobile hacking tools in all the modules
CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
Poodle CVE-2014-3566
More than 1500 new/updated tools
CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)
Emphasis on Cloud Computing Technology
Case study in Module 18 Cryptography
Hacking Using Mobile Phone
Trinity Tower, TC 33/1402(11), Ground Floor, Chackai Bypass Road , Pettah Post Office Thiruvananthapuram - 695024, Kerala, India
Get DirectionsHave a requirement?
Chat with us
Have a requirement?
Chat with us