Course Overview
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. CEH v13 powered with AI capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
CEH v13 powered with AI capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker.
The New Learning Framework
- Learn – Gain skills from knowledge-based Instructor-Led training and hands-on application that includes 20 modules covering various technologies.
- Certify – Gain recognition by proving your ethical hacking skills with the certification that maps to current industry requirements.
- Engage – Gain experience by validating the skills you have gained in a mock ethical hacking engagement that gives real-world experience.
Available only with:
!EC-CEHV12-PRO or
!EC-CEHV12-ELITE - Compete – Gain respect by taking up the challenges every month as part of capture-the-flag style competitions and get exposure to the latest technologies and platforms.
Available only with:
!EC-CEHV12-ELITE
Who should attend
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- Information Security Analyst 1
- Security Analyst L1
- Infosec Security Administrator
- Cybersecurity Analyst level 1, level 2, & level 3
- Network Security Engineer
- SOC Security Analyst
- Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
Prerequisites
- Participants should have good knowledge and understanding of OS, TCP/IP and Network.
- Basic understanding of network essentials, core concepts including server and network components.
Course Objectives
- Key issues plaguing the information security world, hacking methodologies and frameworks, information security controls, and information security laws and standards
- Different types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Different types of vulnerability assessment and vulnerability assessment tools
- System hacking methodology
- Different types of malware (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures
- Various packet sniffing techniques and sniffing countermeasures
- Social engineering techniques, identity theft, and countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Firewall, IDS, IPS, honeypot, NAC, and endpoint evasion techniques, evasion tools, and countermeasures
- Different types of web server, web application, and web API attacks, hacking methodology, hacking tools, and countermeasures
- SQL injection attacks, injection methodology, evasion techniques, and SQL injection countermeasure
- Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
- Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools
- Different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures
- Various cloud computing technologies, cloud computing threats, attacks, hacking methodology (AWS, Microsoft Azure, Google Cloud, and container hacking), and security techniques and tools
- Different types of encryption algorithms, cryptography tools, applications of cryptography, cryptography attacks, and cryptanalysis tools
- AI-driven ethical hacking
Outline: EC-Council Certified Ethical Hacker v12 (CEHV12)
- Module 1: Introduction to Ethical Hacking
- Module 2: Footprinting and Reconnaissance
- Module 3: Scanning Networks
- Module 4: Enumeration
- Module 5: Vulnerability Analysis
- Module 6: System Hacking
- Module 7: Malware Threats
- Module 8: Sniffing
- Module 9: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT and OT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography