The general objectives for the Certified Ethical Hacker (CEH) course typically revolve around providing participants with comprehensive knowledge and practical skills related to ethical hacking and cybersecurity. The course aims to equip individuals with the necessary tools and techniques to identify vulnerabilities and weaknesses in computer systems, networks, and applications in order to improve their security.

Overall, the CEH course aims to equip participants with a comprehensive skill set that allows them to identify vulnerabilities, assess risks, and implement effective security measures to protect computer systems and networks from potential threats. It emphasizes ethical and responsible hacking practices to enhance cybersecurity posture and safeguard digital assets.

By the end of this course, participants will be able to:

         Understand Ethical Hacking by Gain a solid understanding of the ethical hacking mindset, principles, and legal aspects involved in ethical hacking and penetration testing.

         Knows Information Security Fundamentals within Develop a strong foundation in information security concepts, including confidentiality, integrity, and availability, as well as the CIA triad (Confidentiality, Integrity, Availability).

         Make Foot printing and Reconnaissance by Learn how to gather information about a target system or network using various foot printing and reconnaissance techniques, and understand the importance of information gathering in ethical hacking.

         Scan and Enumeration: Acquire knowledge about network scanning tools and techniques to identify active hosts, open ports, and services, followed by enumeration techniques to gather more information about the target.

         Vulnerability Analysis: Learn how to identify and assess vulnerabilities in target systems and networks, and understand the significance of vulnerability analysis in ethical hacking.

         Understand System Hacking: Explore techniques to gain unauthorized access to target systems, including password cracking, privilege escalation, and backdoor attacks, while understanding defensive mechanisms.

         Knows Malware Threats: Understand different types of malware, such as viruses, worms, Trojans, and ransomware, and learn how to analyze and counteract their impact.

         Understand Network Traffic Analysis: Gain insights into network sniffing techniques, tools, and countermeasures to analyze and secure network traffic.

         Understand Social Engineering: Explore psychological manipulation techniques used by attackers to exploit human behavior and gain unauthorized access and learn how to defend against social engineering attacks.

         Understand Denial of Service (DoS) Attacks: Understand DoS and DDoS attack methods, their impact on systems and networks, and strategies to mitigate and prevent such attacks.

         Understand Session Hijacking: Learn how attackers can hijack user sessions and implement countermeasures to prevent session hijacking attacks.

         Understand Web Application Security: Develop skills to identify vulnerabilities in web applications, including injection attacks, cross-site scripting (XSS), and cross-site request forgery (CSRF), and understand methods to secure web applications.

         Understand Wireless Network Security: Explore wireless network vulnerabilities and encryption protocols and learn how to secure wireless networks effectively.

Course Curriculum

9 Lectures
Module 1 - Introduction to Ethical Hacking - Foot Printing and Reconnaissance
  • Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking,
  • information security controls, .
  • relevant laws, and standard procedures
  • Learn how to use the latest techniques and tools to perform foot printing and reconnaissance,
  • a critical pre-attack phase of the ethical hacking process.
Module 2 - Scanning Networks, Enumeration, Vulnerability Analysis & System Hacking
  • Learn different network scanning techniques and countermeasures
  • Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures
  • Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems
  • Different types of vulnerability assessment and vulnerability assessment tools.
  • Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks
  • discover system and network vulnerabilities.
Module 3 - Malware Threats & Sniffing
  • Learn different types of malware (Trojan, virus, worms, etc.)
  • APT and fileless malware, malware analysis procedure, and malware countermeasures
  • Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
Module 4 - Social Engineering & Denial-of-Service
  • Learn social engineering concepts and techniques
  • how to identify theft attempts, audit human-level vulnerabilities
  • suggest social engineering countermeasures.
  • Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques
  • tools used to audit a target and devise DoS and DDoS countermeasures and protections
Module 5 - Session Hijacking, Evading IDS, Firewalls, and Honeypots
  • Understand the various session hijacking techniques
  • discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
  • Get introduced to firewall, intrusion detection system
  • honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures
Module 6 - Hacking Web Servers & Web Applications
  • Learn about web server attacks, including a comprehensive attack methodology
  • audit vulnerabilities in web server infrastructures and countermeasures
  • Learn about web application attacks, including a comprehensive web application hacking methodology use
Module 7 - SQL Injection & Hacking Wireless Networks
  • Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures
  • Understand different types of wireless technologies
  • encryption, threats, hacking methodologies, hacking tools, Wi-Fi security tools, and countermeasures
Module 8 - Hacking Mobile Platforms & IoT Hacking
  • Learn Mobile platform attack vector, android and iOS hacking
  • mobile device management, mobile security guidelines, and security tools.
  • Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
Module 9 - Cloud Computing & Cryptography
  • Learn different cloud computing concepts, such as container technologies and server less computing
  • various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools
  • Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI),
  • email encryption, disk encryption, cryptography attacks, and cryptanalysis tools

Instructor

image
Trainer-admin

3.1
Rating
Reviews
20
trainees
32
Courses

frontend.Files & Links

frontend.Files & Links

Trainees Feedback

3.1
Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

Reviews

login in Or Register as Trainer