07314600600
+1-307-387-5278
Courses

 

Course Package

Official Training Material from EC-Council

Exam Voucher by EC-Council

Official Certified Ethical Hacker v12 (CEH) E-Book

Live Instructor-Led Sessions

Real Life Examples & Case Studies

Highly Experienced & Accredited Instructor

 

Target Audience for Certified Ethical Hacker v12 Course

 

  • Cybersecurity Auditor 

  • IT Security Administrator 

  • Cyber Defense Analyst 

  • Vulnerability Assessment Analyst 

  • Information Security Analyst 1 

  • Security Analyst L1 

  • Infosec Security Administrator 

  • Cybersecurity Analyst level 1, level 2, & level 3 

  • Network Security Engineer 

  • SOC Security Analyst 

  • Cybersecurity Consultant 

 

Pre-requisites of Certified Ethical Hacker v12 (CEH) Certification Training

 

  • Knowledge of networking and operating systems 

  • Basic programming knowledge is required. 

  • The minimum age for appearing for the exam or applying for the training is restricted to no less than 18 years.  

  • Thus, candidates who fall in the right age category and possess relevant networking knowledge can apply for the course and complete their certification. 

 

CEH Exam Preparation and Certification Information 

 

  • Exam Prefix 312-50 (ECC Exam), 312-50 (VUE) 
  • Exam Title Certified Ethical Hacker (ANSI) 
  • Exam TypeMultiple-choice 
  • Total Questions - 125 
  • Exam Duration 4 Hours 
  • Passing Score 60% to 85% 
  • Languages English 

 


Certified Ethical Hacker v12 CEH Certification Journey 

 

Course Outline

Introduction to Ethical Hacking
  • Information Security Overview 
  • Hacking Methodologies and Frameworks 
  • Hacking Concepts 
  • Ethical Hacking Concepts 
  • Information Security Controls 
  • Information Security Laws and Standards
Footprinting and Reconnaissance
  • Footprinting Concepts 
  • Footprinting through Search Engines 
  • Footprinting through Web Services 
  • Footprinting through Social Networking Sites 
  • Website Footprinting 
  • Email Footprinting 
  • Whois Footprinting 
  • DNS Footprinting 
  • Network Footprinting 
  • Footprinting through Social Engineering 
  • Footprinting Tools 
  • Footprinting Countermeasures 
Scanning Networks
  • Network Scanning Concepts 
  • Scanning Tools 
  • Host Discovery 
  • Port and Service Discovery 
  • OS Discovery (Banner Grabbing/OS Fingerprinting) 
  • Scanning Beyond IDS and Firewall 
  • Network Scanning Countermeasures 
Enumeration
  • Enumeration Concepts 
  • NetBIOS Enumeration 
  • SNMP Enumeration 
  • LDAP Enumeration 
  • NTP and NFS Enumeration 
  • SMTP and DNS Enumeration 
  • Other Enumeration Techniques 
  • Enumeration Countermeasures 
Vulnerability Analysis
  • Vulnerability Assessment Concepts 
  • Vulnerability Classification and Assessment Types 
  • Vulnerability Assessment Tools 
  • Vulnerability Assessment Reports 
System Hacking
  • Gaining Access 
  • Escalating Privileges 
  • Maintaining Access 
  • Clearing Logs 
Malware Threats
  •  
  • Malware Concepts 
  • APT Concepts 
  • Trojan Concepts 
  • o Worm Makers 
  • Fileless Malware Concepts 
  • Malware Analysis 
  • Malware Countermeasures 
  • Anti-Malware Software 
  •  
Sniffing
  • Sniffing Concepts 
  • Sniffing Technique: MAC Attacks 
  • Sniffing Technique: DHCP Attacks 
  • Sniffing Technique: ARP Poisoning 
  • Sniffing Technique: Spoofing Attacks 
  • Sniffing Technique: DNS Poisoning 
  • Sniffing Tools 
Social Engineering
  • Social Engineering Concepts 
  • Social Engineering Techniques 
  • Insider Threats 
  • Impersonation on Social Networking Sites 
  • Identity Theft 
  • Social Engineering Countermeasures 
Denial-of-Service
  • DoS/DDoS Concepts 
  • Botnets 
  • DoS/DDoS Attack Techniques 
  • DDoS Case Study 
  • DoS/DDoS Attack Countermeasures 
Session Hijacking
  • Session Hijacking Concepts 
  • Application-Level Session Hijacking 
  • Network-Level Session Hijacking 
  • Session Hijacking Tools 
  • Session Hijacking Countermeasures 
Evading IDS, Firewalls, and Honeypots 
  • IDS, IPS, Firewall, and Honeypot Concepts 
  • IDS, IPS, Firewall, and Honeypot Solutions 
  • Evading IDS 
  • Evading Firewalls 
  • Evading NAC and Endpoint Security 
  • IDS/Firewall Evading Tools 
  • Detecting Honeypots 
  • IDS/Firewall Evasion Countermeasures 
Hacking Web Servers
  • Web Server Concepts 
  • Web Server Attacks 
  • Web Server Attack Methodology 
  • Web Server Attack Countermeasures 
Hacking Web Applications
  • Web Application Concepts 
  • Web Application Threats 
  • Web Application Hacking Methodology 
  • Web API, Webhooks, and Web Shell 
  • Web Application Security 
SQL Injection 
  • SQL Injection Concepts 
  • Types of SQL Injection 
  • SQL Injection Methodology 
  • SQL Injection Tools 
  • SQL Injection Countermeasures 
Hacking Wireless Networks
  • Wireless Concepts 
  • Wireless Encryption 
  • Wireless Threats 
  • Wireless Hacking Methodology 
  • Wireless Hacking Tools 
  • Bluetooth Hacking 
  • Wireless Attack Countermeasures 
  • Wireless Security Tools 
Hacking Mobile Platforms
  • Mobile Platform Attack Vectors 
  • Hacking Android OS 
  • Hacking iOS 
  • Mobile Device Management 
  • Mobile Security Guidelines and Tools 
IoT and OT Hacking
  • IoT Hacking 
  • IoT Concepts 
  • IoT Attacks 
  • IoT Hacking Methodology 
  • OT Hacking 
  • OT Concepts 
  • OT Attacks 
  • OT Hacking Methodology 
Cloud Computing
  • Cloud Computing Concepts 
  • Container Technology 
  • Manipulating CloudTrial Service 
  • Cloud Security 
Cryptography
  • Cryptography Concepts 
  • Encryption Algorithms 
  • Cryptography Tools 
  • Email Encryption 
  • Disk Encryption 
  • Cryptanalysis 
  • Cryptography Attack Countermeasures 

Student feedback

4.8
Course Rating
70%
15%
20%
3%
2%

Write a Review

What is the experience of taking a course like?