• Mon to Fri Open: 10am - 6pm

Certified Ethical Hacker(CEH)

The Certified Ethical Hacker (CEH) certification equips cybersecurity professionals with essential skills in ethical hacking techniques and methodologies. This certification program covers a broad spectrum of security domains, including network scanning, system hacking, malware threats, social engineering, and cryptography. CEH training emphasizes practical knowledge and hands-on experience in identifying vulnerabilities, assessing risks, and implementing effective countermeasures to protect systems and data from malicious attacks. By obtaining CEH certification, professionals demonstrate their ability to ethically hack and secure systems, contributing to enhanced cybersecurity practices within organizations worldwide.

Prerequisite

  • Requires at least two years of work experience in the information security domain.
  • Familiarity with networking basics, such as TCP/IP protocols and subnetting, is beneficial.
  • Basic knowledge of operating systems (Windows, Linux) and proficiency in basic programming/scripting languages can be advantageous.
Total Duration: 39 Hours

Certified Ethical Hacker(CEH)

What will you learn?

1 Enumeration

Enumeration is the process of actively gathering detailed information such as usernames, shared resources, and device names from a target.

Ethics and legal considerations Types of hackers Phases of ethical hacking Penetration testing methodologies

Footprinting concepts Information gathering techniques WHOIS lookup Social engineering for information gathering

Network scanning techniques, Port scanning, Network mapping, Vulnerability scanning.

Techniques for enumeration, SNMP enumeration, LDAP enumeration, NTP enumeration

Vulnerability assessment techniques, Vulnerability scanning tools, Vulnerability databases, Common vulnerabilities and exposures (CVE)

Password cracking techniques, Privilege escalation, Escalating privileges using exploits, Covering tracks and hiding files

Types of malware (viruses, worms, trojans, etc.), Malware analysis techniques, Anti-malware technologies, Malware detection and removal

Sniffing techniques and tools, Sniffing countermeasures (encryption, ARP spoofing prevention), Packet sniffing for passwords and data

Social engineering techniques, Phishing attacks, Spear phishing, Social engineering countermeasures

DoS and DDoS attacks, DoS attack techniques (flood attacks, amplification attacks), DoS attack tools, DoS attack prevention and mitigation

Session hijacking techniques (session fixation, session sidejacking), Man-in-the-middle (MITM) attacks, Session hijacking countermeasures, HTTPS and secure session management

IDS evasion techniques, IDS detection mechanisms, IDS evasion tools, Evading IPS (Intrusion Prevention Systems)

Firewall types and configurations, Firewall evasion techniques, Honeypot concepts and deployment, Detecting and responding to honeypot attacks

Web server architecture and vulnerabilities, Web server attack techniques (directory traversal, HTTP methods), Web server hardening techniques, Web server security tools

Web application architecture and security, Web application attack vectors (XSS, CSRF, etc.), SQL injection attacks, Web application security testing tools

SQL injection concepts and techniques, Types of SQL injection attacks (blind SQLi, error-based SQLi), SQL injection detection and prevention, SQL injection tools

Wireless network security fundamentals, Wireless network encryption standards (WEP, WPA, WPA2), Wireless cracking techniques (WPS attacks, packet capture), Wireless security tools

Mobile platform security fundamentals b. Mobile device management (MDM) c. Mobile application security d. Mobile exploitation techniques

IoT security challenges, IoT attack vectors, IoT device exploitation techniques, IoT security best practices

Cloud computing fundamentals, Cloud security considerations, Cloud deployment models (public, private, hybrid), Cloud security tools and services

Cryptography fundamentals, Symmetric and asymmetric encryption, Hashing algorithms, Digital signatures and certificates