• United India colony ,Kodambakkam, Chennai.
  • +91 - 99406 11306     044-24731102/ 24732532/ 39942589
  • training@rjpinfotek.com

Certified Ethical Hacker v9

Duration:40Hrs
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.




  • Introduction to Ethical Hacking
  • Hacking Laws
  • Foot printing
  • Google Hacking
  • Scanning
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Phishing
  • Hacking Email Accounts
  • Denial-of-Service
  • Session Hijacking
  • Hacking Web Servers
  • Web Application Vulnerabilities
  • Web-Based Password Cracking Techniques
  • SQL Injection
  • Hacking Wireless Networks
  • Physical Security
  • Linux Hacking
  • Evading IDS, Firewalls and
    Detecting Honey Pots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing
  • Covert Hacking
  • Writing Virus Codes
  • Assembly Language
    Tutorial
  • Exploit Writing
  • Smashing the Stack for Fun
    and Profit
  • Windows Based Buffer
    Overflow Exploit Writing
  • Reverse Engineering
  • Macintosh Hacking
  • Hacking Routers, cable 
    Modems and Firewalls
  • Hacking Mobile Phones,
    PDA and Handheld Devices
  • Bluetooth Hacking
  • VolP Hacking n RFID 
    Hacking
  • Spamming
  • Hacking USB Devices
  • Hacking Database Servers
  • Cyber Warfare - Hacking,
    AI Qaida and Terrorism
  • Internet Content Filtering
    Techniques
  • Privacy on the Internet
  • Securing Laptop Computers
  • Spying Technologies
  • Corporate Espionage
    - Hacking Using Insiders
  • Creating Security Policies
  • Software Piracy and Warez
  • Hacking and Cheating
    Online Games
  • Hacking RSS and Atom
  • Hacking Web Browsers
  • Proxy Server Technologies
  • Data Loss Prevention
  • Hacking Global Positioning 
    System (GPS)
  • Computer Forensics and
    Incident Handling
  • Credit Card Frauds
  • How to Steal Passwords
  • Firewall Technologies
  • Threats and 
    Countermeasures
  • Case Studies D Botnets
  • Economic Espionage
  • Patch Management
  • Security Convergence



Who should Attend?
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

"...Having the CEH certification has helped open the door to a new level of opportunity by increasing the confidence of my clients in my expertise, opening their eyes to the real threat, and by Pen-testing our own products for vulnerabilities and provide a higher quality of service."
Ter Cutler - Novell


Student Speak

Guruskanthan

My knowledge about cyber security has greatly increased after learning CEH @ RJP. Now I am aware of various threats that are present in the cyber world. I now understand the need and necessity of regular updates and proper firewall configuration. I also started to have the practice of leaving nothing under default configuration. This course has increased my morale faith in internet

Siddarth V K

The hands-on session of CEH @ RJP was very valuable. The certification covered a wide variety of material and made me realize how little I knew about IT security. With this I am moving into the field of information security and planning to move head with forensics certification in future.

In-Demand Courses

x