EC-Council CEH – Certified Ethical Hacker v12 Certification Boot Camp
Retail Price: $2,995.00
Next Date: 12/09/2024
Course Days: 5
Enroll in Next Date
Request Custom Course
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
•Apply countermeasures to secure your system against threats
•Test system security and data access using real-world hacking techniques
•Employ complex tools to identify and analyze your company’s risks and weaknesses
•Find vulnerabilities in a network infrastructure
When you decide to take one of our courses, you are placing trust in us. Our Exam Pass Guarantee was designed to help you reach your goal to pass the certification exam. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.
Our Official CEH training offers unlimited exam retakes, so your success is guaranteed!
Our Certified Ethical Hacker boot camp provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through EC-Council’s learning framework. This CEH bootcamp inculdes:
- CEH Digital Courseware Kit (includes e-book 24 months access)
- CEH CyberQ Lab (6 months unlimited access)
- Next version e-book
- CEH Re-Exam Vouchers
- Updated Ethical Hacking Videos x 10 (1 year access)
- CEH Engage on CyberQ (1 year access)
- Global CEH Challenge on CyberQ (1 year access)
- CEH Mock Exam Prep (1 year access)
- CEH Practical Exam Voucher (valid for 1 year)
Introduction to Ethical Hacking
- Information security overview
- Information security threats and attack vectors
- Hacking concepts
- Ethical hacking concepts
- Information Security Controls
- Penetration testing concepts
- Information security laws and standards
Footprinting and Reconnaissance
- Footprinting concepts
- Footprinting through search engines
- Footprinting through web services
- Footprinting through social networking sites
- Website footprinting
- Email footprinting
- Competitive Intelligence
- WHOIS Footprinting
- DNS footprinting
- Network footprinting
- Footprinting through social engineering
- Footprinting tools
- Countermeasures
- Footprinting pen testing
Scanning Networks
- Network scanning concepts
- Scanning tools
- Scanning techniques
- Scanning beyond IDS and firewall
- Banner grabbing
- Draw network diagrams
- Scanning pen test
Enumeration
- Enumeration concepts
- NetBIOS enumeration
- SNMP enumeration
- LDAP enumeration
- NTP enumeration SMTP and DNS enumeration
- Other enumeration techniques
- Enumeration countermeasures
- Enumeration pen testing
Vulnerability Analysis
- Vulnerability assessment concepts
- Vulnerability assessment solutions
- Vulnerability scoring systems
- Vulnerability assessment tools
- Vulnerability assessment reports
System Hacking
- System hacking concepts
- Cracking passwords
- Escalating privileges
- Executing applications
- Hiding files
- Covering tracks
- Penetration testing
Malware Threats
- Malware concepts
- Trojan concepts
- Virus and worm concepts
- Malware analysis
- Countermeasures
- Anti-malware software
- Malware penetration testing
Sniffing
- Sniffing concepts
- Sniffing techniques: MAC attacks
- Sniffing techniques: DHCP attacks
- Sniffing techniques: ARP Poisoning
- Sniffing techniques: Spoofing attacks
- Sniffing techniques: DNS poisoning
- Sniffing tools
- Countermeasures
- Sniffing detection techniques
- Sniffing pen testing
Social Engineering
- Social engineering concepts
- Social engineering techniques
- Insider threats
- Impersonation on social networking sites
- Identity theft
- Countermeasures
- Social engineering pen testing
Denial of Service
- DoS/DDos Concepts
- DoS/DDoS attack techniques
- Botnets
- DDoS case study
- DoS/DDoS attack tools
- Countermeasures
- DoS/DDos protection tools
- DoS/DDoS penetration testing
Session Hijacking
- Session hijacking concepts
- Application level session hijacking
- Network level session hijacking
- Session hijacking tools
- Countermeasures
- Penetration testing
Evading IDS, Firewalls, and Honeypots
- IDS, firewall and honeypot concepts
- IDS, firewall and honeypot solutions
- Evading IDS
- Evading firewalls
- IDS/firewall evading tools
- Detecting honeypots
- IDS/Firewall evasion countermeasures
- Penetration testing
Hacking Webservers
- Web server operations
- Web server attacks
- Web server attack methodology
- Web server attack tools
- Countermeasures
- Patch management
- Web server security tools
- Web server pen testing
Hacking Web Applications
- Web app concepts
- Web app threats
- Hacking methodology
- Web app hacking tools
- Countermeasures
- Web app security testing tools
- Web app pen testing
SQL Injection
- SQL injection concepts
- Types of SQL injection
- SQL injection methodology
- SQL injection tools
- Evasion techniques
- Countermeasures
Hacking Wireless Networks
- Wireless concepts
- Wireless encryption
- Wireless threats
- Wireless hacking methodology
- Wireless hacking tools
- Bluetooth hacking
- Countermeasures
- Wireless security tools
- Wireless pen testing
Hacking Mobile Platforms
- Mobile platform attack vectors
- Hacking Android OS
- Hakcing iOS
- Mobile spyware
- Mobile device management
- Mobile security guidelines and tools
- Mobile pen testing
IoT and OT Hacking
- IoT and OT concepts
- IoT and OT attacks
- IoT and OT hacking methodology
- IoT and OT hacking tools
- Countermeasures
- IoT and OT pen testing
Cloud Computing
- Cloud computing concepts
- Cloud computing threats
- Cloud computing attacks
- Cloud security
- Cloud security tools
- Cloud penetration testing
Cryptography
- Cryptography concepts
- Encryption algorithms
- Cryptography tools
- Public key infrastructure (PKI)
- Email encryption
- Disk encryption
- Cryptanalysis Countermeasures
- CEH Exam Structure
- Exam Registration Process
- Time Management
- Topics and Concepts
- CEH Certification Question Structure
- Vendor Interpretation Techniques