Certified Ethical Hacker v12 (CEH) Certification Training Course

Course Package
Official Training Material from EC-Council
Exam Voucher by EC-Council
Official Certified Ethical Hacker v12 (CEH) E-Book
Live Instructor-Led Sessions
Real Life Examples & Case Studies
Highly Experienced & Accredited Instructor
Target Audience for Certified Ethical Hacker v12 Course
-
Cybersecurity Auditor
-
IT Security Administrator
-
Cyber Defense Analyst
-
Vulnerability Assessment Analyst
-
Information Security Analyst 1
-
Security Analyst L1
-
Infosec Security Administrator
-
Cybersecurity Analyst level 1, level 2, & level 3
-
Network Security Engineer
-
SOC Security Analyst
-
Cybersecurity Consultant
Pre-requisites of Certified Ethical Hacker v12 (CEH) Certification Training
-
Knowledge of networking and operating systems
-
Basic programming knowledge is required.
-
The minimum age for appearing for the exam or applying for the training is restricted to no less than 18 years.
-
Thus, candidates who fall in the right age category and possess relevant networking knowledge can apply for the course and complete their certification.
CEH Exam Preparation and Certification Information
- Exam Prefix 312-50 (ECC Exam), 312-50 (VUE)
- Exam Title Certified Ethical Hacker (ANSI)
- Exam TypeMultiple-choice
- Total Questions - 125
- Exam Duration 4 Hours
- Passing Score 60% to 85%
- Languages English
Certified Ethical Hacker v12 CEH Certification Journey
Learning Objectives of Certified Ethical Hacker v12 Training
After completing this course, you will be able to:
-
Information security controls, laws, and standards
-
Various types of footprinting, footprinting tools, and countermeasures
-
Network scanning techniques and scanning countermeasures
-
Enumeration techniques and enumeration countermeasures
-
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
-
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
-
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
-
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
-
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
-
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
-
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
-
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
-
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
-
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
-
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
-
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools
-
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures
-
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools
-
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
-
Threats to IoT and OT platforms and defending IoT and OT devices
-
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Course Outline
- Information Security Overview
- Hacking Methodologies and Frameworks
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Information Security Laws and Standards
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures