- Home
- Certified Ethical Hacker (CEH v13) training
COURSE DESCRIPTION
Module 1: Introduction to Ethical Hacking
Information Security Overview
Hacking Concepts
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Internet Research Services
Footprinting through Social Networking Sites
Whois Footprinting
DNS Footprinting
Network and Email Footprinting
Footprinting through Social Engineering
Footprinting Tasks using Advanced Tools and AI
Footprinting Countermeasures
Module 3: Scanning Networks
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Source Port Manipulation
Network Scanning Countermeasures
Module 4: Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Module 5: Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Scoring Systems and Databases
Vulnerability-Management Life Cycle
Vulnerability Research
Vulnerability Scanning and Analysis
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 6: System Hacking
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
Module 7: Malware Threats
Malware Concepts
APT Concepts
Trojan Concepts
Viruses and Worms
Fileless Malware Concepts
AI-based Malware Concepts
Malware Countermeasures
Anti-Malware Software
Module 8: Sniffing
Sniffing Concepts
Sniffing Technique
Sniffing Tools
Sniffing Countermeasures
Module 9: Social Engineering
Social Engineering Concepts
Human-based Social Engineering Techniques
Computer-based Social Engineering Techniques
Mobile-based Social Engineering Techniques
Social Engineering Countermeasures
Module 10: Denial-of-Service
DoS/DDoS Concepts
Botnets
DDoS Case Study
DoS/DDoS Attack Techniques
DoS/DDoS Attack Countermeasures
Module 11: Session Hijacking
Session Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
Intrusion Detection/Prevention System (IDS/IPS) Concept
