Login

OTP sent to

Certified Ethical Hacker - CEH

Home > Courses > Certified Ethical Hacker - CEH

Certified Ethical Hacker - CEH

EC Council Courses

Duration
45 Hours

Course Description


          A Certified Ethical Hacker (CEH) is a cybersecurity professional who assesses the security of computer systems by identifying vulnerabilities using the same knowledge and tools as malicious hackers, but in a legal and legitimate manner. The CEH certification, offered by EC-Council, demonstrates proficiency in ethical hacking techniques and cybersecurity practices. 

Course Outline For Certified Ethical Hacker - CEH

  • Module 01: Introduction to Ethical Hacking: This module lays the groundwork by introducing key concepts in information security, ethical hacking principles, relevant laws, and standard procedures.
  • Module 02: Foot printing and Reconnaissance: Learn how to gather information about a target network or system using various techniques and tools, including search engines, web services, and social media.
  • Module 03: Scanning Networks: Master different network scanning techniques to identify live hosts, open ports, and services on a target network.
  • Module 04: Enumeration: Discover techniques to extract crucial information like user accounts, shares, and system resources from a target system.
  • Module 05: Vulnerability Analysis: Learn to assess and analyze vulnerabilities in systems and applications using various vulnerability assessment tools and methodologies.
  • Module 06: System Hacking: Delve into techniques for gaining unauthorized access to systems, including password cracking, privilege escalation, and exploiting vulnerabilities.
  • Module 07: Malware Threats: Gain an in-depth understanding of different types of malwares (Trojans, viruses, worms), their mechanisms, and how to defend against them.
  • Module 08: Sniffing: Explore techniques for intercepting and analyzing network traffic to uncover vulnerabilities, including packet sniffing tools and countermeasures.
  • Module 09: Social Engineering: Learn about social engineering tactics used to manipulate individuals into revealing sensitive information and how to implement countermeasures.
  • Module 10: Denial-of-Service: Understand DoS and DDoS attack techniques, including how to audit systems for such attacks and implement preventative measures.
  • Module 11: Session Hijacking: Explore techniques for hijacking user sessions to bypass authentication and gain unauthorized access.
  • Module 12: Evading IDS, Firewalls, and Honeypots: Learn about techniques for bypassing security controls like Intrusion Detection Systems (IDS), firewalls, and honeypots.
  • Module 13: Hacking Web Servers: Discover common web server attacks, vulnerability exploitation techniques, and how to secure web server infrastructures.
  • Module 14: Hacking Web Applications: Explore vulnerabilities in web applications like SQL injection and Cross-Site Scripting (XSS), and learn about secure coding practices and web application security tools.
  • Module 15: SQL Injection: Focus on SQL injection attack techniques, evasion methods, and countermeasures to protect databases.
  • Module 16: Hacking Wireless Networks: Learn about wireless network vulnerabilities (WEP, WPA, WPA2), wireless hacking tools, and securing Wi-Fi networks.
  • Module 17: Hacking Mobile Platforms: Explore mobile platform attack vectors, Android and iOS hacking techniques, and mobile security guidelines and tools.
  • Module 18: IoT and OT Hacking: Understand vulnerabilities and attacks targeting Internet of Things (IoT) and Operational Technology (OT) devices and learn about security measures.
  • Module 19: Cloud Computing: Delve into cloud computing concepts, cloud-based threats and attacks, and securing cloud environments and services.
  • Module 20: Cryptography: Gain an understanding of encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), and cryptographic attacks and countermeasures. 
Enquire Now