Certified Ethical Hacking - CEH v11

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

₹29,999 + GST (18%)

(Installment Available)

Get Enrolled Now


Starting from Aug 2, 2021

Weekdays Batch

Date: Jun 14 to 18

Time: 9am to 6pm

Weekend Batch

Date: Jun 19 & 20

          Jun 26 & 27

          Jul 3

Time: 9am to 6pm

Incorporating Parrot Security OS
Re-Mapped to NIST/NICE Framework
Enhanced Cloud Security, IoT, and OT Modules
Modern Malware Analysis
Covering the Latest Threats - Fileless Malware
New Lab Designs and Operating Systems
Increased Lab Time and Hands − on Focus
Industry’s Most Comprehensive Tools Library

Ethical Hacking Course Overview

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”


BTC takes Gamification to the next level, packed with 24 incredible Hacking Challenges (on steroids!), across 4 levels of complexity covering 18 attack vectors, including the
OWASP Top 10!

Covers vulnerabilities ranging from a basic cross-site script to advanced multi-level pivoting, ultimately giving access to the entire server. Some of the vulnerabilities covered are XSS, SQLi, IDoR, and Remote Code Execution.

Comes with an interactive UI, to which learners connect through a VPN to access applications.

Contains a dynamic scoring system tracking a learner’s rise up levels, with competitors watching this on the portal’s dashboard.


Who Can Attend
  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat / Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers


₹10L to ₹22L / PER ANNUM

Course Outline

Module 01 - Introduction to Ethical Hacking
Module 02 - Footprinting and Reconnaissance
Module 03 - Scanning Networks
Module 04 - Enumeration
Module 05 - Vulnerability Analysis
Module 06 - System Hacking
Module 07 - Malware Threats
Module 08 - Sniffing
Module 09 - Social Engineering
Module 10 - Denial-of-Service
Module 11 - Session Hijacking
Module 12 - Evading IDS, Firewalls, and Honeypots
Module 13 - Hacking Web Servers
Module 14 - Hacking Web Applications
Module 15 - SQL Injection
Module 16 - Hacking Wireless Networks
Module 17 - Hacking Mobile Platforms
Module 18 - IoT Hacking
Module 19 - Cloud Computing
Module 20 - Cryptography

About the Instructor

Chandrasekar R (EC Council Certified Instructor - ECI)

Chandrasekar R is a Cyber & Cloud Security Consultant | Trainer with rich industry experience in IT training and E-Learning.

Chandru successfully delivered various security certifications training on Certified Ethical Hacker [CEH], EC-Council Certified Security Analyst [ECSA], Computer Hacking Forensic Investigator [CHFI], ECIH, SOC, CompTIA Security+, F5, WAF, DAM, Splunk and many other security technologies.

His major technical skills with core area of expertise include: Ethical Hacking, Cyber Security, Cloud Security, Security Architect, offensive and Defensive Implementation, Vulnerability Assessment, Penetration Testing, Network Security and Auditing, Malware Analysis, Computer Forensics, Database security and Network Forensics.


Tools Played :

* APT | EDR | NDR Solutions: - FireEye HX / NX, Carbon Black (Bit9), Cortex, Sophos Intercept X, Cylance, Sentinelone, McAfee Active Response
* SIEM / Log Mgmt: - IBM QRadar, ArcSight Logger / ESM, Securonix , Alienvault, Splunk Enterprise Security 7.X / 8.X, LogRhythm 7.X, Kibana, Azure Sentinel, Wazuh , McAfee Nitro | ESM
* WAF: - Incapsula Cloud WAF, Imperva SecureSphere, F5 ASM, Akamai, Barracuda
* DDOS: - F5 Cloudline, Radware, Akamai, Arbor Peakflow.
* SOAR: - Cortex XSOAR , Siemplify
* Cloud Security: AWS Inspector CloudWatch, Office 365 and CASB, McAfee Mvision
* PAM | CDR: Beyondtrust | CyberArk | FortiOS, DocBleach
* Threat Intelligence Tools / Frameworks: Recordedfuture, Cisco Talos, Autofocus | MITRE ATT&CK, ZEEK Bro Corelight
* MFA / SSO : SwivelSecure AuthControl Sentry
* DNS Security: - Cisco Umbrella, Infoblox
* IDS/IPS| Sandboxing: - McAfee MAR, Firepower, Trend Micro, Suricata
* DLP: - Symantec DLP14, McAfee , Open DLP, Digital Guardium, Trustwave, Forcepoint
* Email Security: - Symantec Brightmail, Cisco ESA,
* DevSecOps: Anchor, ClairOS, Falco, DefectDojo Open Policy Agent, Terraform Sonatype , Debricked , beaglesecurity, Checkov
* Data Classification / Masking : Boldonjames, Titus , Camouflage
* Proxy: - Bluecoat, Zscaler
* Configuration Audit: - Nipper, Redseal, Nessus
* Database Security: Imperva Database Activity Monitor ( DAM ) / DB Firewall (DBF) / Scuba
* Packet Broker: Wireshark, IXIA , Niagara
* Vulnerability / Penetration Testing: Nessus, Qualys, Rapid7, BigFix
* Application Sec Scanner: - AppScan, Fortify, Netsparker, Burp suite, Acunetix WVS

Chandru has successfully delivered Corporate Training for Ethical Hacking, System Analyst, Computer Forensics, Security Essentials, Disaster Recovery, Incident Handling, Information Security, Security Architect, Secure Computer User, Network Defense. and Customized Training on Security, to corporate clients from all over the world.

CEH v11 Exam & Certification

What are the prerequisites for the certification?

For (CEH) Certified ethical hacking certification, there is no specific eligibility criteria but we recommend a basic knowledge of TCP/IP.

Is the CEH Certification Accredited?

Yes, our Certified Ethical Hacking course is accredited by EC-Council.

Untill when can I procure exam voucher from IT Expert

Your exam voucher fee is included in the price of this ethical hacking course. However, you must procure the CEH exam voucher within 3 months from the date of course purchase. In the event that the CEH exam price does go up and you have not yet booked the exam, you will need to pay the difference in amount to IT Expert Training.

What is the validity of my CEH Exam voucher?

Exam vouchers are valid for 1 year from the date of course purchase. If you do not book the exam within 1 year from the purchase of the voucher, you will need to buy the voucher again as per the actual price.

Student Feedback

Don’t take our word for it. Here is actual feedback from our students.

4.4/5 Course Rating



"It loved my stay here, and the people were really friendly too. I will surely be back again the next time I am in the city"


"It loved my stay here, and the people were really friendly too. I will surely be back again the next time I am in the city"


"It loved my stay here, and the people were really friendly too. I will surely be back again the next time I am in the city"


"It loved my stay here, and the people were really friendly too. I will surely be back again the next time I am in the city"

Trusted Companies hiring CEH Experts

Copyright © 2021 IT Expert Training | All Rights Reserved