CEH v.10



April 20 – 24, April 27 – May 1 (Weekdays)

April 18, 25 – May 2, 9, 16 (Sat Only)


EC-Council Certified Ethical Hacker training certifies a security professional as an Ethical Hacker and Penetration Tester. CEH training certifies the abilities of an ethical hacker to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking.

CEH or  Certified Ethical Hacker certification is for the IT professionals who seek a career in the security let that be System security, Network security, Server security, Web application Security, Cloud Security or Mobile Security. 

Pay with or Bank Transfer

The course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The CEH is the first of a series of 3 comprehensive courses (CEH, ECSA and the APT course) to help a cyber security professional master penetration testing.

Ethical hacking describes hacking performed by an individual or group of individuals, usually hired by companies or governments, to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. Ethical Hacking, often applied in a method called Penetration Testing, is an act of forceful access into systems or networks to discover threats which may be exploited by malicious actors resulting in the loss of data, financial loss, or other major damages. 

CEH or  Certified Ethical Hacker certification is for the IT professionals who seek a career in the security let that be System security, Network security, Server security, Web application Security, Cloud Security or Mobile Security. The CEH professional easily understands the loopholes and vulnerabilities that are found in a computer network or security system. He or she then uses the information to improve the system. The ethical hacker, as the CEH certified professional may be said to be working as, thinks just like a criminal hacker in many ways, finding out the weaknesses of a computer and network. But the focus here is towards giving system and processes more teeth in lieu of the security threats.

In this course, you will describe the major networking technologies and systems of modern networks, and configure, manage, and troubleshoot modern networks.

You will:

  • Identify basic network theory concepts and major network communications methods.
  • Describe bounded network media.
  • Describe unbounded network media.
  • Identify the major types of network implementations.
  • Identify TCP/IP addressing and data delivery methods.
  • Analyze routing and switching technologies.
  • Identify the components of a TCP/IP implementation.
  • Analyze network security.
  • Implement network security.
  • Identify the components of a WAN implementation.
  • Identify the components used in cloud computing and virtualization.
  • Identify the components of a remote network implementation.
  • Manage networks.
  • Troubleshoot network issues.


1:  Getting Started
Starting Excel
Opening a Workbook
Understanding the Display Screen
Working with the Ribbon
Exploring the File Tab
Working with the Quick Access Toolbar
Working with the Status Bar
Switching Between Opened Workbooks
Using Excel Help

2:  Entering Data
Moving the Cell Pointer
Selecting a Range of Cells
Creating a New Workbook
Inserting, Renaming, and Deleting Worksheets
Entering Constant Values
Using Auto Fill to Enter Data
Saving a Workbook
Editing Cell Contents
Clearing Cell Contents
Working with Undo and Redo
Closing a Workbook

3:  Using Formulas
Entering Formulas
Using Auto Fill with Formulas
Using the SUM Function
Summing Columns or Rows Automatically
Using Statistical Functions
Working with the Range Finder
Using Formula Error Checking

4:  Working with Constant Values and Formulas
Copying and Pasting Constant Values and Formulas
Cutting and Pasting Constant Values and Formulas
Using Collect and Paste

5:  Formatting Worksheets
Formatting Numbers
Changing the Font Format
Aligning Cell Contents
Merging Cells
Adding Borders
Applying Cell Styles

6:  Modifying Columns and Rows
Changing Column Width
Changing Row Height
Inserting and Deleting Columns or Rows
Hiding Columns or Rows

7:  Editing Workbooks
Working with AutoCorrect
Checking Spelling
Using Find and Replace

8:  Printing Worksheets
Using Print Preview
Working with Print Settings
Using Page Setup Tools
Working in Page Layout View
Creating a Header and Footer
Using Page Break Preview
Printing a Worksheet
Exiting Excel




30, 32, 34, 36


There are no reviews yet.

Be the first to review “CEH v.10”