CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. This course was built to incorporate a unique, in-depth and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. This course comes with the CEH Elite Bundle: - eCourseware and next version eCourseware - Exam Voucher - 5 Exam Retakes - Exam Preparation - C|EH Practical - 6 Months Official Labs - C|EH Engage and Global Challenge - Ethical Hacking Video Library This course may be eligible for a Credly badge.

starstarstarstarstar

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

At the completion of this course, you will have an understanding of:

Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

1
  • MODULE 1 - INTRODUCTION TO ETHICAL HACKING

  • Information Security Overview

    Cyber Kill Chain Concepts

    Hacking Concepts

    Ethical Hacking Concepts

    Information Security Controls

    Information Security Laws and Standards


2
  • MODULE 2 - FOOT-PRINTING AND RECONNAISSANCE

  • Footprinting Concepts

    Footprinting through Search Engines

    Footprinting through Web Services

    Footprinting through Social Networking Sites

    Website Footprinting

    Email Footprinting

    Who is Footprinting

    DNS Footprinting

    Network Footprinting

    Footprinting through Social Engineering

    Footprinting Tools

    Footprinting Countermeasures


3
  • MODULE 3 - SCANNING NETWORKS

  • Network Scanning Concepts

    Scanning Tools

    Host Discovery

    Port and Service Discovery

    OS Discovery (Banner Grabbing/OS Fingerprinting)

    Scanning Beyond IDS and Firewall

    Draw Network Diagrams


4
  • MODULE 4 - ENUMERATION

  • Enumeration Concepts

    NetBIOS Enumeration

    SNMP Enumeration

    LDAP Enumeration

    NTP and NFS Enumeration

    SMTP and DNS Enumeration

    Other Enumeration Techniques

    Enumeration Countermeasures


5
  • MODULE 5 - VULNERABILITY ANALYSIS

  • Vulnerability Assessment Concepts

    Vulnerability Classification and Assessment Types

    Vulnerability Assessment Solutions and Tools

    Vulnerability Assessment Reports


6
  • MODULE 6 - SYSTEM HACKING

  • System Hacking Concepts

    Gaining Access

    Escalating Privileges

    Maintaining Access

    Clearing Logs


7
  • MODULE 7 - MALWARE THREATS

  • Malware Concepts

    APT Concepts

    Trojan Concepts

    Virus and Worm Concepts

    Fileless Malware Concepts

    Malware Analysis

    Countermeasures

    Anti-Malware Software


8
  • MODULE 8 - SNIFFING

  • Sniffing Concepts

    Sniffing Technique: MAC Attacks

    Sniffing Technique: DHCP Attacks

    Sniffing Technique: ARP Poisoning

    Sniffing Technique: Spoofing Attacks

    Sniffing Technique: DNS Poisoning

    Sniffing Tools

    Countermeasures

    Sniffing Detection Techniques


9
  • MODULE 9 - SOCIAL ENGINEERING

  • Social Engineering Concepts

    Social Engineering Techniques

    Insider Threats

    Impersonation on Social Networking Sites

    Identity Theft

    Countermeasures


10
  • MODULE 10 - DENIAL-OF-SERVICE

  • DoS/DDoS Concepts

    DoS/DDoS Attack Techniques

    BotnetsDDoS Case Study

    DoS/DDoS Attack Tools

    Countermeasures

    DoS/DDoS Protection Tools


11
  • MODULE 11 - SESSION HIJACKING

  • Session Hijacking Concepts

    Application Level Session Hijacking

    Network Level Session Hijacking

    Session Hijacking Tools

    Countermeasures


12
  • MODULE 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS

  • IDS, IPS, Firewall, and Honeypot Concepts

    IDS, IPS, Firewall, and Honeypot Solutions

    Evading IDS

    Evading Firewalls

    IDS/Firewall Evading Tools

    Detecting Honeypots

    IDS/Firewall Evasion Countermeasures


13
  • MODULE 13 - HACKING WEB SERVERS

  • Web Server Concepts

    Web Server Attacks

    Web Server Attack Methodology

    Web Server Attack Tools

    Countermeasures

    Patch Management

    Web Server Security Tools


14
  • MODULE 14 - HACKING WEB APPLICATIONS

  • Web Application Concepts

    Web Application Threats

    Web Application Hacking Methodology

    Web API, Webhooks, and Web Shell

    Web Application Security


15
  • MODULE 15 - SQL INJECTION

  • SQL Injection Concepts

    Types of SQL Injection

    SQL Injection Methodology

    SQL Injection Tools

    Evasion Techniques

    Countermeasures


16
  • MODULE 16 - HACKING WIRELESS NETWORKS

  • Wireless Concepts

    Wireless Encryption

    Wireless Threats

    Wireless Hacking Methodology

    Wireless Hacking Tools

    Bluetooth Hacking

    Countermeasures

    Wireless Security Tools


17
  • MODULE 17 - HACKING MOBILE PLATFORMS

  • Mobile Platform Attack Vectors

    Hacking Android OS

    Hacking iOS

    Mobile Device Management

    Mobile Security Guidelines and Tools


18
  • MODULE 18 - IOT AND OT HACKING

  • IoT Hacking

    IoT Concepts

    IoT Attacks

    IoT Hacking Methodology

    IoT Hacking Tools

    Countermeasures

    OT Hacking

    OT Concepts

    OT Attacks

    OT Hacking Methodology

    OT Hacking Tools

    Countermeasures


19
  • MODULE 19 - CLOUD COMPUTING

  • Cloud Computing Concepts

    Container Technology

    Serverless Computing

    Cloud Computing Threats

    Cloud Hacking

    Cloud Security


20
  • MODULE 20 - CRYPTOGRAPHY

  • Cryptography Concepts

    Encryption Algorithms

    Cryptography Tools

    Public Key Infrastructure (PKI)

    Email Encryption

    Disk Encryption

    Cryptanalysis

    Countermeasures


Audience

The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course comes with the complete EC-Council CEH Elite bundle. This all-encompassing content includes: eCourseware Exam voucher Next version eCourseware upon release Up to 5 exam retakes Access to 10 Ethical Hacking videos 6 months lab access CEH Engage Global CEH Challenge Exam preparation materials CEH Practical exam

Language

English

Prerequisites

It is suggested that you have the knowledge and working experience at the level of CompTIA Security+ and/or CompTIA Linux+ prior to taking this course.

$3,495

Length: 5.0 days (40 hours)

Level:

Not Your Location? Change

Course Schedule:

Schedule select
30
Oct
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
04
Dec
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
29
Jan
Monday
9:00 AM ET -
5:00 PM ET
Available
Schedule select
11
Mar
Monday
8:00 AM PT -
4:00 PM PT
Available
Schedule select
29
Apr
Monday
9:00 AM ET -
5:00 PM ET
Available
Loading...