Certified Ethical Hacker (CEH v13) training

  • Home
  • Certified Ethical Hacker (CEH v13) training
Course Image

COURSE DESCRIPTION

Module 1: Introduction to Ethical Hacking

Information Security Overview
Hacking Concepts
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws and Standards


Module 2: Footprinting and Reconnaissance

Footprinting Concepts
Footprinting through Search Engines
Footprinting through Internet Research Services
Footprinting through Social Networking Sites
Whois Footprinting
DNS Footprinting
Network and Email Footprinting
Footprinting through Social Engineering
Footprinting Tasks using Advanced Tools and AI
Footprinting Countermeasures


Module 3: Scanning Networks

Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Source Port Manipulation
Network Scanning Countermeasures


Module 4: Enumeration

Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures


Module 5: Vulnerability Analysis

Vulnerability Assessment Concepts
Vulnerability Scoring Systems and Databases
Vulnerability-Management Life Cycle
Vulnerability Research
Vulnerability Scanning and Analysis
Vulnerability Assessment Tools
Vulnerability Assessment Reports


Module 6: System Hacking

Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs


Module 7: Malware Threats

Malware Concepts
APT Concepts
Trojan Concepts
Viruses and Worms
Fileless Malware Concepts
AI-based Malware Concepts
Malware Countermeasures
Anti-Malware Software


Module 8: Sniffing

Sniffing Concepts
Sniffing Technique
Sniffing Tools
Sniffing Countermeasures


Module 9: Social Engineering

Social Engineering Concepts
Human-based Social Engineering Techniques
Computer-based Social Engineering Techniques
Mobile-based Social Engineering Techniques
Social Engineering Countermeasures


Module 10: Denial-of-Service

DoS/DDoS Concepts
Botnets
DDoS Case Study
DoS/DDoS Attack Techniques
DoS/DDoS Attack Countermeasures


Module 11: Session Hijacking

Session Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures


Module 12: Evading IDS, Firewalls, and Honeypots

Intrusion Detection/Prevention System (IDS/IPS) Concept

Information for teachers and students, Event information and education news

Contact us