Icon Drop a Query Icon Request a Call Back Icon Call us
Preloader
IconCall us: +91 9354485417
  • Follow Us On :

Course Description

The Certified Ethical Hacking (CEH) v12 course is a comprehensive training program designed to equip IT professionals with the skills and knowledge required to identify, counter, and prevent cyber threats and attacks. This course follows the latest version of the CEH certification offered by the EC-Council, focusing on real-world scenarios, hands-on practice, and the latest tools and techniques used by ethical hackers and cybersecurity experts.

What you'll learn in this course?

 

  • Understand the core concepts of ethical hacking and its importance in the cybersecurity landscape.
  • Learn the tools and techniques used by cybercriminals and how to counteract them.
  • Develop skills to think like a hacker and adopt a proactive approach to cybersecurity.
  • Gain hands-on experience in various domains of ethical hacking, including network security, web application security, and social engineering.

Prerequisites

 

  • Basic knowledge of Networking
  • Knowledge of server and network components

Who Can Apply?

  • IT Professionals
  • Students and Graduates
  • Technical Enthusiasts

Course Curriculum

• Information Security Overview

• Hacking Methodologies and Frameworks

• Hacking Concepts

• Ethical Hacking Concepts

• Information Security Controls

• Information Security Laws and Standards

• Footprinting Concepts

• Footprinting through Search Engines

• Footprinting through Web Services

• Footprinting through Social Networking Sites

• Website Footprinting

• Email Footprinting

• Whois Footprinting

• DNS Footprinting

• Network Footprinting

• Footprinting through Social Engineering

• Footprinting Tools

• Footprinting Countermeasures

• Network Scanning Concepts

• Scanning Tools

• Host Discovery

• Port and Service Discovery

• OS Discovery (Banner Grabbing/OS Fingerprinting)

• Scanning Beyond IDS and Firewall

• Network Scanning Countermeasures

• Enumeration Concepts

• NetBIOS Enumeration

• SNMP Enumeration

• LDAP Enumeration

• NTP and NFS Enumeration

• SMTP and DNS Enumeration

• Other Enumeration Techniques

• Enumeration Countermeasures

• Vulnerability Assessment Concepts

• Vulnerability Classification and Assessment Types

• Vulnerability Assessment Tools

• Vulnerability Assessment Reports

• Gaining Access

• Escalating Privileges

• Maintaining Access

• Clearing Logs

• Malware Concepts

• APT Concepts

• Trojan Concepts

• Worm Makers

• Fileless Malware Concepts

• Malware Analysis

• Malware Countermeasures

• Anti-Malware Software

• Sniffing Concepts

• Sniffing Technique: MAC Attacks

• Sniffing Technique: DHCP Attacks

• Sniffing Technique: ARP Poisoning

• Sniffing Technique: Spoofing Attacks

• Sniffing Technique: DNS Poisoning

• Sniffing Tools

• Social Engineering Concepts

• Social Engineering Techniques

• Insider Threats

• Impersonation on Social Networking Sites

• Identity Theft

• Social Engineering Countermeasures

• DoS/DDoS Concepts

• Botnets

• DoS/DDoS Attack Techniques

• DDoS Case Study

• DoS/DDoS Attack Countermeasures

• Application-Level Session Hijacking

• Network-Level Session Hijacking

• Session Hijacking Tools

• Session Hijacking Countermeasures

• IDS, IPS, Firewall, and Honeypot Concepts

• IDS, IPS, Firewall, and Honeypot Solutions

• Evading IDS

• Evading Firewalls

• Evading NAC and Endpoint Security

• IDS/Firewall Evading Tools

• Detecting Honeypots

• IDS/Firewall Evasion Countermeasures

• Web Server Concepts

• Web Server Attacks

• Web Server Attack Methodology

• Web Server Attack Countermeasures

• Web Application Concepts

• Web Application Threats

• Web Application Hacking Methodology

• Web API, Webhooks, and Web Shell

• Web Application Security

• SQL Injection Concepts

• Types of SQL Injection

• SQL Injection Methodology

• SQL Injection Tools

• SQL Injection Countermeasures

• Wireless Concepts

• Wireless Encryption

• Wireless Threats

• Wireless Hacking Methodology

• Wireless Hacking Tools

• Bluetooth Hacking

• Wireless Attack Countermeasures

• Wireless Security Tools

• Mobile Platform Attack Vectors

• Hacking Android OS

• Hacking iOS

• Mobile Device Management

• Mobile Security Guidelines and Tools

• IoT Hacking

• IoT Concepts

• IoT Attacks

• IoT Hacking Methodology

• OT Hacking

• OT Concepts

• OT Attacks

• OT Hacking Methodology

• Cloud Computing Concepts

• Container Technology

• Manipulating CloudTrial Service

• Cloud Security

• Cryptography Concepts

• Encryption Algorithms

• Cryptography Tools

• Email Encryption

• Disk Encryption

• Cryptanalysis

• Cryptography Attack Countermeasures