Techourse
Techourse Logo

CEH V11 Certification Training 

  • Offered byTechourse

CEH V11 Certification Training
 at 
Techourse 
Overview

Gain in-demand Cyber Security Skills with globally renowned CEH certification and become effective sentinels against any cyber threats

Duration

40 days

Total fee

39,000

Mode of learning

Online

Credential

Certificate

CEH V11 Certification Training
 at 
Techourse 
Highlights

  • Earn a certificate from Techourse in collaboration with EC-council
  • Course has been rated 4.9 at Google reviews
  • EC certified faculty and Study Material(e-Kit) and Comes with placement assistance program
  • Gain expertise on widely used Tools and skills like NCIE 2.0, NMAP, metasploit, Angry Scanner, Wireshark etc.
  • Learn through 24 exceptional hacking challenges, 20 Modules, 120 Units, 600+ Advanced CEH tools
  • Get Complementary exam voucher and also Complementary i-labs access for 6 months
Read more
Details Icon

CEH V11 Certification Training
 at 
Techourse 
Course details

Who should do this course?
  • Anyone who has an interest in ethical hacking and cybersecurity domain
  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager/Specialist
  • Information Systems Security Engineer /Manager
  • Information Security Professionals /Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers
What are the course deliverables?
  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Web server attacks and a comprehensive attack methodology
  • Web application attacks and comprehensive web application hacking methodology
  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
  • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks
  • Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools
Read more
More about this course
  • Gain in-depth understanding of ethical hacking phases, various attack vectors, and preventative counter measures
  • Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls
  • Learn in a hands-on environment and systematic process across every ethical hacking domain and methodology
  • Be exposed to an entirely different posture towards the responsibilities and measures required to be secure
  • Covers vulnerabilities ranging from a basic cross-site script to advanced multi-level pivoting
  • Some of the vulnerabilities covered are XSS, SQLi, IDoR, and Remote Code Execution
  • Course Fee: INR 39000
  • Upcoming Batch : 1st Week of November

CEH V11 Certification Training
 at 
Techourse 
Curriculum

Introduction to Ethical Hacking

Ethical Hacking and Cyber Security Overview

Cyber Threats and Attack Vectors

Ethical Hacking and Hacking Concepts

Cyber Security Controls

Penetration Testing Concepts

Footprinting and Reconnaissance

Footprinting Overview

Footprinting using Search Engines

Foot Printing using web Services

Foot printing using Social Networking Sites

Footprinting Website

Footprinting Email

Open Source Intelligence

Footprinting Whois

Footprinting DNS

Footprinting Device and Network

Footprinting using Social Engineering

Contermeasures

Scanning Networks

Network Scanning Overview

Scanning Concept and Techniques

Scanning Beyond IDS, IPS and Firewall

Scanning operating system and ports

Scanning traceroute and version

Scanning using Nmap Scripting Engine

Enumeration

Enumeration overview

Enumeration information of NetBIOS

Enumeration information of SNMP

Enumeration LDAP NTP SMTP

Enumeration TCP and UDP

Enumeration DNS

Countermeasures

Vulnerability Analysis

Vulnerability Assessment Overview

Vulnerability Assessment of device and network

Vulnerability Assessment by manual method

Vulnerability Assessment using automated tool

Vulnerability Assessment Reports

System Hacking

System Hacking overview

login bypass

Escalating Privileges method

Executing Application method

Maintaining and Covering Tracks

Penetration Testing using both automated and manual method

Malware Threats

Malware Overview

Malware virus and Trojan Concepts

Creating of malware,virus and trojans

Contermeasures using Anti-Malware Software

Sniffing

Sniffing overview

Sniffing Technique: MAC Attacks,Spoofing Attacks, ARP Poisioning, DHCP Attack

Sniffing Tools Detection Techniques

Countermeasures

Social Engineering

Social Engineering Overview

Social Engineering Methods

Social Engineering Penetration Testing

Countermeasures

Denial-of-Service

Introduction to Dos/DDoS

Dos/DDoS Attack Tools

Countermeasures

DoS/DDoS Prevation and Protection Methods

Session Hijacking

Session Hijacking Overview

Network and Application Level Session Hijacking

Session Hijacking Penetration Testing

Countermeasures

Evading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Overview

Evading IDS, IPS, Firewalls

IDS/Firewall Evading and Penetration Testing

Countermeasures

Hacking Web Servers

Web Server Overview

Web Server Attacks and Methodology

Web Server Pen Testing using automated and manual method

Countermeasures

Hacking Web Applications

Web App Overview

Web App Threats and Methodology

Hacking Web Application Hacking Tools

Countermeasures

SQL Injection

SQL Injection Overview

Various Types of SQL Injection

SQL Injection Methodology

SQL Injection using manual and automated method

Countermeasures

Hacking Wireless Networks

Wireless Overview

Wireless Encryption and Methodology

Wireless WPS and WPA2

Wireless Pentesting

Countermeasures

Hacking Mobile Platforms

Mobile Platform Overview

Hacking Android OS

Hacking Mobile using Trojan

Mobile Penetest

Countermeasures

IoT and OT Hacking

IoT Hacking Overview

IoT Hacking Tools and Methodology

IoT Pen Testing

Countermeasures

Cloud Computing

Introduction to Bug Bounty

Scope,Target and Out of Scope

Disclosure Terms & Rules and Reward

Closure Reporting

Professional Report

Writing Format

Do's and Don'ts

CEH V11 Certification Training
 at 
Techourse 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Techourse

36.78 K
40 days
– / –
60 K
3 months
– / –
View Other 1 CoursesRight Arrow Icon

CEH V11 Certification Training
 at 
Techourse 
Students Ratings & Reviews

5/5
Verified Icon2 Ratings
R
Roshan
CEH V11 Certification Training
Offered by Techourse
5
Good course structure and support
Other: Good course structure and support during class and after class, I got support from the trainer anytime during course and this is the best part.
Reviewed on 12 Aug 2021Read More
Thumbs Up IconThumbs Down Icon
S
Sabbaris Mogan
CEH V11 Certification Training
Offered by Techourse
5
Review
Other: The best ethical hacking course I have ever attended, the teachings are very clear even a beginner can understand and the staff is very interactive with the students and clears every doubt of the students. I would recommend it to anyone without hesitation.
Reviewed on 10 Aug 2021Read More
Thumbs Up IconThumbs Down Icon
View All 2 ReviewsRight Arrow Icon
qna

CEH V11 Certification Training
 at 
Techourse 

Student Forum

chatAnything you would want to ask experts?
Write here...