Course Details
Course Outline
1 - Module 1 - Introduction to Ethical Hacking
Information Security OverviewCyber Kill Chain ConceptsHacking ConceptsEthical Hacking ConceptsInformation Security ControlsInformation Security Laws and Standards
2 - Module 2 - Foot-printing and Reconnaissance
Footprinting ConceptsFootprinting through Search EnginesFootprinting through Web ServicesFootprinting through Social Networking SitesWebsite FootprintingEmail FootprintingWho is FootprintingDNS FootprintingNetwork FootprintingFootprinting through Social EngineeringFootprinting ToolsFootprinting Countermeasures
3 - Module 3 - Scanning Networks
Network Scanning ConceptsScanning ToolsHost DiscoveryPort and Service DiscoveryOS Discovery (Banner Grabbing/OS Fingerprinting)Scanning Beyond IDS and FirewallDraw Network Diagrams
4 - Module 4 - Enumeration
Enumeration ConceptsNetBIOS EnumerationSNMP EnumerationLDAP EnumerationNTP and NFS EnumerationSMTP and DNS EnumerationOther Enumeration TechniquesEnumeration Countermeasures
5 - Module 5 - Vulnerability Analysis
Vulnerability Assessment ConceptsVulnerability Classification and Assessment TypesVulnerability Assessment Solutions and ToolsVulnerability Assessment Reports
6 - Module 6 - System Hacking
System Hacking ConceptsGaining AccessEscalating PrivilegesMaintaining AccessClearing Logs
7 - Module 7 - Malware Threats
Malware ConceptsAPT ConceptsTrojan ConceptsVirus and Worm ConceptsFileless Malware ConceptsMalware AnalysisCountermeasuresAnti-Malware Software
8 - Module 8 - Sniffing
Sniffing ConceptsSniffing Technique: MAC AttacksSniffing Technique: DHCP AttacksSniffing Technique: ARP PoisoningSniffing Technique: Spoofing AttacksSniffing Technique: DNS PoisoningSniffing ToolsCountermeasuresSniffing Detection Techniques
9 - Module 9 - Social Engineering
Social Engineering ConceptsSocial Engineering TechniquesInsider ThreatsImpersonation on Social Networking SitesIdentity TheftCountermeasures
10 - Module 10 - Denial-of-Service
DoS/DDoS ConceptsDoS/DDoS Attack TechniquesBotnetsDDoS Case StudyDoS/DDoS Attack ToolsCountermeasuresDoS/DDoS Protection Tools
11 - Module 11 - Session Hijacking
Session Hijacking ConceptsApplication Level Session HijackingNetwork Level Session HijackingSession Hijacking ToolsCountermeasures
12 - Module 12 - Evading IDS, Firewalls, and Honeypots
IDS, IPS, Firewall, and Honeypot ConceptsIDS, IPS, Firewall, and Honeypot SolutionsEvading IDSEvading FirewallsIDS/Firewall Evading ToolsDetecting HoneypotsIDS/Firewall Evasion Countermeasures
13 - Module 13 - Hacking Web Servers
Web Server ConceptsWeb Server AttacksWeb Server Attack MethodologyWeb Server Attack ToolsCountermeasuresPatch ManagementWeb Server Security Tools
14 - Module 14 - Hacking Web Applications
Web Application ConceptsWeb Application ThreatsWeb Application Hacking MethodologyWeb API, Webhooks, and Web ShellWeb Application Security
15 - Module 15 - SQL Injection
SQL Injection ConceptsTypes of SQL InjectionSQL Injection MethodologySQL Injection ToolsEvasion TechniquesCountermeasures
16 - Module 16 - Hacking Wireless Networks
Wireless ConceptsWireless EncryptionWireless ThreatsWireless Hacking MethodologyWireless Hacking ToolsBluetooth HackingCountermeasuresWireless Security Tools
17 - Module 17 - Hacking Mobile Platforms
Mobile Platform Attack VectorsHacking Android OSHacking iOSMobile Device ManagementMobile Security Guidelines and Tools
18 - Module 18 - IoT and OT Hacking
IoT HackingIoT ConceptsIoT AttacksIoT Hacking MethodologyIoT Hacking ToolsCountermeasuresOT HackingOT ConceptsOT AttacksOT Hacking MethodologyOT Hacking ToolsCountermeasures
19 - Module 19 - Cloud Computing
Cloud Computing ConceptsContainer TechnologyServerless ComputingCloud Computing ThreatsCloud HackingCloud Security
20 - Module 20 - Cryptography
Cryptography ConceptsEncryption AlgorithmsCryptography ToolsPublic Key Infrastructure (PKI)Email EncryptionDisk EncryptionCryptanalysisCountermeasures
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Other Prerequisites
Course Suggestions :
It is suggested that you have the knowledge and working experience at the level of CompTIA Security+ and/or CompTIA Linux+ prior to taking this course.
Course Materials :
This course comes with the complete EC-Council CEH Elite bundle. This all-encompassing content includes:
eCourseware
Exam voucher
Next version eCourseware upon release
Up to 5 exam retakes
Access to 10 Ethical Hacking videos
6 months lab access
CEH Engage
Global CEH Challenge
Exam preparation materials
CEH Practical exam