Traincrest-logo
Traincrest-logo

Certified Ethical Hacker v12 (CEH v12) Course Overview

The Certified Ethical Hacker v12 (CEH v12) is a comprehensive training program that equips individuals with the skills and knowledge necessary to identify vulnerabilities in computer systems and networks and assess their security posture. This course focuses on ethical hacking techniques and tools used by cybersecurity professionals to detect and prevent potential threats.


Course Introduction

Price:

USD 1500

Duration:

40 Hrs.

The CEH v12 training is suitable for individuals who are interested in pursuing a career in cybersecurity, including:

  • Network and System Administrators
  • Security Professionals
  • IT Managers
  • Penetration Testers
  • Ethical Hackers
  • Cybersecurity Analysts
  • Security Consultants
  • Any individuals responsible for ensuring the security of computer systems and networks

Active Directory Training Prerequisites:

  • Experience with AD DS concepts and technologies.
  • Experience working with and configuring Windows Server 2012.
  • Experience working with and troubleshooting core networking infrastructure technologies such as name resolution, IP Addressing, Domain Name System and Dynamic Host Configuration Protocol.
  • Experience working with Microsoft® Hyper-V® and basic Server Virtualization concepts.
  • An awareness of basic security best practices.
  • Experience working with Windows® Client operating systems such as Windows Vista®, Windows 7 or Windows 8. Students who attend this training can meet the prerequisites by attending the following courses, or obtaining equivalent knowledge and skills:
  • 10967A: Fundamentals of a Windows Server Infrastructure
**Module 1: Introduction to Ethical Hacking**
- Information Security Overview
- Cyber Kill Chain Concepts
- Hacking Concepts
- Ethical Hacking Metaphor
- Types of Hackers
- White Hat, Black Hat, Gray Hat
- Hacktivism
- Skills of an Ethical Hacker
- The Legal Framework
- Penetration Testing Methodologies

**Module 2: Footprinting and Reconnaissance**
- Footprinting Concepts and Methodology
- DNS Reconnaissance
- Footprinting Tools and Countermeasures
- Social Engineering Reconnaissance
- Footprinting through Search Engines
- Footprinting through Websites and Web Services
- Network Footprinting
- Footprinting the Social Web

**Module 3: Scanning Networks**
- Network Scanning Concepts
- Port Scanning Techniques
- Network Scanning Tools and Methodologies
- Vulnerability Scanning
- Drawing Network Diagrams
- Preparing Proxies
- Scanning for Vulnerabilities
- Post-Scan Actions

**Module 4: Enumeration**
- Overview of Network Enumeration
- Techniques for Network Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Enumeration Countermeasures

**Module 5: Vulnerability Analysis**
- Vulnerability Analysis Fundamentals
- Vulnerability Classification and Assessment
- Automated Vulnerability Analysis Tools
- Basics of Risk Assessment
- Assessment and Planning Tools
- Common Vulnerabilities and Exposures (CVE)

**Module 6: System Hacking**
- System Hacking Concepts
- Cracking Passwords and Escalating Privileges
- Executing Applications
- Hiding Files and Covering Tracks
- Maintaining Access with Backdoors
- Automated Rootkit and Spyware Detection

**Module 7: Malware Threats**
- Malware Anatomy
- Types of Malware
- Malware Analysis and Countermeasures
- Trojans, Viruses, and Worms
- Malware in Mobile
- Ransomware
- Reverse Engineering Malware

**Module 8: Sniffing**
- Sniffing Techniques
- MAC Attacks
- ARP Poisoning
- Spoofing Attacks
- Session Hijacking
- Sniffing Tools
- Sniffing Detection and Defense

**Module 9: Social Engineering**
- Social Engineering Concepts
- Types of Social Engineering
- Computer-Based Social Engineering
- Person-Based Social Engineering
- Social Engineering Countermeasures
- Identity Theft

**Module 10: Denial-of-Service**
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DoS/DDoS Attack Tools
- Countermeasures for DoS/DDoS Attacks

**Module 11: Session Hijacking**
- Session Hijacking Concepts
- Network Level Session Hijacking
- Session Hijacking at the Application Level
- Session Hijacking Tools and Countermeasures

**Module 12: Evading IDS, Firewalls, and Honeypots**
- IDS, Firewall, and Honeypot Concepts
- IDS, Firewall, and Honeypot Solutions
- Evasion Techniques
- Intrusion Detection Systems
- Firewall and Honeypot Evasion

**Module 13: Hacking Web Servers**
- Web Server Concepts
- Web Server Attacks
- Webserver Attack Methodology
- Tools to Attack Web Servers
- Patch Management and Countermeasures

**Module 14: Hacking Web Applications**
- Web Application Concepts
- Web App Threats
- Web App Hacking Methodology
- Web Application Hacking Tools
- Countermeasures and Security Tools

**Module 15: SQL Injection**
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Countermeasures for SQL Injection

**Module 16: Hacking Wireless Networks**
- Wireless Networking Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Wi-Fi Security Tools

**Module 17: Hacking Mobile Platforms**
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools

**Module 18: IoT and OT Hacking**
- IoT and OT Concepts
- IoT and OT Threats
- Hacking IoT and OT Devices
- Securing IoT and OT Devices

**Module 19: Cloud Computing**
- Cloud Computing Concepts
- Cloud Computing Threats
- Hacking Cloud Computing
- Cloud Security
- Cloud Security Tools

**Module 20: Cryptography**
- Introduction to Cryptography
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Cryptanalysis
- Email and Disk Encryption
- Secure Cryptography Practices

Please note that the above content is an outline for educational purposes and may need to be adapted to the specific curriculum and updated policies of the Certified Ethical Hacker program (CEH v12). The actual CEH course may have additional labs, tools, and detailed subject matter guidelines that are required to prepare for the CEH certification.

Suggested Courses

Request More Information

Email:   Whatsapp:

Testimonials

What our Students Saysddd