Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Categories: Offensive Security
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

 

 

Introduction

This course provides an in-depth look at the daily roles and responsibilities of a security analyst in any organization. Bridging the gap between theoretical knowledge and real-world application, this course offers practical insights into the real-time aspects of cybersecurity, equipping you to operate effectively in any corporate environment.Prerequisites

  • Any Bachelor’s degree
  • 0 to 3 years of experience in any field
  • Fundamentals of Cyber Security (Separate course is offered is you are a newbie for Cybersecurity)
  • Learning attitude

Course Duration

  • Duration: 2 months (60 hours of training)
  • Mode of Training: Classroom and Online

Ethical Hacking – Offensive Security

  1. Ethical Hacking
  • Introduction to ethical hacking
  • Understanding the hacker mindset
  • Legal aspects and frameworks
  1. Footprinting and Reconnaissance
  • Techniques for information gathering
  • Using tools for footprinting
  • Identifying potential targets
  1. Scanning Networks
  • Network scanning techniques
  • Identifying live systems and open ports
  • Vulnerability scanning
  1. Enumeration
  • Gathering detailed information about the target
  • Extracting user names, machine names, network resources
  • Tools for enumeration
  1. Vulnerability Analysis
  • Identifying security weaknesses
  • Assessing potential threats
  • Prioritizing vulnerabilities
  1. System Hacking
  • Techniques for system penetration
  • Password cracking and privilege escalation
  • Covering tracks
  1. Malware Threats
  • Understanding different types of malware
  • Methods of malware propagation
  • Detection and removal techniques
  1. Sniffing
  • Capturing and analyzing network traffic
  • Tools for sniffing
  • Countermeasures against sniffing
  1. Social Engineering
  • Psychological manipulation techniques
  • Phishing attacks
  • Preventing social engineering attacks
  1. Denial-of-Service (DoS) Attacks
  • Techniques for launching DoS attacks
  • Tools for DoS attacks
  • Mitigating DoS attacks
  1. Session Hijacking
  • Techniques for session hijacking
  • Identifying vulnerable sessions
  • Prevention strategies
  1. Evading IDS, Firewalls, and Honeypots
  • Techniques to bypass security measures
  • Evading intrusion detection systems
  • Defeating firewalls and honeypots
  1. Hacking Linux & Windows Servers
  • Exploiting server vulnerabilities
  • Gaining access and control
  • Securing compromised servers
  1. Hacking Web Applications
  • Identifying web application vulnerabilities
  • Techniques for exploiting web applications
  • Preventing web application attacks
  1. SQL Injection
  • Understanding SQL injection attacks
  • Techniques for exploiting SQL vulnerabilities
  • Prevention strategies
  1. Hacking Wireless Networks
  • Techniques for hacking wireless networks
  • Tools for wireless network attacks
  • Securing wireless networks
  1. Hacking Mobile Platforms
  • Understanding mobile platform vulnerabilities
  • Techniques for exploiting mobile devices
  • Securing mobile platforms
  1. Cryptography – Encryptions
  • Basics of cryptography
  • Implementing encryption techniques
  • Breaking encryption algorithms
  1. Cloud Security
  • Understanding cloud computing threats
  • Techniques for securing cloud environments
  • Tools for cloud security
  1. IoT Security
    • Identifying IoT vulnerabilities
    • Techniques for securing IoT devices
    • Implementing IoT security best practices
Show More

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?