EC-Council Certified Ethical Hacker (CEH) v12
$3295.00
Course ID: CS-10044
Duration (Days): 5.0
Please contact us for additional details and scheduling options.
Contact UsThe Certified Ethical Hacker (CEH) course offers in-depth training on ethical hacking methodologies, covering system penetration testing, network vulnerabilities, and security auditing techniques. It prepares IT security professionals to identify weaknesses and vulnerabilities in target systems as a means of enhancing security posture.
The Certified Ethical Hacker (CEH) course is a comprehensive program designed for security practitioners to master the ethical hacking methodology that can be used in penetration testing or ethical hacking situations. This course dives deep into the hacker mindset, enabling learners to defend against future attacks. It covers the latest hacking techniques and the most current security threats, including IoT hacking, cloud computing, and mobile platform vulnerabilities. By exploring over 340 attack technologies commonly used by hackers, the course prepares participants with the knowledge and skills to protect their organizations and support the security posture.
Through a blend of theoretical learning and hands-on labs, participants will learn how to scan, test, hack, and secure their own systems. The intensive lab environment provides each student with in-depth knowledge and practical experience with the current essential security systems. They will learn how intruders escalate privileges and what steps can be taken to secure a system. The course also covers the Five Phases of Ethical Hacking: Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. Upon completion, participants will be prepared to take the EC-Council\'s Certified Ethical Hacker exam, validating their ability to think like a hacker and apply what they have learned to protect against future attacks effectively. This certification is widely recognized and respected in the IT security industry, making it a valuable credential for IT professionals seeking to advance their careers in cybersecurity.
Course Outline
##### Module 1 - Introduction to Ethical Hacking
- Explain Information Security Concepts
- Explain Hacking Methodologies and Frameworks
- Explain Hacking Concepts and Different Hacker Classes
- Explain Ethical Hacking Concepts and Scope
- Summarize the Techniques used in Information Security Controls
- Explain the Importance of Applicable Security Laws and Standards
##### Module 2 - Footprinting and Reconnaissance
- Explain Footprinting Concepts
- Demonstrate Footprinting through Search Engines
- Demonstrate Footprinting through Web Services
- Demonstrate Footprinting through Social Networking Sites
- Use Different Techniques for Website Footprinting
- Use Different Techniques for Email Footprinting
- Use Different Techniques for Whois Footprinting
- Use Different Techniques for DNS Footprinting
- Use Different Techniques for Network Footprinting
- Demonstrate Footprinting through Social Engineering
- Use Various Footprinting Tools
- Explain Footprinting Countermeasures
##### Module 3 - Scanning Networks
- Explain Network Scanning Concepts
- Use Various Network Scanning Tools
- Demonstrate Various Scanning Techniques for Host Discovery
- Demonstrate Various Scanning Techniques for Port and Service
- Demonstrate Various Scanning Techniques for OS Discovery
- Demonstrate Various Techniques for Scanning Beyond IDS and Firewall
- Explain Network Scanning Countermeasures
##### Module 4 - Enumeration
- Explain Enumeration Concepts
- Demonstrate Different Techniques for NetBIOS Enumeration
- Demonstrate Different Techniques for SNMP Enumeration
- Techniques for LDAP Enumeration
- Use Different Techniques for NTP and NFS Enumeration
- Demonstrate Different Techniques for SMTP and DNS Enumeration
- Demonstrate IPsec, VoIP, RPC, Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6, and BGP Enumeration
- Explain Enumeration Countermeasures
##### Module 5 - Vulnerability Analysis
- Summarize Vulnerability Assessment Concepts
- Explain Vulnerability Classification and Assessment Types
- Use Vulnerability Assessment Tools
- Analyze Vulnerability Assessment Reports
##### Module 6 - System Hacking
- Demonstrate Different Password Cracking and Vulnerability Exploitation Techniques to Gain Access to the System
- Use Different Privilege Escalation Techniques to Gain Administrative Privileges
- Use Different Techniques to Hide Malicious Programs and Maintain Remote Access to the System
- Demonstrate Techniques to Hide the Evidence of Compromise
##### Module 7 - Malware Threats
- Explain Malware and Malware Propagation Techniques
- Summarize Advanced Persistent Threat (APT) Concepts
- Explain Trojans, Their Types, and How They Infect Systems
- Explain Viruses and Worms, Their Types, and How They Infect Files
- Explain Fileless Malware Concepts
- Demonstrate Malware Analysis Process
- Explain Malware Countermeasures
- Demonstrate the Use of Anti-Malware Software
##### Module 8 - Sniffing
- Summarize Sniffing Concepts
- Demonstrate Different Sniffing Techniques
- Use Sniffing Tools
- Explain Sniffing Countermeasures
##### Module 9 - Social Engineering
- Summarize Social Engineering Concepts and Phases
- Explain Various Social Engineering Techniques
- Summarize Insider Threats
- Explain Impersonation on Social Networking Sites
- Explain Identity Theft
- Explain Social Engineering Countermeasures
##### Module 10 - Denial of Service
- Summarize DoS/DDoS Concepts
- Explain Botnet Network
- Demonstrate Different DoS/DDoS Attack Techniques
- Present DDoS Case Study
- Explain DoS/DDoS Attack Countermeasures
##### Module 11 - Session Hijacking
- Summarize Session Hijacking Concepts
- Explain Application-Level Session Hijacking
- Explain Network-Level Session Hijacking
- Use Session Hijacking Tools
- Explain Session Hijacking Countermeasures
##### Module 12 - Evading IDS, Firewalls, and Honeypots
- Summarize IDS, IPS, Firewall, and Honeypot Concepts
- Demonstrate IDS, IPS, Firewall, and Honeypot Solutions
- Demonstrate Different Techniques to Bypass IDS
- Demonstrate Different Techniques to Bypass Firewalls
- Demonstrate Different Techniques to Bypass NAC and Endpoint Security
- Use IDS/Firewall Evading Tools
- Demonstrate Different Techniques to Detect Honeypots
- Explain IDS/Firewall Evasion Countermeasures
##### Module 13 - Hacking Web Servers
- Summarize Web Server Concepts
- Demonstrate Different Web Server Attacks
- Explain Web Server Attack Methodology
- Explain Web Server Attack Countermeasures
- Summarize Patch Management Concepts
##### Module 14 - Hacking Web Applications
- Summarize Web Application Concepts
- Demonstrate Web Application Threats
- Explain Web Application Hacking Methodology
- Explain Web API, Webhooks, and Web Shell
- Summarize the Techniques used in Web Application Security
##### Module 15 - SQL Injection
- Summarize SQL Injection Concepts
- Demonstrate Various Types of SQL Injection Attacks
- Explain SQL Injection Methodology
- Use SQL Injection Tools
- Demonstrate Different Evasion Techniques
- Explain SQL Injection Countermeasures
##### Module 16 - Hacking Wireless Networks
- Summarize Wireless Concepts
- Explain Different Wireless Encryption Algorithms
- Explain Different Wireless Threats
- Demonstrate Wireless Hacking Methodology
- Use Wireless Hacking Tools
- Explain Various Bluetooth Hacking Techniques
- Explain Wireless Attack Countermeasures
- Use Wireless Security Tools
##### Module 17 - Hacking Mobile Platforms
- Explain Mobile Platform Attack Vectors
- Explain Various Android OS Threats and Attacks
- Explain Various iOS Threats and Attacks
- Summarize Mobile Device Management (MDM) Concepts
- Present Mobile Security Guidelines and Tools
##### Module 18 - IoT and OT Hacking
- Summarize IoT Concepts
- Explain IoT Attacks
- Explain IoT Hacking Methodology
- Explain IoT Attack Countermeasures
- Summarize OT Concepts
- Explain OT Attacks
- Explain OT Hacking Methodology
- Explain OT Attack Countermeasures
##### Module 19 - Cloud Computing
- Summarize Cloud Computing Concepts
- Explain Container Technology
- Explain Serverless Computing Concepts
- Explain Cloud Computing Threats
- Explain Cloud Hacking Methodology
- Explain Cloud Security
##### Module 20 - Cryptography
- Explain Cryptography Concepts
- Explain Different Encryption Algorithms
- Demonstrate Cryptography Tools
- Explain Public Key Infrastructure (PKI)
- Demonstrate Email Encryption
- Demonstrate Disk Encryption
- Explain Different Cryptanalysis Methods and Cryptography Attacks
- Explain Cryptography Attack Countermeasures