Course Overview
High-level description: The Certified Ethical Hacker (CEH) Master with Computer Hacking Forensic Investigator (CHFI) blended bundle is designed to equip IT professionals with advanced skills in ethical hacking and forensic investigation. This comprehensive training program combines theoretical knowledge with practical skills, ensuring participants are proficient in identifying vulnerabilities and conducting thorough investigations following security incidents. This bundle includes our ITI’s custom Self-paced Online ILT and labs, as well as an official EC-Council live Online ILT CEH course (as well as their self-paced course) and an official Self-paced Online ILT CHFI course.
Course Delivery:
- Official EC-Council CEH Master: Live Online ILT
- Contact us to schedule.
- Official EC-Council CEH Master: Self-paced Online ILT
- Official EC-Council CHFI: Self-paced Online ILT
- ITI Custom CEH: Self-paced Online ILT
- ITI Custom CHFI: Self-paced Online ILT
Duration:
- Official EC-Council CEH Master (live): 5 days
- Official EC-Council CEH (self-paced): 5 days
- Official EC-Council CHFI: 5 days
- ITI Custom CEH: ~ 7 days (70+ hours)
- ITI Custom CHFI: ~ 4 days (30+ hours)
Recommended Study Sequence: Begin with the Official CEH Master training then the ITI CEH training to understand the core concepts of ethical hacking. Follow this with the Official CHFI course and then the ITI CHFI training to gain expertise in forensic investigation techniques.
CTI Custom CEH Course Description: Our course offers CEH training to provide you the tools to research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this CEH online training course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed.
Topics Covered:
- Introduction to the key concepts of ethical hacking and information security.
- Conducting footprinting and reconnaissance using advanced tools and techniques.
- Scanning networks and identifying vulnerabilities.
- Performing system hacking and exploiting operating systems.
- Understanding malware threats and implementing countermeasures.
- Utilizing social engineering techniques and tools.
- Executing Denial-of-Service (DoS) and session hijacking attacks.
- Evading IDS, firewalls, and honeypots.
- Hacking web servers and applications.
- Performing SQL injection and securing databases.
- Hacking wireless networks and mobile platforms.
- Exploring IoT and OT hacking methodologies.
- Securing cloud environments and implementing cryptographic techniques.
Labs included (15 hours):
- Footprinting and Reconnaissance Techniques
- Network Reconnaissance Techniques
- Enumeration Reconnaissance Techniques
- Vulnerability Analysis Tools & Techniques
- System Hacking Methodologies
- Malware Threat Concepts
- Network Sniffing Techniques
- Social Engineering Exploits
- Denial of Service Attacks
- Session Hijacking Concepts
- Compromising Web Servers
- Web Application Hacking
- SQL Injection Methodologies
- Introduction to Cloud Computing
- Cryptography Techniques
CTI Custom CHFI Course Description: Our CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.
Topics Covered (18+ hours):
- Comprehensive understanding of computer forensics and the forensic investigation process.
- Techniques for searching and seizing digital evidence.
- Methods for analyzing and handling digital evidence.
- First responder procedures for incident management.
- Setup and operation of a forensic lab.
- Gain in-depth knowledge of hard disks, file systems, and Windows forensics.
- Data acquisition and duplication techniques.
- Recovering deleted files and partitions.
- Utilizing Access Data FTK and EnCase for forensic investigations.
- Understanding and applying steganography and password cracking techniques.
- Log correlation, network forensics, and analyzing wireless and web attacks.
- Investigating email crimes and conducting mobile investigations.
- Preparing investigative reports and serving as an expert witness.
Labs included (12+ hours):
- Understanding the Digital Forensics Profession and Investigations
- Data Acquisition
- Processing Crime and Incident Scenes
- Working with Windows and CLI Systems
- Current Digital Forensics Tools
- Linux and Macintosh File Systems
- Recovering Graphics Files
- Digital Forensics Analysis and Validation
- Virtual Machine Forensics, Live Acquisitions, and Network Forensics
- E-mail and Social Media Investigations
- Mobile Device Forensics
- Cloud Forensics
- Report Writing for High-Tech Investigations
- Expert Testimony in Digital Investigations
- Ethics for the Expert Witness
Official EC-Council CEH Master Course Description: Master ethical hacking with our CEH Master course, tailored for security professionals aiming to protect their organizations from cyber threats. This course includes 40 hours of content, delivered through engaging videos, quizzes, and hands-on labs. Participants will learn to think like hackers and use the same tools and techniques to identify and mitigate vulnerabilities.
Topics Covered (labs integrated):
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
Official EC-Council CHFI Course Description: Enhance your investigative skills with the CHFI course, which provides 30 hours of content focusing on digital forensics. This course covers the essentials of computer forensics, including the investigation process, tools, and techniques for analyzing digital evidence.
Topics Covered (labs integrated):
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Operating System Forensics
- Network Forensics
- Investigating Web Attacks
- Database Forensics
- Cloud Forensics
- Malware Forensics
- Investigative Reports
Exam and exam pass guarantee information: All courses include an exam voucher and the CEH comes with a retake. Exams can be taken online through the EC-Council’s remote proctoring service or at authorized testing centers. If you don’t pass the CEH or CHFI exam, upon request you will be provided an additional 12 months of access to ITI’s custom CEH and CHFI training.
License Information: One license provides access to both official EC-Council CEH and CHFI, ITI’s CEH and CHFI courses and labs for 12 months. Access keys must be redeemed within 12 months of purchase.
How to Access: Instructions for accessing the courses will be emailed after purchase.
Link to brochure: https://www.eccouncil.org/wp-content/uploads/2022/09/CEH-brochure.pdf and https://www.eccouncil.org/wp-content/uploads/2023/03/CHFI-brochure.pdf