Course description

  • What are the objectives of Ethical hacking course in Mumbai?

    The CEH v10 Certified Ethical Hacker training (earlier CEH v9) in Mumbai is designed for you to pass the EC-Council Certified Ethical Hacker exam 312-50. You will get knowledge of the same techniques that are used by hackers to penetrate network systems. Those techniques can be ethically used to secure your infrastructure. The course provides a hands-on approach to important security systems by focusing on 20 of the most famous security domains.
    You can learn how to:

    • scan, test and hack secure systems and applications
    • Use penetration testing techniques to assess computer system security
    • Gain practical experience with phishing, exploitation, and sniffing tactics

    The EC-Council has introduced the following changes in the latest CEH v10:

    • CEH practical exam
    • A module on the Internet of Things(IoT) Security
    • Upgraded Vulnerability Assessment material
    • Increased focus on cloud attack vectors, AI and Machine Learning
    Why is the CEH certification so desirable

    The recognized endorsed bodies of CEH V10 are:

  • Why is the CEH certification so desirable?

    The EC-Council Certified Ethical Hacker course in Mumbai is one of the most sought-after certifications for security professionals. It helps you develop advanced skill sets to thrive in the global information security domain. For security-related positions, many organizations now consider CEH certification as a mandatory requirement. It has also been observed that professionals with CEH certification earn 44% higher salaries compared to non-certified employees.
     
    Professionals can aim for the following job roles by taking the ethical hacking certification course:
    • Computer network defense (CND) analysts
    • Security managers
    • CND incident responders
    • Forensic analysts
    • CND auditors
    • CND infrastructure support executives
    • Intrusion analysts

  • What skills will you learn in the Ethical Hacking course in Mumbai?

    Learn how to identify threats and vulnerabilities and gain deep insights into the web, mobile app, and network security with Simplilearn’s Ethical Hacking Course in Mumbai. 
     
    The CEH training course enables you to:
    • Learn the latest developments in mobile and web technologies including Android, iOS, BlackBerry, Windows Phone and HTML5
    • Understand the finer nuances of trojans, backdoors, and countermeasures
    • Learn advanced log management for information assurance and allow you to manage information security with more clarity
    • Get a better understanding of IDS, firewalls, honeypots, and wireless hacking
    • Become proficient in advanced concepts such as advanced network packet analysis, securing IIS & Apache web servers, Windows system administration using Powershell, and hacking SQL and Oracle databases
    • Grasp the step-by-step methodology and tactics that hackers use to penetrate network systems
    • Master advanced hacking concepts, including mobile device and smartphone hacking, writing virus codes, exploit writing & reverse engineering and corporate espionage

  • Who should take the Ethical Hacking Course?

    The Ethical Hacking Course in Mumbai offered by Simplilearn can be taken up by the following individuals:
    • IT security officer, auditor or engineer
    • IS/IT auditor or consultant
    • Technical support engineer
    • Network specialist, analyst, manager, architect, consultant or administrator
    • IT operations manager
    • IS/IT specialist, analyst or manager
    • Systems analyst or administrator
    • Network security officers and practitioners
    • IT security specialist, analyst, manager, architect or administrator
    • Senior systems engineer
    • Site administrators

  • What is the CEH certification?

    Professionals who wish to protect their corporate infrastructure by enhancing their skills to analyze and assess computer system security can pursue the Certified Ethical Hacker (CEH) certification. The CEH certification (version 10) exam code is 312-50. The exam tests your knowledge in the implementation of special techniques of ethical hacking. It also tests your understanding of how to evaluate computer systems and network security by using penetration testing tools.

  • What types of projects will you complete during the ethical hacking course?

    The Ethical hacking course in Mumbai involves no projects to work on.

  • What is the average salary for a Security Engineer/Cyber Security Engineer in Mumbai?

    An average salary of Rs 651,533 per year can be expected for a Security Engineer in Mumbai, as per Payscale. CEH (V10)- Certified professionals can earn comparatively more.

  • What are other types of roles within the Cyber Security space available in Mumbai?

    The Cyber Security domain involves the following roles in Mumbai:

    • Cyber Security Architect
    • Cyber Security Developer
    • Application Security Specialist
    • Sr. Information Security Analyst
    • Cyber Security Expert

  • Which companies are hiring Security Engineer/Cyber Security Engineers in Mumbai?

    Candidates can explore their career opportunities at companies like HP, Wipro, Ericsson, GE Healthcare, Dell, MOIL, etc. in Mumbai.

Tools covered

Network security Tools
back track NMAP PROJECT
Password Cracking Tools
AIRCRACK-NG John the Ripper THC-Hydra
Penetration testing Tools
metasploit
Sniffing Tools
BETTERCAP WIRESHARK
SQL Injection Tools
sqlmap sqlninja
Web application security Tools
OWASP w3af

Course preview

    • Lesson 01 - Information Security Overview

      22:30
      • 1 Demo of Aspen and iLabs
        22:30
      • 2 Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
      • 3 Essential Terminology
      • 4 Elements of Information Security
      • 5 The Security, Functionality, and Usability Triangle
    • Lesson 02 - Information Security Threats and Attack Vectors

      01:56
      • 1 Motives, Goals, and Objectives of Information Security Attacks
      • 2 Top Information Security Attack Vectors
      • 3 Information Security Threat Categories
      • 4 Types of Attacks on a System
        01:56
      • 5 Information Warfare
    • Lesson 06 - Penetration Testing Concepts

      • 1 Penetration Testing
      • 2 Why Penetration Testing
      • 3 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
      • 4 Blue Teaming/Red Teaming
      • 5 Types of Penetration Testing
      • 6 Phases of Penetration Testing
      • 7 Security Testing Methodology
    • Lesson 03 - Hacking Concepts

      01:29
      • 1 What is Hacking
        01:29
      • 2 Who is a Hacker?
      • 3 Hacker Classes
      • 4 Hacking Phases
    • Lesson 04 - Ethical Hacking Concepts

      • 1 What is Ethical Hacking?
      • 2 Why Ethical Hacking is Necessary
      • 3 Scope and Limitations of Ethical Hacking
      • 4 Skills of an Ethical Hacker
    • Lesson 05 - Information Security Controls

      • 1 Information Assurance (IA)
      • 2 Information Security Management Program
      • 4 Enterprise Information Security Architecture (EISA)
      • 5 Network Security Zoning
      • 6 Defense in Depth
      • 7 Information Security Policies
      • 8 Physical Security
      • 10 What is Risk?
      • 11 Threat Modeling
      • 12 Incident Management
      • 13 Security Incident and Event Management (SIEM)
      • 14 User Behavior Analytics (UBA)
      • 15 Network Security Controls
      • 16 Identity and Access Management (IAM)
      • 17 Data Leakage
      • 18 Data Backup
      • 19 Data Recovery
      • 20 Role of AI/ML in Cyber Security
    • Lesson 07 - Information Security Laws and Standards

      • 1 Payment Card Industry Data Security Standard (PCI-DSS)
      • 2 ISO/IEC 27001:2013
      • 3 Health Insurance Portability and Accountability Act (HIPAA)
      • 4 Sarbanes Oxley Act (SOX)
      • 5 The Digital Millennium Copyright Act (DMCA)
      • 6 Federal Information Security Management Act (FISMA)
      • 7 Cyber Law in Different Countries
    • Lesson 01 - Footprinting Concepts

      01:04
      • 1 What is Footprinting?
        01:04
      • 2 Objectives of Footprinting
    • Lesson 02 - Footprinting through Search Engines

      18:51
      • 1 Footprinting through Search Engines
        12:09
      • 2 Footprinting using Advanced Google Hacking Techniques
      • 3 Information Gathering Using Google Advanced Search and Image Search
      • 4 Google Hacking Database
        06:42
      • 5 VoIP and VPN Footprinting through Google Hacking Database
    • Lesson 03 - Footprinting through Web Services

      08:37
      • 1 Finding Company’s Top-level Domains (TLDs) and Sub-domains
      • 2 Finding the Geographical Location of the Target
      • 3 People Search on Social Networking Sites and People Search Services
        07:41
      • 4 Gathering Information from LinkedIn
      • 5 Gather Information from Financial Services
      • 6 Footprinting through Job Sites
        00:56
      • 7 Monitoring Target Using Alerts
      • 8 Information Gathering Using Groups, Forums, and Blogs
      • 9 Determining the Operating System
      • 10 VoIP and VPN Footprinting through SHODAN
    • Lesson 04 - Footprinting through Social Networking Sites

      • 1 Collecting Information through Social Engineering on Social Networking Sites
    • Lesson 05 - Website Footprinting

      08:21
      • 1 Website Footprinting
        08:21
      • 2 Website Footprinting using Web Spiders
      • 3 Mirroring Entire Website
      • 4 Extracting Website Information from https://archive.org
      • 5 Extracting Metadata of Public Documents
      • 6 Monitoring Web Pages for Updates and Changes
    • Lesson 06- Email Footprinting

      37:01
      • 1 Tracking Email Communications
        37:01
      • 2 Collecting Information from Email Header
      • 3 Email Tracking Tools
    • Lesson 07- Competitive Intelligence

      00:50
      • 1 Competitive Intelligence Gathering
        00:50
      • 2 Competitive Intelligence - When Did this Company Begin? How Did it Develop?
      • 3 Competitive Intelligence - What Are the Company's Plans?
      • 4 Competitive Intelligence - What Expert Opinions Say About the Company
      • 5 Monitoring Website Traffic of Target Company
      • 6 Tracking Online Reputation of the Target
    • Lesson 08- Whois Footprinting

      42:37
      • 1 Whois Lookup
        12:11
      • 2 Whois Lookup Result Analysis
        30:26
      • 3 Whois Lookup Tools
      • 4 Finding IP Geolocation Information
    • Lesson 09- DNS Footprinting

      • 1 Extracting DNS Information
      • 2 DNS Interrogation Tools
    • Lesson 10- Network Footprinting

      • 1 Locate the Network Range
      • 2 Traceroute
      • 3 Traceroute
      • 4 Traceroute Tools
    • Lesson 11- Footprinting through Social Engineering

      09:17
      • 1 Footprinting through Social Engineering
        09:17
      • 2 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
    • Lesson 12- Footprinting Tools

      • 1 Maltego
      • 2 Recon-ng
      • 3 FOCA
      • 4 Recon-Dog
      • 5 OSRFramework
      • 6 Additional Footprinting Tools
    • Lesson 13- Countermeasures

      00:57
      • 1 Footprinting Countermeasures
        00:57
    • Lesson 14- Footprinting Pen Testing

      • 1 Footprinting Pen Testing
      • 2 Footprinting Pen Testing Report Templates
    • Lesson 01 - Network Scanning Concepts

      • 1 Overview of Network Scanning
      • 2 TCP Communication Flags
      • 3 TCP/IP Communication
      • 4 Creating Custom Packet Using TCP Flags
      • 5 Scanning in IPv6 Networks
    • Lesson 02 - Scanning Tools

      • 1 Nmap
      • 2 Hping2 / Hping3
      • 3 Scanning Tools
      • 4 Scanning Tools for Mobile
    • Lesson 03- Scanning Techniques

      • 1 Scanning Technique
      • 2 Port Scanning Countermeasures
    • Lesson 04- Scanning Beyond IDS and Firewall

      • 1 IDS/Firewall Evasion Techniques
    • Lesson 05- Banner Grabbing

      06:25
      • 1 Banner Grabbing
        03:19
      • 2 How to Identify Target System OS
        03:06
      • 3 Banner Grabbing Countermeasures
    • Lesson 06- Draw Network Diagrams

      • 1 Draw Network Diagrams
      • 2 Network Discovery and Mapping Tools
      • 3 Network Discovery Tools for Mobile
    • Lesson 07- Scanning Pen Testing

      • 1 Scanning Pen Testing
    • Lesson 01 - Enumeration Concepts

      • 1 What is Enumeration?
      • 2 Techniques for Enumeration
      • 3 Services and Ports to Enumerate
    • Lesson 02 - NetBIOS Enumeration

      14:40
      • 1 NetBIOS Enumeration
        14:40
      • 2 NetBIOS Enumeration Tool
      • 3 Enumerating User Accounts
      • 4 Enumerating Shared Resources Using Net View
    • Lesson 03 - SNMP Enumeration

      06:20
      • 1 SNMP (Simple Network Management Protocol) Enumeration
        06:20
      • 2 Working of SNMP
      • 3 Management Information Base (MIB)
      • 4 SNMP Enumeration Tools
    • Lesson 04 - LDAP Enumeration

      05:45
      • 1 LDAP Enumeration
        05:45
      • 2 LDAP Enumeration Tools
    • Lesson 05 - NTP Enumeration

      03:59
      • 1 NTP Enumeration
        03:59
      • 2 NTP Enumeration Commands
      • 2 NTP Enumeration Tools
    • Lesson 06 - SMTP Enumeration and DNS Enumeration

      17:21
      • 1 SMTP Enumeration
        17:21
      • 2 SMTP Enumeration Tools
      • 3 DNS Enumeration Using Zone Transfer
    • Lesson 08 - Enumeration Countermeasures

      • 1 Enumeration Countermeasures
    • Lesson 07 - Other Enumeration Techniques

      • 1 IPsec Enumeration
      • 2 VoIP Enumeration
      • 3 RPC Enumeration
      • 4 Unix/Linux User Enumeration
    • Lesson 09 - Enumeration Pen Testing

      • 1 Enumeration Pen Testing
    • Module 05- Vulnerability Analysis

      • Lesson 05- Vulnerability Assessment Reports

        • 1 Vulnerability Assessment Reports
        • 2 Analyzing Vulnerability Scanning Report
    • Lesson 01- Vulnerability Assessment Concepts

      • 1 Vulnerability Research
      • 2 Vulnerability Classification
      • 3 What is Vulnerability Assessment?
      • 4 Types of Vulnerability Assessment
      • 5 Vulnerability-Management Life Cycle
    • Lesson 02- Vulnerability Assessment Solutions

      • 1 Comparing Approaches to Vulnerability Assessment
      • 2 Working of Vulnerability Scanning Solutions
      • 3 Types of Vulnerability Assessment Tools
      • 4 Characteristics of a Good Vulnerability Assessment Solution
      • 5 Choosing a Vulnerability Assessment Tool
      • 6 Criteria for Choosing a Vulnerability Assessment Tool
      • 7 Best Practices for Selecting Vulnerability Assessment Tools
    • Lesson 03- Vulnerability Scoring Systems

      • 1 Common Vulnerability Scoring System (CVSS)
      • 2 Common Vulnerabilities and Exposures (CVE)
      • 3 National Vulnerability Database (NVD)
      • 4 Resources for Vulnerability Research
    • Lesson 04- Vulnerability Assessment Tools

      • 1 Vulnerability Assessment Tools
      • 2 Vulnerability Assessment Tools for Mobile
    • Lesson 05- Vulnerability Assessment Reports

      • 1 Vulnerability Assessment Reports
      • 2 Analyzing Vulnerability Scanning Report
    • Lesson 01- System Hacking Concepts

      • 1 CEH Hacking Methodology (CHM)
      • 2 System Hacking Goals
    • Lesson 02- Cracking Passwords

      • 1 Password Cracking
      • 2 Types of Password Attacks
      • 3 Password Recovery Tools
      • 4 Microsoft Authentication
      • 5 How Hash Passwords Are Stored in Windows SAM?
      • 6 NTLM Authentication Process
      • 7 Kerberos Authentication
      • 8 Password Salting
      • 9 Tools to Extract the Password Hashes
      • 10 Password Cracking Tools
      • 11 How to Defend against Password Cracking
      • 12 How to Defend against LLMNR/NBT-NS Poisoning
    • Lesson 03- Escalating Privileges

      • 1 Privilege Escalation
      • 2 Privilege Escalation Using DLL Hijacking
      • 3 Privilege Escalation by Exploiting Vulnerabilities
      • 4 Privilege Escalation Using Dylib Hijacking
      • 5 Privilege Escalation using Spectre and Meltdown Vulnerabilities
      • 6 Other Privilege Escalation Techniques
      • 7 How to Defend Against Privilege Escalation
    • Lesson 04- Executing Applications

      • 1 Executing Applications
      • 2 Keylogger
      • 3 Spyware
      • 4 How to Defend Against Keyloggers
      • 5 How to Defend Against Spyware
    • Lesson 05- Hiding Files

      • 1 Rootkits
      • 2 NTFS Data Stream
      • 3 What is Steganography?
    • Lesson 06- Covering Tracks

      • 1 Covering Tracks
      • 2 Disabling Auditing: Auditpol
      • 3 Clearing Logs
      • 4 Manually Clearing Event Logs
      • 5 Ways to Clear Online Tracks
      • 6 Covering BASH Shell Tracks
      • 7 Covering Tracks on Network
      • 8 Covering Tracks on OS
      • 9 Covering Tracks Tools
    • Lesson 07- Penetration Testing

      • 1 Password Cracking
      • 2 Privilege Escalation
      • 3 Executing Applications
      • 4 Hiding Files
      • 5 Covering Tracks
    • Lesson 01- Malware Concepts

      • 1 Introduction to Malware
      • 2 Different Ways a Malware can Get into a System
      • 3 Common Techniques Attackers Use to Distribute Malware on the Web
      • 4 Components of Malware
    • Lesson 02- Trojan Concepts

      • 1 What is a Trojan?
      • 2 How Hackers Use Trojans
      • 3 Common Ports used by Trojans
      • 4 How to Infect Systems Using a Trojan
      • 5 Trojan Horse Construction Kit
      • 6 Wrappers
      • 7 Crypters
      • 8 How Attackers Deploy a Trojan
      • 9 Exploit Kits
      • 10 Evading Anti-Virus Techniques
      • 11 Types of Trojans
    • Lesson 03- Virus and Worm Concepts

      • 1 Introduction to Viruses
      • 2 Stages of Virus Life
      • 3 Working of Viruses
      • 4 Indications of Virus Attack
      • 5 How does a Computer Get Infected by Viruses
      • 6 Virus Hoaxes
      • 7 Fake Antiviruses
      • 8 Ransomware
      • 9 Types of Viruses
      • 10 Creating Virus
      • 11 Computer Worms
      • 12 Worm Makers
    • Lesson 04- Malware Analysis

      • 1 What is Sheep Dip Computer?
      • 2 Anti-Virus Sensor Systems
      • 3 Introduction to Malware Analysis
      • 4 Malware Analysis Procedure: Preparing Testbed
      • 5 Static Malware Analysis
      • 6 Dynamic Malware Analysis
      • 7 Virus Detection Methods
      • 8 Trojan Analysis: ZeuS/Zbot
      • 9 Virus Analysis: WannaCry
    • Lesson 05- Countermeasures

      • 1 Trojan Countermeasures
      • 2 Backdoor Countermeasures
      • 3 Virus and Worms Countermeasures
    • Lesson 06- Anti-Malware Software

      • 1 Anti-Trojan Software
      • 2 Antivirus Software
    • Lesson 07- Malware Penetration Testing

      • 1 Malware Penetration Testing
    • Lesson 01- Sniffing Concepts

      • 1 Network Sniffing
      • 2 Types of Sniffing
      • 3 How an Attacker Hacks the Network Using Sniffers
      • 4 Protocols Vulnerable to Sniffing
      • 5 Sniffing in the Data Link Layer of the OSI Model
      • 6 Hardware Protocol Analyzers
      • 7 SPAN Port
      • 8 Wiretapping
      • 9 Lawful Interception
    • Lesson 02- Sniffing Technique: MAC Attacks

      • 1 MAC Address/CAM Table
      • 2 How CAM Works
      • 3 What Happens When CAM Table Is Full?
      • 4 MAC Flooding
      • 5 Switch Port Stealing
      • 6 How to Defend against MAC Attacks
    • Lesson 03- Sniffing Technique: DHCP Attacks

      • 1 How DHCP Works
      • 2 DHCP Request/Reply Messages
      • 3 DHCP Starvation Attack
      • 4 Rogue DHCP Server Attack
      • 5 How to Defend Against DHCP Starvation and Rogue Server Attack
    • Lesson 04- Sniffing Technique: ARP Poisoning

      • 1 What Is Address Resolution Protocol (ARP)?
      • 2 ARP Spoofing Attack
      • 3 Threats of ARP Poisoning
      • 4 ARP Poisoning Tools
      • 5 How to Defend Against ARP Poisoning
      • 6 Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
      • 7 ARP Spoofing Detection Tools
    • Lesson 05- Sniffing Technique: Spoofing Attacks

      • 1 MAC Spoofing/Duplicating
      • 2 MAC Spoofing Technique: Windows
      • 3 MAC Spoofing Tools
      • 4 IRDP Spoofing
      • 5 How to Defend Against MAC Spoofing
    • Lesson 06- Sniffing Technique: DNS Poisoning

      • 1 DNS Poisoning Techniques
      • 2 How to Defend Against DNS Spoofing
    • Lesson 07- Sniffing Tools

      • 1 Sniffing Tool: Wireshark
      • 2 Sniffing Tools
      • 3 Packet Sniffing Tools for Mobile
    • Lesson 08- Countermeasures

      • 1 How to Defend Against Sniffing
    • Lesson 09- Sniffing Detection Techniques

      • 1 How to Detect Sniffing
      • 2 Sniffer Detection Techniques
      • 3 Promiscuous Detection Tools
    • Lesson 10- Sniffing Pen Testing

      • 1 Sniffing Penetration Testing
    • Lesson 01 - Social Engineering Concepts

      • 1 What is Social Engineering?
      • 2 Phases of a Social Engineering Attack
    • Lesson 02 - Social Engineering Techniques

      • 1 Types of Social Engineering
      • 2 Human-based Social Engineering
      • 3 Computer-based Social Engineering
      • 4 Mobile-based Social Engineering
    • Lesson 04 - Impersonation on Social Networking Sites

      • 1 Social Engineering Through Impersonation on Social Networking Sites
      • 2 Impersonation on Facebook
      • 3 Risks of Social Networking Threats to Corporate Networks
    • Lesson 05 - Identity Theft

      • 1 Identify Theft
    • Lesson 06 - Countermeasures

      • 1 Social Engineering Countermeasures
      • 2 Insider Threats Countermeasures
      • 3 Identity Theft Countermeasures
      • 4 How to Detect Phishing Emails
      • 5 Anti-Phishing Toolbar
      • 6 Common Social Engineering Targets and Defense Strategies
    • Lesson 07 - Social Engineering Penetration Testing

      • 1 Social Engineering Pen Testing
      • 2 Social Engineering Pen Testing Tools
    • Lesson 03- Insider Threats

      • 1 Insider Threat / Insider Attack
      • 2 Type of Insider Threats
    • Lesson 01 - DoS/DDoS Concepts

      • 1 What is Denial of Service Attack?
      • 2 What is Distributed Denial of Service Attack?
    • Lesson 02 - DoS/DDoS Attack Techniques

      • 1 Basic Categories of DoS/DDoS Attack Vectors
      • 2 UDP Flood Attack
      • 3 ICMP Flood Attack
      • 4 Ping of Death and Smurf Attack
      • 5 SYN Flood Attack
      • 6 Fragmentation Attack
      • 7 HTTP GET/POST and Slowloris Attacks
      • 8 Multi-Vector Attack
      • 9 Peer-to-Peer Attacks
      • 10 Permanent Denial-of-Service Attack
      • 11 Distributed Reflection Denial-of-Service (DRDoS)
    • Lesson 03 - Botnets

      • 1 Organized Cyber Crime: Organizational Chart
      • 2 Botnet
      • 3 A Typical Botnet Setup
      • 4 Botnet Ecosystem
      • 5 Scanning Methods for Finding Vulnerable Machines
      • 6 How Malicious Code Propagates?
      • 7 Botnet Trojan
    • Lesson 04 - DDoS Case Study

      • 1 DDoS Attack
      • 2 Hackers Advertise Links to Download Botnet
      • 3 Use of Mobile Devices as Botnets for Launching DDoS Attacks
      • 4 DDoS Case Study: Dyn DDoS Attack
    • Lesson 05 - DoS/DDoS Attack Tools

      • 1 DoS and DDoS Attack Tool
      • 2 DoS and DDoS Attack Tool for Mobile
    • Lesson 06 - Countermeasures

      • 1 Detection Techniques
      • 2 DoS/DDoS Countermeasure Strategies
      • 3 DDoS Attack Countermeasures
      • 4 Techniques to Defend against Botnets
      • 5 DoS/DDoS Countermeasures
      • 6 DoS/DDoS Protection at ISP Level
      • 7 Enabling TCP Intercept on Cisco IOS Software
    • Lesson 07 - DoS/DDoS Protection Tools

      • 1 Advanced DDoS Protection Appliances
      • 2 DoS/DDoS Protection Tools
    • Lesson 08 - DoS/DDoS Attack Penetration Testing

      • 1 Denial-of-Service (DoS) Attack Pen Testing
    • Module 11- Session Hijacking

      • Lesson 06- Penetration Testing

        • 1 Session Hijacking Pen Testing
    • Lesson 01- Session Hijacking Concepts

      • 1 What is Session Hijacking?
      • 2 Why Session Hijacking is Successful?
      • 3 Session Hijacking Process
      • 4 Packet Analysis of a Local Session Hijack
      • 5 Types of Session Hijacking
      • 6 Session Hijacking in OSI Model
      • 7 Spoofing vs. Hijacking
    • Lesson 02- Application Level Session Hijacking

      • 1 Application Level Session Hijacking
      • 2 Compromising Session IDs using Sniffing and by Predicting Session Token
      • 3 Compromising Session IDs Using Man-in-the-Middle Attack
      • 4 Compromising Session IDs Using Man-in-the-Browser Attack
      • 5 Compromising Session IDs Using Client-side Attacks
      • 6 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
      • 7 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
      • 8 Compromising Session IDs Using Session Replay Attack
      • 9 Compromising Session IDs Using Session Fixation
      • 10 Session Hijacking Using Proxy Servers
      • 11 Session Hijacking Using CRIME Attack
      • 12 Session Hijacking Using Forbidden Attack
    • Lesson 03- Network Level Session Hijacking

      • 1 TCP/IP Hijacking
      • 2 IP Spoofing: Source Routed Packets
      • 3 RST Hijacking
      • 4 Blind Hijacking
      • 5 UDP Hijacking
      • 6 MiTM Attack Using Forged ICMP and ARP Spoofing
    • Lesson 04- Session Hijacking Tools

      • 1 Session Hijacking Tools
      • 2 Session Hijacking Tools For Mobile
    • Lesson 05- Countermeasures

      • 1 Session Hijacking Detection Methods
      • 2 Protecting against Session Hijacking
      • 3 Methods to Prevent Session Hijacking: To be Followed by Web Developers
      • 4 Methods to Prevent Session Hijacking: To be Followed by Web Users
      • 5 Session Hijacking Detection Tools
      • 6 Approaches Vulnerable to Session Hijacking and their Preventative Solutions
      • 7 Approaches to Prevent Session Hijacking
      • 8 IPSec
      • 9 Session Hijacking Prevention Tools
    • Lesson 06- Penetration Testing

      • 1 Session Hijacking Pen Testing
    • Lesson 01- IDS, Firewall and Honeypot Concepts

      • 1 Intrusion Detection System (IDS)
      • 2 Firewall
      • 3 Honeypot
    • Lesson 02- IDS, Firewall and Honeypot Solutions

      • 1 Intrusion Detection Tool
      • 2 Firewalls
      • 3 Honeypot Tools
    • Lesson 03- Evading IDS

      • 1 IDS Evasion Techniques
    • Lesson 04- Evading Firewalls

      • 1 Firewall Evasion Techniques
    • Lesson 05- IDS/Firewall Evading Tools

      • 1 IDS/Firewall Evasion Tools
      • 2 Packet Fragment Generator Tools
    • Lesson 06- Detecting Honeypots

      • 1 Detecting Honeypots
      • 2 Detecting and Defeating Honeypots
      • 3 Honeypot Detection Tool: Send-Safe Honeypot Hunte
    • Lesson 07- IDS/Firewall Evasion Countermeasures

      • 1 How to Defend Against IDS Evasion
      • 2 How to Defend Against Firewall Evasion
    • Lesson 08- Penetration Testing

      • Firewall/IDS Penetration Testing
    • Lesson 01- Web Server Concepts

      • 1 Web Server Operations
      • 2 Open Source Web Server Architecture
      • 3 IIS Web Server Architecture
      • 4 Web Server Security Issue
      • 5 Why Web Servers Are Compromised?
      • 6 Impact of Web Server Attacks
    • Lesson 02- Web Server Attacks

      • 1 DoS/DDoS Attacks
      • 2 DNS Server Hijacking
      • 3 DNS Amplification Attack
      • 4 Directory Traversal Attacks
      • 5 Man-in-the-Middle/Sniffing Attack
      • 6 Phishing Attacks
      • 7 Website Defacement
      • 8 Web Server Misconfiguration
      • 9 HTTP Response Splitting Attack
      • 10 Web Cache Poisoning Attack
      • 11 SSH Brute Force Attack
      • 12 Web Server Password Cracking
      • 13 Web Application Attacks
    • Lesson 03- Web Server Attack Methodology

      • 1 Information Gathering
      • 2 Web Server Footprinting/Banner Grabbing
      • 3 Website Mirroring
      • 4 Vulnerability Scanning
      • 5 Session Hijacking
      • 6 Web Server Passwords Hacking
      • 7 Using Application Server as a Proxy
    • Lesson 04- Web Server Attack Tools

      • 1 Metasploit
      • 2 Web Server Attack Tools
    • Lesson 05- Countermeasures

      • 1 Place Web Servers in Separate Secure Server Security Segment on Network
      • 2 Countermeasures
      • 3 Detecting Web Server Hacking Attempts
      • 4 How to Defend Against Web Server Attacks
      • 5 How to Defend against HTTP Response Splitting and Web Cache Poisoning
      • 6 How to Defend against DNS Hijacking
    • Lesson 06- Patch Management

      • 1 Patches and Hotfixes
      • 2 What is Patch Management
      • 3 Installation of a Patch
      • 4 Patch Management Tools
    • Lesson 07- Web Server Security Tools

      • 1 Web Application Security Scanners
      • 2 Web Server Security Scanners
      • 3 Web Server Security Tools
    • Lesson 08- Web Server Pen Testing

      • 1 Web Server Penetration Testing
      • 2 Web Server Pen Testing Tools
    • Lesson 01 - Web App Concepts

      • 1 Introduction to Web Applications
      • 2 Web Application Architecture
      • 3 Web 2.0 Applications
      • 4 Vulnerability Stack
    • Lesson 02 - Web App Threats

      • 1 OWASP Top 10 Application Security Risks – 2017
      • 2 Other Web Application Threats
    • Lesson 03 - Hacking Methodology

      • 1 Web App Hacking Methodology
      • 2 Footprint Web Infrastructure
      • 2 Attack Web Servers
      • 3 Analyze Web Applications
      • 4 Bypass Client-Side Controls
      • 5 Attack Authentication Mechanism
      • 6 Authorization Attack Schemes
      • 7 Attack Access Controls
      • 8 Attack Session Management Mechanism
      • 9 Perform Injection/Input Validation Attacks
      • 10 Attack Application Logic Flaws
      • 11 Attack Database Connectivity
      • 12 Attack Web App Client
      • 13 Attack Web Services
    • Lesson 04 - Web Application Hacking Tools

      • 1 Web Application Hacking Tools
    • Lesson 05 - Countermeasures

      • 1 Web Application Fuzz Testing
      • 2 Source Code Review
      • 3 Encoding Schemes
      • 4 How to Defend Against Injection Attacks
      • 5 Web Application Attack Countermeasures
      • 6 How to Defend Against Web Application Attacks
    • Lesson 06 - Web App Security Testing Tools

      • 1 Web Application Security Testing Tools
      • 2 Web Application Firewall
    • Lesson 07 - Web App Pen Testing

      • 1 Web Application Pen Testing
      • 2 Web Application Pen Testing Framework
    • Lesson 01 - SQL Injection Concepts

      • 1 What is SQL Injection?
      • 2 SQL Injection and Server-side Technologies
      • 3 Understanding HTTP POST Request
      • 4 Understanding Normal SQL Query
      • 5 Understanding an SQL Injection Query
      • 6 Understanding an SQL Injection Query – Code Analysis
      • 8 Example of a Web App Vulnerable to SQL Injection: BadProductList.aspx
      • 9 Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
      • 10 Example of SQL Injection
    • Lesson 02 - Types of SQL Injection

      • 1 Types of SQL Injection
    • Lesson 03 - SQL Injection Methodology

      • 1 SQL Injection Methodology
    • Lesson 04 - SQL Injection Tools

      • 1 SQL Injection Tools
      • 2 SQL Injection Tools
      • 3 SQL Injection Tools for Mobile
    • Lesson 05 - Evasion Techniques

      • 1 Evading IDS
      • 2 Types of Signature Evasion Techniques
    • Lesson 06 - Countermeasures

      • 1 How to Defend Against SQL Injection Attacks?
      • 2 SQL Injection Detection Tools
      • 3 SQL Injection Detection Tools
    • Lesson 01 - Wireless Concepts

      • 1 Wireless Terminologies
      • 2 Wireless Networks
      • 3 Wireless Standards
      • 4 Service Set Identifier (SSID)
      • 5 Wi-Fi Authentication Modes
      • 6 Wi-Fi Authentication Process Using a Centralized Authentication Server
      • 7 Types of Wireless Antenna
    • Lesson 02 - Wireless Encryption

      • 1 Types of Wireless Encryption
      • 2 WEP vs. WPA vs. WPA2
      • 3 WEP Issues
      • 4 Weak Initialization Vectors (IV)
    • Lesson 03 - Wireless Threats

      • 1 Wireless Threats
    • Lesson 04 - Wireless Hacking Methodology

      • 1 Wireless Hacking Methodology
    • Lesson 05 - Wireless Hacking Tools

      • 1 WEP/WPA Cracking Tools
      • 2 WEP/WPA Cracking Tool for Mobile
      • 3 Wi-Fi Sniffer
      • 4 Wi-Fi Traffic Analyzer Tools
      • 5 Other Wireless Hacking Tools
    • Lesson 06 - Bluetooth Hacking

      • 1 Bluetooth Stack
      • 2 Bluetooth Hacking
      • 3 Bluetooth Threats
      • 4 How to BlueJack a Victim?
      • 4 Bluetooth Hacking Tools
    • Lesson 07 - Countermeasures

      • 1 Wireless Security Layers
      • 2 How to Defend Against WPA/WPA2 Cracking
      • 3 How to Defend Against KRACK Attacks
      • 4 How to Detect and Block Rogue AP
      • 5 How to Defend Against Wireless Attacks
      • 6 How to Defend Against Bluetooth Hacking
    • Lesson 08 - Wireless Security Tools

      • 1 Wireless Intrusion Prevention Systems
      • 2 Wireless IPS Deployment
      • 3 Wi-Fi Security Auditing Tool
      • 4 Wi-Fi Intrusion Prevention System
      • 5 Wi-Fi Predictive Planning Tools
      • 6 Wi-Fi Vulnerability Scanning Tools
      • 7 Bluetooth Security Tool
      • 8 Wi-Fi Security Tools for Mobile
    • Lesson 09 - Wi-Fi Pen Testing

      • 1 Wireless Penetration Testing
      • 2 Wireless Penetration Testing Framework
    • Lesson 01- Mobile Platform Attack Vectors

      • 1 Vulnerable Areas in Mobile Business Environment
      • 2 OWASP Top 10 Mobile Risks - 2016
      • 3 Anatomy of a Mobile Attack
      • 4 How a Hacker can Profit from Mobile when Successfully Compromised
      • 5 Mobile Attack Vectors and Mobile Platform Vulnerabilities
      • 6 Security Issues Arising from App Stores
      • 7 App Sandboxing Issues
      • 8 Mobile Spam
      • 9 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
      • 10 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
    • Lesson 02- Hacking Android OS

      • 1 Android OS
      • 2 Android Rooting
      • 3 Blocking Wi-Fi Access using NetCut
      • 4 Hacking with zANTI
      • 5 Hacking Networks Using Network Spoofer
      • 6 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
      • 7 Performing Session Hijacking Using DroidSheep
      • 8 Hacking with Orbot Proxy
      • 9 Android-based Sniffers
      • 10 Android Trojans
      • 11 Securing Android Devices
      • 12 Android Security Tool: Find My Device
      • 13 Android Security Tools
      • 14 Android Vulnerability Scanner
      • 15 Android Device Tracking Tools
    • Lesson 03- Hacking iOS

      • 1 Apple iOS
      • 2 Jailbreaking iOS
      • 3 iOS Trojans
      • 4 Guidelines for Securing iOS Devices
      • 5 iOS Device Tracking Tools
      • 6 iOS Device Security Tools
    • Lesson 04- Mobile Spyware

      • 1 Mobile Spyware
      • 2 Mobile Spyware: mSpy
      • 3 Mobile Spywares
    • Lesson 05- Mobile Device Management

      • 1 Mobile Device Management (MDM)
      • 2 Mobile Device Management Solutions
      • 3 Bring Your Own Device (BYOD)
    • Lesson 06- Mobile Security Guidelines and Tools

      • 1 General Guidelines for Mobile Platform Security
      • 2 Mobile Device Security Guidelines for Administrator
      • 3 SMS Phishing Countermeasures
      • 4 Mobile Protection Tools
      • 5 Mobile Anti-Spyware
    • Lesson 07- Mobile Pen Testing

      • 1 Android Phone Pen Testing
      • 2 iPhone Pen Testing
      • 3 Mobile Pen Testing Toolkit: Hackode
    • Lesson 01- IoT Concepts

      • 1 What is IoT
      • 2 How IoT Works
      • 3 IoT Architecture
      • 4 IoT Application Areas and Devices
      • 5 IoT Technologies and Protocols
      • 6 IoT Communication Models
      • 7 Challenges of IoT
      • 8 Threat vs Opportunity
    • Lesson 02- IoT Attacks

      • 1 IoT Security Problems
      • 2 OWASP Top 10 IoT Vulnerabilities and Obstacles
      • 3 IoT Attack Surface Areas
      • 4 IoT Threats
      • 5 Hacking IoT Devices: General Scenario
      • 6 IoT Attacks
      • 7 IoT Attacks in Different Sectors
    • Lesson 03- IoT Hacking Methodology

      • 1 What is IoT Device Hacking?
      • 2 IoT Hacking Methodology
    • Lesson 04- IoT Hacking Tools

      • 1 Information Gathering Tools
      • 2 Sniffing Tools
      • 3 Vulnerability Scanning Tools
      • 4 IoT Hacking Tools
    • Lesson 05- Countermeasures

      • 1 How to Defend Against IoT Hacking
      • 2 General Guidelines for IoT Device Manufacturing Companies
      • 3 OWASP Top 10 IoT Vulnerabilities Solutions
      • 4 IoT Framework Security Considerations
      • 5 IoT Security Tools
    • Lesson 06- IoT Pen Testing

      • 1 IoT Pen Testing
    • Lesson 01 - Cloud Computing Concepts

      • 1 Introduction to Cloud Computing
      • 2 Separation of Responsibilities in Cloud
      • 3 Cloud Deployment Models
      • 4 NIST Cloud Computing Reference Architecture
      • 5 Cloud Computing Benefits
      • 6 Understanding Virtualization
    • Lesson 02 - Cloud Computing Threats

      • 1 Cloud Computing Threats
    • Lesson 03 - Cloud Computing Attacks

      • 1 Service Hijacking using Social Engineering Attacks
      • 2 Service Hijacking using Network Sniffing
      • 3 Session Hijacking using XSS Attack
      • 4 Session Hijacking using Session Riding
      • 5 Domain Name System (DNS) Attacks
      • 6 Side Channel Attacks or Cross-guest VM Breaches
      • 7 SQL Injection Attacks
      • 8 Cryptanalysis Attacks
      • 9 Wrapping Attack
      • 10 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
      • 11 Man-in-the-Cloud Attack
    • Lesson 04 - Cloud Security

      • 1 Cloud Security Control Layers
      • 2 Cloud Security is the Responsibility of both Cloud Provider and Consumer
      • 3 Cloud Computing Security Considerations
      • 4 Placement of Security Controls in the Cloud
      • 5 Best Practices for Securing Cloud
      • 6 NIST Recommendations for Cloud Security
      • 7 Organization/Provider Cloud Security Compliance Checklist
    • Lesson 05 - Cloud Security Tools

      • 1 Cloud Security Tools
    • Lesson 06 - Cloud Penetration Testing

      • 1 What is Cloud Pen Testing?
      • 2 Key Considerations for Pen Testing in the Cloud
      • 3 Cloud Penetration Testing
      • 4 Recommendations for Cloud Testing
    • Lesson 01- Cryptography Concepts

      • 1 Cryptography
      • 2 Government Access to Keys (GAK)
    • Lesson 02- Encryption Algorithms

      • 1 Ciphers
      • 2 Data Encryption Standard (DES)
      • 3 Advanced Encryption Standard (AES)
      • 4 RC4, RC5, and RC6 Algorithms
      • 5 Twofish
      • 6 The DSA and Related Signature Schemes
      • 7 Rivest Shamir Adleman (RSA)
      • 8 Diffie-Hellman
      • 9 Message Digest (One-Way Hash) Functions
    • Lesson 03- Cryptography Tools

      • 1 MD5 Hash Calculators
      • 2 Hash Calculators for Mobile
      • 3 Cryptography Tools
      • 4 Cryptography Tools for Mobile
    • Lesson 04- Public Key Infrastructure (PKI)

      • 1 Public Key Infrastructure (PKI)
    • Lesson 05- Email Encryption

      • 1 Digital Signature
      • 2 Secure Sockets Layer (SSL)
      • 3 Transport Layer Security (TLS)
      • 4 Cryptography Toolkit
      • 5 Pretty Good Privacy (PGP)
    • Lesson 06- Disk Encryption

      • 1 Disk Encryption
      • 2 Disk Encryption Tools
    • Lesson 07- Cryptanalysis

      • 1 Cryptanalysis Methods
      • 2 Code Breaking Methodologies
      • 3 Cryptography Attacks
      • 4 Cryptanalysis Tools
      • 5 Online MD5 Decryption Tools
    • Lesson 08- Countermeasures

      • 1 How to Defend Against Cryptographic Attacks
    • {{childObj.title}}

      • {{childObj.childSection.chapter_name}}

        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & certification

  • What are the prerequisites for the certification?

    It is beneficial, but not mandatory, to have a basic understanding of TCP/IP for the CEH (Certified Ethical Hacker) training and certification.

  • What do I need to do to unlock my Simplilearn certificate?

    Participants should attend one complete class of the course to unlock the Simplilearn certificate.

  • How do I schedule my exam?

    For any queries regarding the scheduling of the CEH exam, learners can get in touch with the sales consultant or raise a request to Simplilearn’s support team.

  • The CEH exam voucher, once purchased, has a validity of one year. If you do not schedule the exam by then, you will have to buy the exam voucher again.

  • Can I ask for a refund of exam voucher cost once it is issued to me?

    Learners are not allowed to ask for a refund of exam once issued. Simplilearn procures the exam vouchers from third part bodies and has no control over the voucher cost and policies.

  • How frequently does the CEH exam fee change?

    The certification body governs the CEH exam fee, and it can be revised from time to time. The change in CEH exam price, if applicable, is announced at the end of the calendar year. Before booking the exam, if the exam prices go up, learners need to pay the difference in amount to Simplilearn.

  • Learners can prepare to pass the CEH examination, through self-study or by undertaking CEH training at an Accredited Training Center like Simplilearn, to become CEH certified. Learners opting for self-study need to fill an application form and submit proof of working experience of minimum 2 years in the field of network security.

  • Learners need to pay $500 to take the CEH certification exam along with registration/eligibility fee of $100.

  • Yes, the EC-Council has accredited our CEH Certification course.

  • What is the passing score for the CEH certification exam?

    Depending on the difficulty of the exam, a panel of domain experts review the questions and decide the passing score.

  • Learners are allowed to take a maximum of 5 attempts for the CEH exam in a 12-month duration. On cleaning one version of the exam, learners are exempted from retaking it.

  • How long does it take to receive the CEH Certification exam results and receive my certification?

    Learners are notified of their results within a short span of time after completing the CEH exam. A report is also generated giving feedback of the performance in the assessed skillsets.

  • If I fail the CEH exam, how soon can I retake it?

    A total of 4 attempts are allowed in 12 months if a candidate fails in his first attempt. However,  there should be a gap of 14 days mandatory between each attempt.

  • How do I apply for CEH re-examination?

    An ECC Exam Center voucher can be purchased to apply for CEH re-examination after an unsuccessful attempt.

  • Do you provide a money back guarantee for the training programs?

    Yes, Simplilearn’s training programs are offered with a money-back guarantee. Learners can submit refund requests through our Help and Support portal after reviewing the Refund Policy

  • If I need to cancel my enrollment, can I get a refund?

    Canceling the enrollment involves deduction of the administration fee, after which the remaining course price gets refunded. Our Refund Policy can be reviewed to get more details.

  • How can I learn more about this training program?

    Contact us using the form on the right side of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives can provide you with more details.
     

Course advisor

Bipin Kulkarni
Bipin Kulkarni Security Expert, Content review board member at EC-Council

Bipin has 17+ years of experience in architecting physical and cloud infrastructure deployments and security. As an EC-Council board member he is responsible for verifying CEH and ECSA courses. He is a Cloud security expert across public and private domains.

Dean Pompilio
Dean Pompilio Technical Trainer, Owner- Steppingstonesolutions Inc

Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

Reviews

Shekhar Pawar
Shekhar Pawar Chief Executive Officer at GrassDew IT Solutions Private Limited, Mumbai

Simplilearn is one of the best online learning portals. I had enrolled for CEHV10 - Certified Ethical Hacker Training certification. The course was simple and easy to understand. Overall it was very good. I would recommend it strongly for professional enhancement.

Read more Read less
Vikas Chourasiya
Vikas Chourasiya Principal Security Engineer @ Blue Jeans Network, Bangalore

I understood many networking concepts and cleared many doubts about penetration testing. This is just a start and I need to practice all the tools that are taught in the course to make a career in the security domain. The instructor is knowledgeable and was able to guide me very well.

Read more Read less
Kallol Kumar Mondal
Kallol Kumar Mondal Senior Consultant, GRC @ Wipro, Bangalore

Good, I would like refer my friend for the same course.

Pradeep Varadarajan
Pradeep Varadarajan Bangalore

It was really a fantastic program.

Praveen Valliavalapil
Praveen Valliavalapil Bangalore

The course took me to the next level of awarness - A must for cyber security professionals that need to adopt with defensive and offensive techniques.

Read more Read less
Dhiraj Kumar
Dhiraj Kumar Bangalore

The course was very nice, learned many new things. The tutor was nice and useful.

Anand Kumar
Anand Kumar Bangalore

Experienced faculty and excellent facility to make learning enjoyable and enrich.

Habib Ulla Khan GS
Habib Ulla Khan GS Bangalore

The training module is been very well structured and delivered. Trainer has been practical working in real time and helped me to get more information on real time security information. Overall feedback, Very Good.

Read more Read less
Rajarshi Barui
Rajarshi Barui Cyber Security at PwC India, Kolkata

My experience with Simplilearn is very pleasant. Their support is prompt and excellent. The trainer helped me exceptionally. I appreciate his efforts personally. Thanks Simplilearn.

Read more Read less
Abhishek Sharma
Abhishek Sharma Student at G D Goenka, Faridabad

Simplilearn's cyber security course helped me a lot to gain knowledge. The course was really awesome. Thank you Simplilearn.

Sooraj C
Sooraj C Bangalore

Excellent training delivered by Simplilearn.

FAQs

  • What is the average salary for a Security Engineer/Cyber Security Engineer in Mumbai?

    Payscale has estimated that the earning potential of Security Engineer/Cyber Security Engineers in Mumbai Rs 567,467 a year on an average. Professionals can further increase their earning capability by undertaking a CEH (V10)- Certified Ethical Hacker program.

  • What are other types of roles within the Cyber Security space available in Mumbai?

    Learners are eligible for the following Cyber Security related job roles in Mumbai:

    • Application Security Specialist
    • Sr. Information Security Analyst
    • Cyber Security Architect
    • Cyber Security Developer

  • Which companies are hiring Security Engineer/Cyber Security Engineers in Mumbai?

    Skilled Security Engineer/Cyber Security Engineers are in growing demand in many companies of Mumbai like Skillventory, Capgemini, Duff & Phelps, Kyros Group, Zycus, and Kaspersky Lab.

  • How are the Labs conducted?

    Learners can use EC Council iLabs that comes with an access period of 6 months.

  • Who are our instructors and how are they selected?

    Simplilearn follows a strict selection process involving profile screening, technical assessment, and training demo. Trainers who pass this process are only allowed to train our students. We ensure that our highly-qualified mentors are CEH (v10) certified along with a minimum of 15 years of experience in the field of cybersecurity and IT services and architecture.

  • Is the exam fee included in the course fee?

    Yes, the CEH course price consists of the exam fee as well.

  • Is this live training, or will I watch pre-recorded videos?

    Simplilearn’s Ethical Hacking training is conducted through live virtual classroom (LVC). Learners can involve in the discussions and communicate with the mentors during the class. A global audience is present during the live sessions for the candidates’ better learning experience. Each completed session is also recorded to assist the candidates in the future.

  • What tools do I need to attend the training sessions?

    You can attend the CEH training in Mumbai using the following tools:
    • Mac: OSX 10.6 or higher
    • Windows: Windows XP SP3 or higher
    • Internet speed: Preferably 512 Kbps or higher
    • Headset, speakers, and microphone

  • I am not able to access the online course. Who can help me?

    To get any assistance regarding the course, you can use the Live Chat option, Contact Us form, or Help and Support portal.

  • How do I become a CEH certified professional?

    Given below are the steps to be followed to become a certified ethical hacker:
    1. Enroll in Simplilearn’s CEH training
    2. Finish the online classroom training program
    3. Use the EC-Council designed ILabs platform to practice your techniques 
    4. Appear for the certification exam online
    5. You will become a certified ethical hacking professional once you complete the coursework and pass the exam.

  • How much does CEH Training cost?

    The course fee for the CEH training is revised from time to time. Learners can refer to the top of the page to know the current price for self-paced and live virtual classroom mode of learning.

  • Where can I take EC-Council exams?

    Using Simplilearn’s online exam voucher, learners get the flexibility to take the EC-Council exam from anywhere in the world. The voucher comes with the training package, and learners need to have a computer connected to the webcam and the internet.

  • Where can I get my certificates of attendance (COA) if I have completed my training through an EC-Council authorized channel?

    Learners can download the certificates of attendance (COA) from Aspen by entering the evaluation code. The learners can look for the evaluation code in the first page of their courseware or the email of EC-Council. Using the LMS, learners can take the assistance of Simplilearn team if they are unable to find the code.

  • Can I review my answers during the examination?

    Yes, learners can navigate through their responses before finally submitting it.

  • How long is the CEH certification valid for?

    The CEH certificate comes with 3 years of validity. To maintain the certification, it is mandatory to earn 120 ECE credits.

  • How many questions are on the CEH exam?

    The CEH certification exam consists of 125 questions.

  • How much time will I have to complete the CEH exam?

    Learners are allowed to take 4 hours to finish the CEH exam.

  • Can I request for a refund if I fail the test?

    A failed attempt in the CEH certification exam is not subject to any refund.

  • Am I required to sign an agreement prior to the exam?

    To support the goals of the EC-Council certification program, a number of policies have been developed by the EC-Council, which includes:
    1. A non-disclosure agreement (NDA)
    2. EC-Council Certification Agreement
    3. Security and Integrity Policy

  • I took training at an Accredited Training Center like Simplilearn, but I want to take the online exam remotely in another country. Is this possible?

    To take the final exam remotely from any location, learners can use Simplilearn’s ProctorU voucher. They should have a working computer that is connected to the internet to appear for the exam.

  • How long do I need to wait for my EC-Council certificate after I take the exam?

    Learners can download the EC-Council certificate from their Aspen account within 7-10 days of the certification date.

  • How many times can I retake the exam if I don’t pass the first time?

    After a failed attempt, a total of 4 retakes are allowed in 12 months with a waiting period of 14 days between each trial. Post this, learners can retake the test only after 12 months.

  • How much does a Certified Ethical Hacker make?

    A certified ethical hacker has the potential to earn an average salary of $92000 in the U.S.

  • What is the validity of my CEH courseware voucher?

    From the day of CEH course purchase, there is 1 year of validity for the CEH courseware voucher.

  • What is online classroom training?

    There is live video streaming of all the classes of the CEH course. Learners can communicate with the mentors during the class and get involved in the discussions.

  • How do I enroll for the online training?

    Enrollment in the CEH certification course in Mumbai can be done by making an online payment via:

    • PayPal 
    • MasterCard
    • Diner’s Club
    • Visa Credit or Debit Card
    • American Express

    The payment receipt along with the course access details is given to the learners via email after the payment is received.

  • Are the training and course material effective in preparing me for the CEH exam?

    Yes, by following Simplilearn’s course material and training, learners can assure their success in the CEH certification exam.

  • What is covered under the 24/7 Support promise?

    The learners can be assured of getting 24/7 support from Simplilearn via chat, calls, or email. A community forum consisting of a dedicated team can also be used by the learners to get on-demand assistance. The community forum can be accessed even after the course completion.

  • What certification will I receive after completing the CEH course?

    A course completion certificate from Simplilearn is awarded to the learners who complete the CEH certification course in Mumbai successfully.

  • What If I miss a session?

    Recordings of each session are made available to the learners to review them in the future if they miss any class.

  • What is Global Teaching Assistance?

    Simplilearn has a team of domain experts as its teaching assistants for the Certified Ethical Hacking course. From class onboarding to project mentoring and career assistance, the trainers enhance the learning experience of the learners and assist in getting them certified in their first trial. The trainers provide teaching assistance during business hours and strive to engage the learners proactively.

  • What is EC-Council’s Exam Fee Refund Policy?

    No refund is provided by the EC-Council if the participant fails in the exam or if his application is rejected.

    CEH (v10) - Certified Ethical Hacker Course in Mumbai, Maharashtra

    Mumbai is the capital of the state of Maharashtra and the the most populous city in all of India. As the financial and commercial capital of India, Mumbai hosts many national and multinational companies. This includes quite a  few from the Fortune Global 500 companies, many foreign banks and companies like TCS and Accenture.

    Ethical hacking forms the cornerstone of the proactive cyber defense, an industry that is important to all industries around the globe. Certified Ethical Hackers are vital to the health of an organization’s security and are becoming a mandatory addition to every company’s IT team. These professionals use penetration tests to find vulnerabilities in an organization’s networks or computer systems.  Because this is an invaluable skill, Certified Ethical Hackers are in high demand and have the potential to earn up to Rs. 9 lakhs a year. The Ethical Hacking course by Simplilearn is accompanied by an EC-Council certificate, so you can demonstrate your competency to potential employers. Simplilearn is an accredited training partner of the EC-Council and offers an Ethical Hacking course in Mumbai that is designed by industry experts.  If you’re seeking a CEH certification course in Mumbai, Simplilearn’s learning delivery model combines the personal motivation of live virtual classroom instruction with the reinforcement of relevant practical projects. Simplilearn also offers the support of 24/7 live teaching assistants for any of your immediate needs or questions. Let Simplilearn help you make the most of your current or future cybersecurity career with an intensive training course for Ethical Hacking.

    Our Mumbai Correspondence / Mailing address

    Simplilearn Solutions Pvt Ltd, 601, 6th Floor, Rupa Solitaire, Millennium Business Park, Plot No.A-1, Mahape, Navi Mumbai - 400710, Maharashtra, India, Call us at: 1800-102-9602

    • Disclaimer
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.