Preparation Course: Certified Ethical Hacker
Accreditation Number: 115391273 - Ethical Hacker (EH)
The
general objectives for the Certified Ethical Hacker (CEH) course typically
revolve around providing participants with comprehensive knowledge and
practical skills related to ethical hacking and cybersecurity. The course aims
to equip individuals with the necessary tools and techniques to identify
vulnerabilities and weaknesses in computer systems, networks, and applications
in order to improve their security.
Overall, the CEH course aims to equip participants with a
comprehensive skill set that allows them to identify vulnerabilities, assess
risks, and implement effective security measures to protect computer systems
and networks from potential threats. It emphasizes ethical and responsible
hacking practices to enhance cybersecurity posture and safeguard digital
assets.
By the end of
this course, participants will be able to:
•
Understand Ethical Hacking by Gain a solid
understanding of the ethical hacking mindset, principles, and legal aspects
involved in ethical hacking and penetration testing.
•
Knows Information Security Fundamentals
within Develop a strong foundation in information security concepts, including
confidentiality, integrity, and availability, as well as the CIA triad
(Confidentiality, Integrity, Availability).
•
Make Foot printing and Reconnaissance by
Learn how to gather information about a target system or network using various foot
printing and reconnaissance techniques, and understand the importance of
information gathering in ethical hacking.
•
Scan and Enumeration: Acquire knowledge
about network scanning tools and techniques to identify active hosts, open
ports, and services, followed by enumeration techniques to gather more
information about the target.
•
Vulnerability Analysis: Learn how to
identify and assess vulnerabilities in target systems and networks, and
understand the significance of vulnerability analysis in ethical hacking.
•
Understand System Hacking: Explore
techniques to gain unauthorized access to target systems, including password
cracking, privilege escalation, and backdoor attacks, while understanding
defensive mechanisms.
•
Knows Malware Threats: Understand
different types of malware, such as viruses, worms, Trojans, and ransomware,
and learn how to analyze and counteract their impact.
•
Understand Network Traffic Analysis: Gain insights
into network sniffing techniques, tools, and countermeasures to analyze and
secure network traffic.
•
Understand Social Engineering: Explore
psychological manipulation techniques used by attackers to exploit human
behavior and gain unauthorized access and learn how to defend against social
engineering attacks.
•
Understand Denial of Service (DoS)
Attacks: Understand DoS and DDoS attack methods, their impact on systems and
networks, and strategies to mitigate and prevent such attacks.
•
Understand Session Hijacking: Learn how
attackers can hijack user sessions and implement countermeasures to prevent
session hijacking attacks.
•
Understand Web Application Security:
Develop skills to identify vulnerabilities in web applications, including
injection attacks, cross-site scripting (XSS), and cross-site request forgery
(CSRF), and understand methods to secure web applications.
•
Understand Wireless Network Security:
Explore wireless network vulnerabilities and encryption protocols and learn
how to secure wireless networks effectively.
Course Curriculum
- Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking,
- information security controls, .
- relevant laws, and standard procedures
- Learn how to use the latest techniques and tools to perform foot printing and reconnaissance,
- a critical pre-attack phase of the ethical hacking process.
- Learn different network scanning techniques and countermeasures
- Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures
- Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems
- Different types of vulnerability assessment and vulnerability assessment tools.
- Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks
- discover system and network vulnerabilities.
- Learn different types of malware (Trojan, virus, worms, etc.)
- APT and fileless malware, malware analysis procedure, and malware countermeasures
- Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
- Learn social engineering concepts and techniques
- how to identify theft attempts, audit human-level vulnerabilities
- suggest social engineering countermeasures.
- Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques
- tools used to audit a target and devise DoS and DDoS countermeasures and protections
- Understand the various session hijacking techniques
- discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
- Get introduced to firewall, intrusion detection system
- honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures
- Learn about web server attacks, including a comprehensive attack methodology
- audit vulnerabilities in web server infrastructures and countermeasures
- Learn about web application attacks, including a comprehensive web application hacking methodology use
- Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures
- Understand different types of wireless technologies
- encryption, threats, hacking methodologies, hacking tools, Wi-Fi security tools, and countermeasures
- Learn Mobile platform attack vector, android and iOS hacking
- mobile device management, mobile security guidelines, and security tools.
- Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
- Learn different cloud computing concepts, such as container technologies and server less computing
- various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools
- Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI),
- email encryption, disk encryption, cryptography attacks, and cryptanalysis tools
Instructor
Trainer-admin
Trainees Feedback
Reviews