
About Course
The Certified Ethical Hacker (CEH) course by EC-Council is designed to provide students with the knowledge and skills necessary to understand and detect weaknesses in systems and networks through ethical hacking techniques. The course covers a wide range of cybersecurity topics, emphasizing the tools and methodologies hackers use to breach security defenses.
Key Features:
- Comprehensive Overview: The CEH course provides an in-depth understanding of the latest hacking tools, techniques, and methodologies from an ethical hacker’s perspective.
- Hands-On Labs: The course includes practical lab sessions, allowing students to simulate real-world hacking techniques in a controlled environment.
- Hacking Techniques: Focus on areas such as footprinting, scanning, enumeration, system hacking, malware threats, social engineering, and web application hacking.
- Security Controls: Students learn to implement security measures to safeguard systems from potential attacks.
- Industry Standard: The course aligns with the latest standards set by global organizations and is updated regularly to include the most recent threats and vulnerabilities.
Topics Covered:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Web Applications
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls, and Honeypots
- Cloud Computing
- Cryptography
Target Audience:
- Security professionals
- Network administrators
- Penetration testers
- Auditors
- Security officers
The CEH certification validates the ability to think and act like a hacker, making it a vital credential for those seeking roles in penetration testing, ethical hacking, and security analysis.
Course Content
Module 1 – Introduction to Ethical Hacking
-
1.1 Information Security Concepts
-
1.2 Hacking Concepts
-
1.3 Ethical Hacking Concepts
-
1.4 Hacking Methodologies and Frameworks
-
1.5 Information Security Control
-
1.6 Information Security Laws and Standards
Module 2 – Footprinting and Reconnaissance
Module 3 – Scanning Networks
Module 4 – Enumeration
Student Ratings & Reviews
No Review Yet