Certified Ethical Hacking Course - CEH v12
- Offered byEdureka
Certified Ethical Hacking Course - CEH v12 at Edureka Overview
Duration | 40 hours |
Total fee | ₹42,000 |
Mode of learning | Online |
Credential | Certificate |
Certified Ethical Hacking Course - CEH v12 at Edureka Highlights
- Get Industry Recognised Certification after completion of the course
- Live Interactive Learning
- Hands-On Project Based Learning
- Course Contents by EC-Council
- 6 months free access to Hands-On Labs
Certified Ethical Hacking Course - CEH v12 at Edureka Course details
- This is a first-of-its-kind official partnership between Edureka and EC-Council that offers you the opportunity to earn a globally recognized CEH v12 certification
- This certification program focuses on core cybersecurity skills that are essential for security and network analysts
- The training is designed to validate skill set in areas such as network security, session hijacking, cryptography, system penetration testing, building firewalls, footprinting, and more, making learner a Certified Ethical Hacker (CEH)
Certified Ethical Hacking Course - CEH v12 at Edureka Curriculum
Introduction to Ethical Hacking
Information Security Overview
Hacking Methodologies and Frameworks
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Information Security Laws and Standards
Footprinting and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures
Scanning Networks
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Network Scanning Countermeasures
Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques (IPsec, VoIP, RPC, Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6, and BGP enumeration)
Enumeration Countermeasures
Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Assessment Tools
Vulnerability Assessment Reports
System Hacking
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs