+1800 419 8722
+1-307-387-5278
Courses

 

Course Package

Official Training Material from EC-Council

Exam Voucher by EC-Council

Official Certified Ethical Hacker v12 (CEH) E-Book

Live Instructor-Led Sessions

Real Life Examples & Case Studies

Highly Experienced & Accredited Instructor

 

Target Audience for Certified Ethical Hacker v12 Course

 

  • Cybersecurity Auditor 

  • IT Security Administrator 

  • Cyber Defense Analyst 

  • Vulnerability Assessment Analyst 

  • Information Security Analyst 1 

  • Security Analyst L1 

  • Infosec Security Administrator 

  • Cybersecurity Analyst level 1, level 2, & level 3 

  • Network Security Engineer 

  • SOC Security Analyst 

  • Cybersecurity Consultant 

 

Pre-requisites of Certified Ethical Hacker v12 (CEH) Certification Training

 

  • Knowledge of networking and operating systems 

  • Basic programming knowledge is required. 

  • The minimum age for appearing for the exam or applying for the training is restricted to no less than 18 years.  

  • Thus, candidates who fall in the right age category and possess relevant networking knowledge can apply for the course and complete their certification. 

 

CEH Exam Preparation and Certification Information 

 

  • Exam Prefix 312-50 (ECC Exam), 312-50 (VUE) 
  • Exam Title Certified Ethical Hacker (ANSI) 
  • Exam TypeMultiple-choice 
  • Total Questions - 125 
  • Exam Duration 4 Hours 
  • Passing Score 60% to 85% 
  • Languages English 

 


Certified Ethical Hacker v12 CEH Certification Journey 

 

Course Outline

Introduction to Ethical Hacking
  • Information Security Overview 
  • Hacking Methodologies and Frameworks 
  • Hacking Concepts 
  • Ethical Hacking Concepts 
  • Information Security Controls 
  • Information Security Laws and Standards
Footprinting and Reconnaissance
  • Footprinting Concepts 
  • Footprinting through Search Engines 
  • Footprinting through Web Services 
  • Footprinting through Social Networking Sites 
  • Website Footprinting 
  • Email Footprinting 
  • Whois Footprinting 
  • DNS Footprinting 
  • Network Footprinting 
  • Footprinting through Social Engineering 
  • Footprinting Tools 
  • Footprinting Countermeasures 
Scanning Networks
  • Network Scanning Concepts 
  • Scanning Tools 
  • Host Discovery 
  • Port and Service Discovery 
  • OS Discovery (Banner Grabbing/OS Fingerprinting) 
  • Scanning Beyond IDS and Firewall 
  • Network Scanning Countermeasures 
Enumeration
  • Enumeration Concepts 
  • NetBIOS Enumeration 
  • SNMP Enumeration 
  • LDAP Enumeration 
  • NTP and NFS Enumeration 
  • SMTP and DNS Enumeration 
  • Other Enumeration Techniques 
  • Enumeration Countermeasures 
Vulnerability Analysis
  • Vulnerability Assessment Concepts 
  • Vulnerability Classification and Assessment Types 
  • Vulnerability Assessment Tools 
  • Vulnerability Assessment Reports 
System Hacking
  • Gaining Access 
  • Escalating Privileges 
  • Maintaining Access 
  • Clearing Logs 
Malware Threats
  •  
  • Malware Concepts 
  • APT Concepts 
  • Trojan Concepts 
  • o Worm Makers 
  • Fileless Malware Concepts 
  • Malware Analysis 
  • Malware Countermeasures 
  • Anti-Malware Software 
  •  
Sniffing
  • Sniffing Concepts 
  • Sniffing Technique: MAC Attacks 
  • Sniffing Technique: DHCP Attacks 
  • Sniffing Technique: ARP Poisoning 
  • Sniffing Technique: Spoofing Attacks 
  • Sniffing Technique: DNS Poisoning 
  • Sniffing Tools 
Social Engineering
  • Social Engineering Concepts 
  • Social Engineering Techniques 
  • Insider Threats 
  • Impersonation on Social Networking Sites 
  • Identity Theft 
  • Social Engineering Countermeasures 
Denial-of-Service
  • DoS/DDoS Concepts 
  • Botnets 
  • DoS/DDoS Attack Techniques 
  • DDoS Case Study 
  • DoS/DDoS Attack Countermeasures 
Session Hijacking
  • Session Hijacking Concepts 
  • Application-Level Session Hijacking 
  • Network-Level Session Hijacking 
  • Session Hijacking Tools 
  • Session Hijacking Countermeasures 
Evading IDS, Firewalls, and Honeypots 
  • IDS, IPS, Firewall, and Honeypot Concepts 
  • IDS, IPS, Firewall, and Honeypot Solutions 
  • Evading IDS 
  • Evading Firewalls 
  • Evading NAC and Endpoint Security 
  • IDS/Firewall Evading Tools 
  • Detecting Honeypots 
  • IDS/Firewall Evasion Countermeasures 
Hacking Web Servers
  • Web Server Concepts 
  • Web Server Attacks 
  • Web Server Attack Methodology 
  • Web Server Attack Countermeasures 
Hacking Web Applications
  • Web Application Concepts 
  • Web Application Threats 
  • Web Application Hacking Methodology 
  • Web API, Webhooks, and Web Shell 
  • Web Application Security 
SQL Injection 
  • SQL Injection Concepts 
  • Types of SQL Injection 
  • SQL Injection Methodology 
  • SQL Injection Tools 
  • SQL Injection Countermeasures 
Hacking Wireless Networks
  • Wireless Concepts 
  • Wireless Encryption 
  • Wireless Threats 
  • Wireless Hacking Methodology 
  • Wireless Hacking Tools 
  • Bluetooth Hacking 
  • Wireless Attack Countermeasures 
  • Wireless Security Tools 
Hacking Mobile Platforms
  • Mobile Platform Attack Vectors 
  • Hacking Android OS 
  • Hacking iOS 
  • Mobile Device Management 
  • Mobile Security Guidelines and Tools 
IoT and OT Hacking
  • IoT Hacking 
  • IoT Concepts 
  • IoT Attacks 
  • IoT Hacking Methodology 
  • OT Hacking 
  • OT Concepts 
  • OT Attacks 
  • OT Hacking Methodology 
Cloud Computing
  • Cloud Computing Concepts 
  • Container Technology 
  • Manipulating CloudTrial Service 
  • Cloud Security 
Cryptography
  • Cryptography Concepts 
  • Encryption Algorithms 
  • Cryptography Tools 
  • Email Encryption 
  • Disk Encryption 
  • Cryptanalysis 
  • Cryptography Attack Countermeasures 

Why Knowlathon

Brain icon
Established Expertise
Since 2013, Knowlathon has been offering high-quality training programs.
Brain icon
Client-Centric Approach
By prioritizing the unique needs and goals of each client, we deliver training solutions that drive tangible results.
Brain icon
Global Reach
Knowlathon has established itself as a trusted partner in IT training, helping individuals and businesses achieve their goals on a global scale.
Brain icon
Experienced Professionals
With deep industry knowledge and extensive expertise, our trainers bring real-world insights and practical skills to their courses.
Brain icon
Quality Commitment
We ensure that all training materials and methodologies meet industry benchmarks for excellence.
Brain icon
Strong Support
Our dedicated support team ensures a seamless and enriching learning experience.
Brain icon
K-Prime Warranty *
We are the 1st & only learning company to offer unlimited learning warranty on our courses.

Student feedback

4.8
Course Rating
70%
15%
20%
3%
2%

Write a Review

What is the experience of taking a course like?