Certified Ethical Hacking and Countermeasures v10

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.





6ee9828f-2b18-e911-a3ed-00155d0a14062019-09-30T08:00:00Z3395.000000000001510:00 AM6:00 PMAnywhereLive6ee9828f-2b18-e911-a3ed-00155d0a1406


Certified Ethical Hacking and Countermeasures is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. It delivers technical depth of the content with an emphasis on vulnerability assessment, risk assessment, penetration testing and system protection.

This class immerses students in an interactive environment where they learn how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. The majority of the class is hands-on labs with instruction to explain, reinforce, and show how these hacking tools and techniques can be used to secure and defend real world networks.

Students begin by seeing how perimeter defenses work. They next learn how to scan and attack their own networks and how intruders escalate privileges. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When students leave this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking and what they can do to analyze and secure their own network without harming their own assets.

CEHv8 is now ANSI accredited and focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure. The latest development in mobile and web technologies including Google Android OS, Apple iOS 6, BlackBerry 7 OS, Windows Phone 8 and HTML 5 as well as mobile applications and mobile app stores.

Intended Audience

​This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Not anyone can be a student, as Interface will make sure the applicants work for legitimate companies. Ethical Hacking and Countermeasures course mission is to educate, introduce, and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.

At Completion

​You will learn how to scan, test, hack and secure systems. Through the use of hand-on labs, students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.


This advanced security class assumes familiarity with security concepts and technologies including authentication, authorization, data and network encryption, and network attacks. Students must have at least one year of hands-on experience in computer security. Students that are new to computer security should begin with the Information Security for the IT Professional CISSP course.

Students must have a strong understanding of computer networking including the TCP/IP Protocol Suite, IP Routing and LAN Switching Concepts, and a strong understanding of the Internet. A minimum of 12 months experience in networking or Cisco CCNA Certification is recommended.

Students must also have a strong understanding of Windows including core functionality and navigation. Operating systems used in this course include Windows 8, Windows 7, Windows Server 2012, and Windows Server 2008 R2.

Exams & Certifications


Course Outline

​1. Introduction to Ethical Hacking

2. Footprinting and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Trojans and Backdoors

7. Viruses and Worms

8. Sniffers

9. Social Engineering

10. Denial of Service

11. Session Hijacking

12. Hacking Webservers

13. Hacking Web Applications

14. SQL Injection

15. Hacking Wireless Networks

16. Hacking Mobile Platforms

17. Evading IDS, Firewalls and Honeypots

18. Buffer Overflows

19. Cryptography

20. Penetration Testing



Certified Ethical Hacking and Countermeasures v10http://springhouse.com/course-catalog/cehv8Certified Ethical Hacking and Countermeasures v10

Get More Information




Help us prove you're not a robot:

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner


AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com