IMTS Training Institute (New)

thumbnail
Cybersecurity

EC-Council CEH and CHFI Blended Bundle

Instructor

TBD TBD

Reviews 0 (0 Reviews)

Course Overview

High-level description: The Certified Ethical Hacker (CEH) Master with Computer Hacking Forensic Investigator (CHFI) blended bundle is designed to equip IT professionals with advanced skills in ethical hacking and forensic investigation. This comprehensive training program combines theoretical knowledge with practical skills, ensuring participants are proficient in identifying vulnerabilities and conducting thorough investigations following security incidents. This bundle includes our ITI’s custom Self-paced Online ILT and labs, as well as an official EC-Council live Online ILT CEH course (as well as their self-paced course) and an official Self-paced Online ILT CHFI course.

Course Delivery:

  1. Official EC-Council CEH Master: Live Online ILT
  2. Contact us to schedule.
  3. Official EC-Council CEH Master: Self-paced Online ILT
  4. Official EC-Council CHFI: Self-paced Online ILT
  5. ITI Custom CEH: Self-paced Online ILT
  6. ITI Custom CHFI: Self-paced Online ILT

Duration:

  1. Official EC-Council CEH Master (live): 5 days
  2. Official EC-Council CEH (self-paced): 5 days
  3. Official EC-Council CHFI: 5 days
  4. ITI Custom CEH: ~ 7 days (70+ hours)
  5. ITI Custom CHFI: ~ 4 days (30+ hours)

Recommended Study Sequence: Begin with the Official CEH Master training then the ITI CEH training to understand the core concepts of ethical hacking. Follow this with the Official CHFI course and then the ITI CHFI training to gain expertise in forensic investigation techniques.

CTI Custom CEH Course Description: Our course offers CEH training to provide you the tools to research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this CEH online training course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed.

Topics Covered:

  1. Introduction to the key concepts of ethical hacking and information security.
  2. Conducting footprinting and reconnaissance using advanced tools and techniques.
  3. Scanning networks and identifying vulnerabilities.
  4. Performing system hacking and exploiting operating systems.
  5. Understanding malware threats and implementing countermeasures.
  6. Utilizing social engineering techniques and tools.
  7. Executing Denial-of-Service (DoS) and session hijacking attacks.
  8. Evading IDS, firewalls, and honeypots.
  9. Hacking web servers and applications.
  10. Performing SQL injection and securing databases.
  11. Hacking wireless networks and mobile platforms.
  12. Exploring IoT and OT hacking methodologies.
  13. Securing cloud environments and implementing cryptographic techniques.

Labs included (15 hours):

  1. Footprinting and Reconnaissance Techniques
  2. Network Reconnaissance Techniques
  3. Enumeration Reconnaissance Techniques
  4. Vulnerability Analysis Tools & Techniques
  5. System Hacking Methodologies
  6. Malware Threat Concepts
  7. Network Sniffing Techniques
  8. Social Engineering Exploits
  9. Denial of Service Attacks
  10. Session Hijacking Concepts
  11. Compromising Web Servers
  12. Web Application Hacking
  13. SQL Injection Methodologies
  14. Introduction to Cloud Computing
  15. Cryptography Techniques

CTI Custom CHFI Course Description: Our CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.

Topics Covered (18+ hours):

  1. Comprehensive understanding of computer forensics and the forensic investigation process.
  2. Techniques for searching and seizing digital evidence.
  3. Methods for analyzing and handling digital evidence.
  4. First responder procedures for incident management.
  5. Setup and operation of a forensic lab.
  6. Gain in-depth knowledge of hard disks, file systems, and Windows forensics.
  7. Data acquisition and duplication techniques.
  8. Recovering deleted files and partitions.
  9. Utilizing Access Data FTK and EnCase for forensic investigations.
  10. Understanding and applying steganography and password cracking techniques.
  11. Log correlation, network forensics, and analyzing wireless and web attacks.
  12. Investigating email crimes and conducting mobile investigations.
  13. Preparing investigative reports and serving as an expert witness.

Labs included (12+ hours):

  1. Understanding the Digital Forensics Profession and Investigations
  2. Data Acquisition
  3. Processing Crime and Incident Scenes
  4. Working with Windows and CLI Systems
  5. Current Digital Forensics Tools
  6. Linux and Macintosh File Systems
  7. Recovering Graphics Files
  8. Digital Forensics Analysis and Validation
  9. Virtual Machine Forensics, Live Acquisitions, and Network Forensics
  10. E-mail and Social Media Investigations
  11. Mobile Device Forensics
  12. Cloud Forensics
  13. Report Writing for High-Tech Investigations
  14. Expert Testimony in Digital Investigations
  15. Ethics for the Expert Witness

Official EC-Council CEH Master Course Description: Master ethical hacking with our CEH Master course, tailored for security professionals aiming to protect their organizations from cyber threats. This course includes 40 hours of content, delivered through engaging videos, quizzes, and hands-on labs. Participants will learn to think like hackers and use the same tools and techniques to identify and mitigate vulnerabilities.

Topics Covered (labs integrated):

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Evading IDS, Firewalls, and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT Hacking
  19. Cloud Computing
  20. Cryptography

Official EC-Council CHFI Course Description: Enhance your investigative skills with the CHFI course, which provides 30 hours of content focusing on digital forensics. This course covers the essentials of computer forensics, including the investigation process, tools, and techniques for analyzing digital evidence.

Topics Covered (labs integrated):

  1. Computer Forensics in Today’s World
  2. Computer Forensics Investigation Process
  3. Understanding Hard Disks and File Systems
  4. Data Acquisition and Duplication
  5. Defeating Anti-Forensics Techniques
  6. Operating System Forensics
  7. Network Forensics
  8. Investigating Web Attacks
  9. Database Forensics
  10. Cloud Forensics
  11. Malware Forensics
  12. Investigative Reports

Exam and exam pass guarantee information: All courses include an exam voucher and the CEH comes with a retake. Exams can be taken online through the EC-Council’s remote proctoring service or at authorized testing centers. If you don’t pass the CEH or CHFI exam, upon request you will be provided an additional 12 months of access to ITI’s custom CEH and CHFI training.

License Information: One license provides access to both official EC-Council CEH and CHFI, ITI’s CEH and CHFI courses and labs for 12 months. Access keys must be redeemed within 12 months of purchase.

How to Access: Instructions for accessing the courses will be emailed after purchase.

Link to brochure: https://www.eccouncil.org/wp-content/uploads/2022/09/CEH-brochure.pdf and https://www.eccouncil.org/wp-content/uploads/2023/03/CHFI-brochure.pdf

Original price was: $3,999.00.Current price is: $3,899.00.
  • Skill Intermediate
  • Last Update November 2, 2024