top of page

CERTIFIED ETHICAL HACKING (CEH) V12

PRICE

₹ 50,000 

DURATION

40 HOURS / 5 DAYS

LEVEL

PROFESSIONAL

TOTAL STEPS INVOLVED
48 (FORTY EIGHT)

COURSE DETAILS

Pre-requisite

No prerequisites for the CEH certification, having a foundational understanding of computer programming and information security basics can be advantageous and provide a boost to candidates. 

​

Objective

The Certified Ethical Hacker (CEH) course is tailored for individuals looking to enter the cybersecurity field or advance their careers as ethical hackers, penetration testers, or security professionals. Through this course, participants will develop a deep understanding of ethical hacking methodologies, tools, and techniques to identify and mitigate cybersecurity threats proactively.

​

The objective of this course is to prepare the candidates in acquiring comprehensive understanding of:

​

  1. Introduction to Ethical Hacking

  2. Foot Printing and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. Vulnerability Analysis

  6. System Hacking

  7. Malware Threats

  8. Sniffing

  9. Social Engineering

  10. Denial-of-Service

  11. Session Hijacking

  12. Evading IPS, Firewalls and Honeypots

  13. Hacking Web Servers

  14. Hacking Web Applications

  15. SQL Injection

  16. Hacking Wireless Networks

  17. Hacking Mobile Platforms

  18. IoT and OT Hacking

  19. Cloud Computing

  20. Cryptography

​

​

Outcome

Upon completion of the CEH course, participants will possess the knowledge and skills required to ethically hack and secure systems, networks, and applications. They will be prepared to take the CEH certification exam and demonstrate their expertise in ethical hacking. Additionally, successful completion of the course will provide participants with a globally recognized certification, validating their capabilities as ethical hackers and enhancing their career prospects in the cybersecurity industry.

CURRICULLUM

LESSON 1

Introduction to Ethical Hacking

LESSON 3

Scanning Networks

LESSON 2

Foot Printing and Reconnaissance

LESSON 4

Enumeration

LESSON 5

Vulnerability Analysis

LESSON 6

System Hacking

LESSON 7

Malware Threats

LESSON 8

Sniffing

LESSON 9

Social Engineering

LESSON 10

Denial-of-Service

LESSON 11

Session Hijacking

LESSON 12

Evading IPS, Firewalls and Honeypots

LESSON 13

Hacking Web Servers

LESSON 14

Hacking Web Applications

LESSON 15

SQL Injection

LESSON 16

Hacking Wireless Networks

LESSON 17

Hacking Mobile Platforms

LESSON 18

IoT and OT Hacking

LESSON 19

Cloud Computing 

LESSON 20

Cryptography

bottom of page