Certified Ethical Hacker
About This Course
• Understanding of information security attacks, various hacking methodologies and frameworks, hacking concepts and hacker classes, ethical hacking concepts and scope, information security controls and various information security acts and laws
• Understanding of Footprinting concepts as well as different footprinting techniques, tools and countermeasures
• Understanding of various scanning techniques, scanning concepts and apply the countermeasures.
• Understanding of Enumeration techniques and the countermeasures
• Understanding of vulnerability assessment concepts, vulnerability classification and assessment types, vulnerability assessment tools and analysis of vulnerability assessment reports
• Understanding of different system hacking techniques and covering tracks
• Understanding of Malware threats, APT, various viruses, worms, and trojans and malware countermeasures
• Understanding of sniffing concepts, techniques, use sniffing tools and countermeasures.
• Understanding of Social engineering concepts and social engineering techniques, insider threats and countermeasures
• Understanding of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and countermeasures.
• Understanding of Session Hijacking concepts, hijacking tools, and countermeasures
• Understanding of security solutions like IDS, IPS firewall, honeypots, NAC, and endpoint security, including evasion, and protection
• Understanding of web server concepts, attacks methodology and countermeasures
• Understanding of web application concepts, threats, hacking methodology and web application security
• Understanding of SQL Injection concepts, methodology, evasion techniques, tools, and countermeasures
• Understanding of wireless concepts, encryption, threats, hacking methodology, tools, and countermeasures
• Understanding of mobile platform attack vectors, hacking Android OS and iOS, mobile device management and mobile security guidelines and tools
• Under
What You'll Learn
type of target system before cybercriminals do.
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
In its 12th version, the CEH course provides comprehensive training (20 modules), 200 hands-on learning labs, over 3500 hacking tools, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.
Entry Requirements
Possess background in information technique or cybersecurity and a desire to become a certified ethical hacker. Requires prior knowledge of networking and cybersecurity concepts.