CERTIFIED ETHICAL HACKING (CEH) V12
PRICE
₹ 50,000
DURATION
40 HOURS / 5 DAYS
LEVEL
PROFESSIONAL
TOTAL STEPS INVOLVED
48 (FORTY EIGHT)
COURSE DETAILS
Pre-requisite
No prerequisites for the CEH certification, having a foundational understanding of computer programming and information security basics can be advantageous and provide a boost to candidates.
​
Objective
The Certified Ethical Hacker (CEH) course is tailored for individuals looking to enter the cybersecurity field or advance their careers as ethical hackers, penetration testers, or security professionals. Through this course, participants will develop a deep understanding of ethical hacking methodologies, tools, and techniques to identify and mitigate cybersecurity threats proactively.
​
The objective of this course is to prepare the candidates in acquiring comprehensive understanding of:
​
-
Introduction to Ethical Hacking
-
Foot Printing and Reconnaissance
-
Scanning Networks
-
Enumeration
-
Vulnerability Analysis
-
System Hacking
-
Malware Threats
-
Sniffing
-
Social Engineering
-
Denial-of-Service
-
Session Hijacking
-
Evading IPS, Firewalls and Honeypots
-
Hacking Web Servers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
IoT and OT Hacking
-
Cloud Computing
-
Cryptography
​
​
Outcome
Upon completion of the CEH course, participants will possess the knowledge and skills required to ethically hack and secure systems, networks, and applications. They will be prepared to take the CEH certification exam and demonstrate their expertise in ethical hacking. Additionally, successful completion of the course will provide participants with a globally recognized certification, validating their capabilities as ethical hackers and enhancing their career prospects in the cybersecurity industry.
CURRICULLUM
LESSON 1
Introduction to Ethical Hacking
LESSON 3
Scanning Networks
LESSON 2
Foot Printing and Reconnaissance
LESSON 4
Enumeration
LESSON 5
Vulnerability Analysis
LESSON 6
System Hacking
LESSON 7
Malware Threats
LESSON 8
Sniffing
LESSON 9
Social Engineering
LESSON 10
Denial-of-Service
LESSON 11
Session Hijacking
LESSON 12
Evading IPS, Firewalls and Honeypots
LESSON 13
Hacking Web Servers
LESSON 14
Hacking Web Applications
LESSON 15
SQL Injection
LESSON 16
Hacking Wireless Networks
LESSON 17
Hacking Mobile Platforms
LESSON 18
IoT and OT Hacking
LESSON 19
Cloud Computing
LESSON 20