CEH V11 Certification Training
- Offered byTechourse
CEH V11 Certification Training at Techourse Overview
Duration | 40 days |
Total fee | ₹39,000 |
Mode of learning | Online |
Credential | Certificate |
CEH V11 Certification Training at Techourse Highlights
- Earn a certificate from Techourse in collaboration with EC-council
- Course has been rated 4.9 at Google reviews
- EC certified faculty and Study Material(e-Kit) and Comes with placement assistance program
- Gain expertise on widely used Tools and skills like NCIE 2.0, NMAP, metasploit, Angry Scanner, Wireshark etc.
- Learn through 24 exceptional hacking challenges, 20 Modules, 120 Units, 600+ Advanced CEH tools
- Get Complementary exam voucher and also Complementary i-labs access for 6 months
CEH V11 Certification Training at Techourse Course details
- Anyone who has an interest in ethical hacking and cybersecurity domain
- Information Security Analyst / Administrator
- Information Assurance (IA) Security Officer
- Information Security Manager/Specialist
- Information Systems Security Engineer /Manager
- Information Security Professionals /Officers
- Information Security / IT Auditors
- Risk / Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
- Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Web server attacks and a comprehensive attack methodology
- Web application attacks and comprehensive web application hacking methodology
- SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
- Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
- Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools
- System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
- Firewall, IDS and honeypot evasion techniques, evasion tools and techniques
- Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks
- Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools
- Gain in-depth understanding of ethical hacking phases, various attack vectors, and preventative counter measures
- Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls
- Learn in a hands-on environment and systematic process across every ethical hacking domain and methodology
- Be exposed to an entirely different posture towards the responsibilities and measures required to be secure
- Covers vulnerabilities ranging from a basic cross-site script to advanced multi-level pivoting
- Some of the vulnerabilities covered are XSS, SQLi, IDoR, and Remote Code Execution
- Course Fee: INR 39000
- Upcoming Batch : 1st Week of November
CEH V11 Certification Training at Techourse Curriculum
Introduction to Ethical Hacking
Ethical Hacking and Cyber Security Overview
Cyber Threats and Attack Vectors
Ethical Hacking and Hacking Concepts
Cyber Security Controls
Penetration Testing Concepts
Footprinting and Reconnaissance
Footprinting Overview
Footprinting using Search Engines
Foot Printing using web Services
Foot printing using Social Networking Sites
Footprinting Website
Footprinting Email
Open Source Intelligence
Footprinting Whois
Footprinting DNS
Footprinting Device and Network
Footprinting using Social Engineering
Contermeasures
Scanning Networks
Network Scanning Overview
Scanning Concept and Techniques
Scanning Beyond IDS, IPS and Firewall
Scanning operating system and ports
Scanning traceroute and version
Scanning using Nmap Scripting Engine
Enumeration
Enumeration overview
Enumeration information of NetBIOS
Enumeration information of SNMP
Enumeration LDAP NTP SMTP
Enumeration TCP and UDP
Enumeration DNS
Countermeasures
Vulnerability Analysis
Vulnerability Assessment Overview
Vulnerability Assessment of device and network
Vulnerability Assessment by manual method
Vulnerability Assessment using automated tool
Vulnerability Assessment Reports
System Hacking
System Hacking overview
login bypass
Escalating Privileges method
Executing Application method
Maintaining and Covering Tracks
Penetration Testing using both automated and manual method
Malware Threats
Malware Overview
Malware virus and Trojan Concepts
Creating of malware,virus and trojans
Contermeasures using Anti-Malware Software
Sniffing
Sniffing overview
Sniffing Technique: MAC Attacks,Spoofing Attacks, ARP Poisioning, DHCP Attack
Sniffing Tools Detection Techniques
Countermeasures
Social Engineering
Social Engineering Overview
Social Engineering Methods
Social Engineering Penetration Testing
Countermeasures
Denial-of-Service
Introduction to Dos/DDoS
Dos/DDoS Attack Tools
Countermeasures
DoS/DDoS Prevation and Protection Methods
Session Hijacking
Session Hijacking Overview
Network and Application Level Session Hijacking
Session Hijacking Penetration Testing
Countermeasures
Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Overview
Evading IDS, IPS, Firewalls
IDS/Firewall Evading and Penetration Testing
Countermeasures
Hacking Web Servers
Web Server Overview
Web Server Attacks and Methodology
Web Server Pen Testing using automated and manual method
Countermeasures
Hacking Web Applications
Web App Overview
Web App Threats and Methodology
Hacking Web Application Hacking Tools
Countermeasures
SQL Injection
SQL Injection Overview
Various Types of SQL Injection
SQL Injection Methodology
SQL Injection using manual and automated method
Countermeasures
Hacking Wireless Networks
Wireless Overview
Wireless Encryption and Methodology
Wireless WPS and WPA2
Wireless Pentesting
Countermeasures
Hacking Mobile Platforms
Mobile Platform Overview
Hacking Android OS
Hacking Mobile using Trojan
Mobile Penetest
Countermeasures
IoT and OT Hacking
IoT Hacking Overview
IoT Hacking Tools and Methodology
IoT Pen Testing
Countermeasures
Cloud Computing
Introduction to Bug Bounty
Scope,Target and Out of Scope
Disclosure Terms & Rules and Reward
Closure Reporting
Professional Report
Writing Format
Do's and Don'ts
CEH V11 Certification Training at Techourse Entry Requirements
Other courses offered by Techourse
CEH V11 Certification Training at Techourse Students Ratings & Reviews
- 4-52