logo-img

Course Details

Certified Ethical Hacker

(254 reviews)
course-meta
Created by
Admin

Total Enrolled

50,000+

Last Update

01 January 2023

Duration

45 Days

Description

The Certified Ethical Hacker (C|EH v12) program is one of the most respected certifications in the cybersecurity field. It has been the world’s number one ethical hacking certification for 20 years and is continuously ranked number one in ethical hacking certification by different firms. Cloud247’s CEH Online Training and Certification program follows the latest version of CEH that is v12. The updated learning framework covers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands-on lab and practice range experience.

What you'll learn

  • Introduction to Ethical Hacking
  • Foot Printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking

Requirements

  • • Basic understanding of network essentials
  • • Basic understanding of core concepts
  • • Basic understanding of including server and network components

Curriculum

  • 45 lectures • 45 days total length

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Key topics covered:

Elements of Information Security

Cyber Kill Chain Methodology

MITRE ATT&CK Framework

Hacker Classes

Ethical Hacking

Information Assurance (IA)

Risk Management

Incident Management

PCI DSS

HIPPA

SOX

GDPR


Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.

Hands-On Lab Exercises:

Over 30 hands-on exercises with real-life simulated targets to build skills on how to:

Perform foot printing on the target network using search engines, web services, and social networking sites

Perform website, email, whois, DNS, and network foot printing on the target network


Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Hands-On Lab Exercises:

Over 10 hands-on exercises with real-life simulated targets to build skills on how to:

Perform host, port, service, and OS discovery on the target network

Perform scanning on the target network beyond IDS and firewall


Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, plus associated countermeasures.

Hands-On Lab Exercises:

Over 20 hands-on exercises with real-life simulated targets to build skills on how to:

Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration


Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Perform vulnerability research using vulnerability scoring systems and databases

Perform vulnerability assessment using various vulnerability assessment tools


Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks.

Hands-On Lab Exercises:

Over 25 hands-on exercises with real-life simulated targets to build skills on how to:

Perform an active online attack to crack the system’s password

Escalate privileges using privilege escalation tools

Escalate privileges in Linux machine

Hide data using steganography

Clear Windows and Linux machine logs using various utilities

Hiding artifacts in Windows and Linux machines


Get an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.

Hands-On Lab Exercises:

Over 20 hands-on exercises with real-life simulated targets to build skills on how to:

Gain control over a victim machine using malware

Infect the target system using a virus

Perform static and dynamic malware analysis

Key topics covered:

Malware, Components of Malware

APT

Trojan

Types of Trojans

Exploit Kits

Virus

Virus Lifecycle

Types of Viruses

Ransomware

Computer Worms

Fileless Malware

Malware Analysis

Static Malware Analysis

Dynamic Malware Analysis

Virus Detection Methods

Trojan Analysis

Virus Analysis

Fileless Malware Analysis

Anti-Trojan Software

Antivirus Software

Fileless Malware Detection Tools


Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Hands-On Lab Exercises:

Over 10 hands-on exercises with real-life simulated targets to build skills on how to:

Perform MAC flooding, ARP poisoning, MITM and DHCP starvation attack

Spoof a MAC address of Linux machine

Perform network sniffing using various sniffing tools

Detect ARP poisoning in a switch-based network

Key topics covered:

Network Sniffing

Wiretapping

MAC Flooding

DHCP Starvation Attack

ARP Spoofing Attack

ARP Poisoning

ARP Poisoning Tools

MAC Spoofing

STP Attack

DNS Poisoning

DNS Poisoning Tools

Sniffing Tools

Sniffer Detection Techniques

Promiscuous Detection Tools


Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Hands-On Lab Exercises:

Over 4 hands-on exercises with real-life simulated targets to build skills on how to:

Perform social engineering using Various Techniques

Spoof a MAC address of a Linux machine

Detect a phishing attack

Audit an organization’s security for phishing attacks

Key topics covered:

Social Engineering

Types of Social Engineering

Phishing

Phishing Tools

Insider Threats/Insider Attacks

Identity Theft


Learn about different Denial-of-Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Perform a DoS and DDoS attack on a target host

Detect and protect against DoS and DDoS attacks

Key topics covered:

DoS Attack, DDoS Attack

Botnets

DoS/DDoS Attack Techniques

DoS/DDoS Attack Tools

DoS/DDoS Attack Detection Techniques

DoS/DDoS Protection Tools


Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Hands-On Lab Exercises:

Over 4 hands-on exercises with real-life simulated targets to build skills on how to:

Perform session hijacking using various tools

Detect session hijacking

Key topics covered:

Session Hijacking

Types of Session Hijacking

Spoofing

Application-Level Session Hijacking

Man-in-the-Browser Attack

Client-side Attacks

Session Replay Attacks

Session Fixation Attack

CRIME Attack

Network Level Session Hijacking

TCP/IP Hijacking

Session Hijacking Tools

Session Hijacking Detection Methods

Session Hijacking Prevention Tools


Get introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Hands-On Lab Exercises:

Over 7 hands-on exercises with real-life simulated targets to build skills on how to:

Bypass Windows Firewall

Bypass firewall rules using tunneling

Bypass antivirus


Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Hands-On Lab Exercises:

Over 8 hands-on exercises with real-life simulated targets to build skills on how to:

Perform web server reconnaissance using various tools

Enumerate web server information

Crack FTP credentials using a dictionary attack

Key topics covered:

Web Server Operations

Web Server Attacks

DNS Server Hijacking

Website Defacement

Web Cache Poisoning Attack

Web Server Attack Methodology

Web Server Attack Tools

Web Server Security Tools

Patch Management

Patch Management Tools


Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

Hands-On Lab Exercises:

Over 15 hands-on exercises with real-life simulated targets to build skills on how to:

Perform web application reconnaissance using various tools

Perform web spidering

Perform web application vulnerability scanning

Perform a brute-force attack

Perform Cross-Site Request Forgery (CSRF) Attack

Identify XSS vulnerabilities in web applications

Detect web application vulnerabilities using various web application security tools

Key topics covered:

Web Application Architecture

Web Application Threats

OWASP Top 10 Application Security Risks – 2021

Web Application Hacking Methodology

Web API

Webhooks and Web Shell

Web API Hacking Methodology

Web Application Security


Learn about SQL injection attack techniques, injection detection tools, and countermeasures to detect and defend against SQL injection attempts.

Hands-On Lab Exercises:

Over 4 hands-on exercises with real-life simulated targets to build skills on how to:

Perform an SQL injection attack to extract database information

Detect SQL injection vulnerabilities using various SQL injection detection tools

Key topics covered:

SQL Injection

Types of SQL injection

Blind SQL Injection

SQL Injection Methodology

SQL Injection Tools

Signature Evasion Techniques

SQL Injection Detection Tools


Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools

Hands-On Lab Exercises:

Over 3 hands-on exercises with real-life simulated targets to build skills on how to:

Foot Print a wireless network

Perform wireless traffic analysis

Crack WEP, WPA, and WPA2 networks

Create a rogue access point to capture data packets

Key topics covered:

Wireless Terminology

Wireless Networks

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wi-Fi Encryption Cracking

WEP/WPA/WPA2 Cracking Tools

Bluetooth Hacking

Bluetooth Threats

Wi-Fi Security Auditing Tools

Bluetooth Security Tools


Learn about mobile platform attack vectors, Android vulnerability exploits, and mobile security guidelines and tools.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Hack an Android device by creating binary payloads

Exploit the Android platform through ADB

Hack an Android device by creating APK file

Secure Android devices using various Android security tools

Key topics covered:

Mobile Platform Attack Vectors

OWASP Top 10 Mobile Risks

App Sandboxing

SMS Phishing Attack (SMiShing)

Android Rooting

Hacking Android Devices

Android Security Tools

Jailbreaking iOS

Hacking iOS Devices

iOS Device Security Tools

Mobile Device Management (MDM)

OWASP Top 10 Mobile Controls

Mobile Security Tools


Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Hands-On Lab Exercises:

Over 2 hands-on exercises with real-life simulated targets to build skills on how to:

Gather information using Online foot printing tools

Capture and analyze IoT device traffic

Key topics covered:

IoT Architecture

IoT Communication Models

OWASP Top 10 IoT Threats

IoT Vulnerabilities

IoT Hacking Methodology

IoT Hacking Tools

IoT Security Tools

IT/OT Convergence (IIOT)

ICS/SCADA

OT Vulnerabilities

OT Attacks

OT Hacking Methodology

OT Hacking Tools

OT Security Tools


Learn different cloud computing concepts, such as container technologies and server less computing, various cloud-based threats and attacks, and cloud security techniques and tools.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Perform S3 Bucket enumeration using various S3 bucket enumeration tools

Exploit open S3 buckets

Escalate IAM user privileges by exploiting misconfigured user policy

Key topics covered:

Cloud Computing

Types of Cloud Computing Services

Cloud Deployment Models

Fog and Edge Computing

Cloud Service Providers

Container

Docker

Kubernetes

Serverless Computing

OWASP Top 10 Cloud Security Risks

Container and Kubernetes Vulnerabilities

Cloud Attacks

Cloud Hacking

Cloud Network Security

Cloud Security Controls

Cloud Security Tools


In the final module, learn about cryptography and ciphers, public-key infrastructure, cryptography attacks, and cryptanalysis tools.

Hands-On Lab Exercises:

Over 10 hands-on exercises with real-life simulated targets to build skills on how to:

Calculate MD5 hashes

Perform file and text message encryption

Create and use self-signed certificates

Perform email and disk encryption

Perform cryptanalysis using various cryptanalysis tools

Key topics covered:

Cryptography

Encryption Algorithms

MD5 and MD6 Hash Calculators

Cryptography Tools

Public Key Infrastructure (PKI)

Email Encryption

Disk Encryption

Cryptanalysis

Cryptography Attacks

Key Stretching

Student Feedback

4.7

5785 Rating
98%
78%
55%
60%
10%
image not found
  • Level
    Intermediate
  • Lectures
    45 Lectures
  • Duration
    +45 Days
  • Laguage
    English
  • Access
    Full Lifetime
  • Certificate
    Yes
  • Recourse
    5 Downloadable Files