CERTIFIED ETHICAL HACKER V10

What is Ethical Hacking?
Ethical Hacking Course in Ernakulam, Cochin.

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The Purpose of the CEH credential
  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.
WHO WOULD BENEFIT ?
  • Security Officers
  • Auditors
  • Network Administrators
  • Firewall Administrators
  • Security Professionals
  • Anyone who is concerned about the integrity of the network infrastructure

Ethical Hacking Course

  • Introduction to Ethical Hacking
    • What is Hacking?
    • Common Hacking Terminologies
    • What is Cyber Crime?
    • Types of Cyber Crimes
    • What is Ethical Hacking?
    • Why Ethical Hacking?
    • Legality of Ethical Hacking
    • Summary
  • Footprinting and Reconnaissance
    • Footprinting Threats
    • Objectives of Footprinting
    • Footprinting Different Methods
    • Tools for footprinting
  • Scanning Networks
    • What is Scanning?
    • Overview of Scanning
    • Types of Scanning
    • What's the Goal?
    • What Techniques Are Used?
    • What Tools Are Used
  • Enumeration
    • Enumeration and its Types
    • Types of information enumerated
    • Techniques for Enumeration
    • Services and Port to Enumerate
  • Vulnerability Analysis
    • Pilling and structures
    • Importance of vulnerability assessments
    • Types of vulnerability assessments
    • Vulnerability assessments Vs penetration tests
  • System Hacking
    • Goals of System Hacking
    • Types of System Hacking
    • Summary
  • Malware Threats
    • Introduction to Malware Threats
    • Various types of malware
    • What is a Trojan?
    • What is a worm?
    • What is a virus?
    • Trojans, viruses, and worms Countermeasures
  • Sniffing
    • What is a Sniffing
    • What can be sniffed?
    • Types of Sniffing
    • Summary
  • Social Engineering
    • What is Social Engineering?
    • How social engineering Works?
    • Common Social Engineering Techniques
    • Social Engineering Counter Measures
  • Denial-of-Service
    • Denial of Service attacks and its Types
    • Types of DOS
    • Counter Measures
  • Session Hijacking
    • Denial of Service attacks and its Types
    • Types of DOS
    • Counter Measures
  • Evading IDS, Firewalls, and Honeypots
    • Intrusion Detection System (IDS)
    • Identify a honeypot
    • Identify intrusion detection tools
    • Identify types of attacks
    • Recognize firewall evasion tools
    • Identify firewall penetration testing techniques
    • Identify tools and techniques used to evade IDS, firewalls and honeypots
  • Hacking Web Servers
    • What is a Web Server?
    • Web Server Attacks types
    • Website Defacement
    • Countermeasures
  • Hacking Web Applications
    • What is a Web Application?
    • Types of Attacks
    • Tools used
  • SQL Injection
    • What is a Web Application?
    • Types of Attacks
    • Tools used
  • Hacking Wireless Networks
    • Wireless Networks
    • Attacks types
    • Wireless Security
  • Hacking Mobile Platforms
    • Technique for hacking Mobile Platforms
    • RATs
  • Cloud Computing
    Cryptography

DURATION - 2 MONTHS

Make an enquiry about the course before getting admission.

Enquire Now