0% found this document useful (0 votes)
2K views7 pages

EC-Council Certified Ethical Hacker (CEH) v.12 Courses - New Horizons

The document provides information on the EC-Council Certified Ethical Hacker (CEH) v.12 course. The 40-hour, advanced level course provides an in-depth understanding of ethical hacking phases, attack vectors, and countermeasures. It uses hands-on exercises to teach systematic processes for each hacking domain and methodology. Now in its 12th version, the course covers the latest tools, tactics, exploits, and technologies. Upon completion, students will understand information security controls, hacking techniques like footprinting and scanning, social engineering, and cryptography.

Uploaded by

daliodsouza1019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views7 pages

EC-Council Certified Ethical Hacker (CEH) v.12 Courses - New Horizons

The document provides information on the EC-Council Certified Ethical Hacker (CEH) v.12 course. The 40-hour, advanced level course provides an in-depth understanding of ethical hacking phases, attack vectors, and countermeasures. It uses hands-on exercises to teach systematic processes for each hacking domain and methodology. Now in its 12th version, the course covers the latest tools, tactics, exploits, and technologies. Upon completion, students will understand information security controls, hacking techniques like footprinting and scanning, social engineering, and cryptography.

Uploaded by

daliodsouza1019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

EC-Council Certified Ethical Hacker (CEH) v.

12
Summary
Length: 40 hours Level: Advanced

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. This course
was built to incorporate a unique, in-depth and interactive hands-on environment and systematic process across each ethical hacking domain
and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH
credential. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. This
course comes with the CEH Elite Bundle: - eCourseware and next version eCourseware - Exam Voucher - 5 Exam Retakes - Exam Preparation -
C|EH Practical - 6 Months Official Labs - C|EH Engage and Global Challenge - Ethical Hacking Video Library This course may be eligible for a
Credly badge.

Learning Objectives
At the completion of this course, you will have an understanding of:

Information security controls, laws, and standards.


Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses
and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and
countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and
countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques
and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

Course Outline
1. MODULE 1 - INTRODUCTION TO ETHICAL HACKING
Information Security Overview

Cyber Kill Chain Concepts

Hacking Concepts

Ethical Hacking Concepts


Information Security Controls

Information Security Laws and Standards


2. MODULE 2 - FOOT-PRINTING AND RECONNAISSANCE
Footprinting Concepts

Footprinting through Search Engines

Footprinting through Web Services

Footprinting through Social Networking Sites

Website Footprinting

Email Footprinting

Who is Footprinting

DNS Footprinting

Network Footprinting

Footprinting through Social Engineering

Footprinting Tools

Footprinting Countermeasures

3. MODULE 3 - SCANNING NETWORKS


Network Scanning Concepts

Scanning Tools

Host Discovery

Port and Service Discovery

OS Discovery (Banner Grabbing/OS Fingerprinting)

Scanning Beyond IDS and Firewall

Draw Network Diagrams

4. MODULE 4 - ENUMERATION
Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques


Enumeration Countermeasures
5. MODULE 5 - VULNERABILITY ANALYSIS
Vulnerability Assessment Concepts

Vulnerability Classification and Assessment Types

Vulnerability Assessment Solutions and Tools

Vulnerability Assessment Reports

6. MODULE 6 - SYSTEM HACKING


System Hacking Concepts

Gaining Access

Escalating Privileges

Maintaining Access

Clearing Logs

7. MODULE 7 - MALWARE THREATS


Malware Concepts

APT Concepts

Trojan Concepts

Virus and Worm Concepts

Fileless Malware Concepts

Malware Analysis

Countermeasures

Anti-Malware Software

8. MODULE 8 - SNIFFING
Sniffing Concepts

Sniffing Technique: MAC Attacks

Sniffing Technique: DHCP Attacks

Sniffing Technique: ARP Poisoning

Sniffing Technique: Spoofing Attacks

Sniffing Technique: DNS Poisoning

Sniffing Tools

Countermeasures

Sniffing Detection Techniques

9. MODULE 9 - SOCIAL ENGINEERING


Social Engineering Concepts

Social Engineering Techniques

Insider Threats

Impersonation on Social Networking Sites

Identity Theft

Countermeasures
10. MODULE 10 - DENIAL-OF-SERVICE
DoS/DDoS Concepts

DoS/DDoS Attack Techniques

BotnetsDDoS Case Study

DoS/DDoS Attack Tools

Countermeasures

DoS/DDoS Protection Tools

11. MODULE 11 - SESSION HIJACKING


Session Hijacking Concepts

Application Level Session Hijacking

Network Level Session Hijacking

Session Hijacking Tools

Countermeasures

12. MODULE 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS


IDS, IPS, Firewall, and Honeypot Concepts

IDS, IPS, Firewall, and Honeypot Solutions

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Countermeasures

13. MODULE 13 - HACKING WEB SERVERS


Web Server Concepts

Web Server Attacks

Web Server Attack Methodology

Web Server Attack Tools


Countermeasures

Patch Management

Web Server Security Tools


14. MODULE 14 - HACKING WEB APPLICATIONS
Web Application Concepts

Web Application Threats

Web Application Hacking Methodology

Web API, Webhooks, and Web Shell

Web Application Security

15. MODULE 15 - SQL INJECTION


SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Evasion Techniques

Countermeasures

16. MODULE 16 - HACKING WIRELESS NETWORKS


Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking

Countermeasures

Wireless Security Tools

17. MODULE 17 - HACKING MOBILE PLATFORMS


Mobile Platform Attack Vectors

Hacking Android OS

Hacking iOS

Mobile Device Management

Mobile Security Guidelines and Tools

18. MODULE 18 - IOT AND OT HACKING


IoT Hacking

IoT Concepts

IoT Attacks

IoT Hacking Methodology

IoT Hacking Tools

Countermeasures

OT Hacking

OT Concepts

OT Attacks

OT Hacking Methodology

OT Hacking Tools

Countermeasures
19. MODULE 19 - CLOUD COMPUTING
Cloud Computing Concepts

Container Technology

Serverless Computing

Cloud Computing Threats

Cloud Hacking

Cloud Security

20. MODULE 20 - CRYPTOGRAPHY


Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)

Email Encryption

Disk Encryption

Cryptanalysis

Countermeasures
Audience
The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and
anyone who is concerned about the integrity of the network infrastructure. This course comes with the complete EC-Council CEH Elite
bundle. This all-encompassing content includes: eCourseware Exam voucher Next version eCourseware upon release Up to 5 exam retakes
Access to 10 Ethical Hacking videos 6 months lab access CEH Engage Global CEH Challenge Exam preparation materials CEH Practical exam
Prerequisites
It is suggested that you have the knowledge and working experience at the level of CompTIA Security+ and/or CompTIA Linux+ prior to taking
this course.

You might also like