Certified Ethical Hacker (CEHv9)
- Offered byEC-Council
Certified Ethical Hacker (CEHv9) at EC-Council Overview
Duration | 12 months |
Mode of learning | Online |
Credential | Certificate |
Certified Ethical Hacker (CEHv9) at EC-Council Highlights
- Earn a certificate of completion from EC Council
- Also available in Live online classes and classroom
- Access to Official EC-Council e-courseware, iLabs, virtual lab platform
Certified Ethical Hacker (CEHv9) at EC-Council Course details
- Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
- The worlds most advanced ethical hacking course with 18 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization
- In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers
- The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation
Certified Ethical Hacker (CEHv9) at EC-Council Curriculum
Introduction to ethical hacking
Internet is Integral Part of Business and Personal Life -What Happens Online in 60 Seconds
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts, Types, and Phases
Ethical Hacking Concepts and Scope
Information Security Controls
Information Security Laws and Standards
Footprinting and reconnaissance
Footprinting Concepts
Footprinting Methodology
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing
Scanning Network
Overview of Network Scanning
CEH Scanning Methodology
Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
Enumeration Countermeasures
SMB Enumeration Countermeasures
Enumeration Pen Testing
System Hacking
Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps
Hiding Files
Covering Tracks
Penetration Testing
Malware Threats
Introduction to Malware
Trojan Concepts
Types of Trojans
Virus and Worms Concepts
Malware Reverse Engineering
Malware Detection
Countermeasures
Anti-Malware Software
Penetration Testing