Instructor

EC-Council CEH v12 Training : Certified Ethical Hacker Course

Curriculum

Master ethical hacking skills with EC-Council CEH v12 Training. Learn to secure networks, identify vulnerabilities & boost your cybersecurity career. Enroll now

Ratings

( 4.6 Ratings )

Live Online Classes starting on 01 January, 1970

EC-Council CEH: Certified Ethical Hacker v12

The Certified Ethical Hacker v12 (CEHv12) course provides an in-depth exploration of advanced hacking tools and techniques employed by both hackers and information security professionals. This course is meticulously structured to guide learners through the systematic process of ethical hacking, starting with fundamental security concepts and progressing to sophisticated security measures.

 

Course Prerequisites

To maximize the benefits of the CEHv12 course, you should have:

  • A basic understanding of networking concepts, including TCP/IP protocols and the OSI model.

  • Familiarity with operating systems, particularly Windows and Linux.

  • Knowledge of common cybersecurity principles and awareness of various cyber threats.

  • Fundamental skills in using computers and the internet.

  • Introductory knowledge of Information Security laws and standards.

  • Understanding of Information Security controls, including firewalls, intrusion detection systems, and antivirus software.

  • Basic problem-solving skills and the mindset to think like a hacker.

 

Target Audience

The CEHv12 course is ideal for IT professionals aiming to advance their cybersecurity skills. It is suited for:

  • IT Security Officers

  • Network Security Engineers

  • Security Analysts and Consultants

  • Ethical Hackers and Penetration Testers

  • Systems Administrators and Engineers

  • IT Auditors

  • Cybersecurity Professionals

  • Risk Assessment Professionals

  • Information Security Managers

  • Technical Support Engineers

  • Vulnerability Assessment Analysts

  • Network Managers

  • Cyber Defense Analysts

  • SOC Analysts

  • Computer Forensics Analysts

  • Incident Responders

  • Application Developers focused on security

  • IT professionals seeking to enhance their security knowledge

  • Individuals preparing for the EC-Council Certified Ethical Hacker exam

 

Course Outline:

1. Introduction to Ethical Hacking

  • Information Security Overview

  • Hacking Methodologies and Frameworks

  • Hacking Concepts

  • Ethical Hacking Concepts

  • Information Security Controls

  • Information Security Laws and Standards

2. Footprinting and Reconnaissance

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

  • Website Footprinting

  • Email Footprinting

  • Whois Footprinting

  • DNS Footprinting

  • Network Footprinting

  • Footprinting through Social Engineering

  • Footprinting Tools

  • Footprinting Countermeasures

3. Scanning Networks

  • Network Scanning Concepts

  • Scanning Tools

  • Host Discovery

  • Port and Service Discovery

  • OS Discovery (Banner Grabbing/OS Fingerprinting)

  • Scanning Beyond IDS and Firewall

  • Network Scanning Countermeasures

4. Enumeration

  • Enumeration Concepts

  • NetBIOS Enumeration

  • SNMP Enumeration

  • LDAP Enumeration

  • NTP and NFS Enumeration

  • SMTP and DNS Enumeration

  • Other Enumeration Techniques

  • Enumeration Countermeasures

5. Vulnerability Analysis

  • Vulnerability Assessment Concepts

  • Vulnerability Classification and Assessment Types

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

6. System Hacking

  • Gaining Access

  • Escalating Privileges

  • Maintaining Access

  • Clearing Logs

7. Malware Threats

  • Malware Concepts

  • APT Concepts

  • Trojan Concepts

  • Worm Makers

  • Fileless Malware Concepts

  • Malware Analysis

  • Malware Countermeasures

  • Anti-Malware Software

8. Sniffing

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

  • Sniffing Tools

9. Social Engineering

  • Social Engineering Concepts

  • Social Engineering Techniques

  • Insider Threats

  • Impersonation on Social Networking Sites

  • Identity Theft

  • Social Engineering Countermeasures

10. Denial-of-Service

  • DoS/DDoS Concepts

  • Botnets

  • DoS/DDoS Attack Techniques

  • DDoS Case Study

  • DoS/DDoS Attack Countermeasures

11. Session Hijacking

  • Session Hijacking Concepts

  • Application-Level Session Hijacking

  • Network-Level Session Hijacking

  • Session Hijacking Tools

  • Session Hijacking Countermeasures

12. Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts

  • IDS, IPS, Firewall, and Honeypot Solutions

  • Evading IDS

  • Evading Firewalls

  • Evading NAC and Endpoint Security

  • IDS/Firewall Evading Tools

  • Detecting Honeypots

  • IDS/Firewall Evasion Countermeasures

13. Hacking Web Servers

  • Web Server Concepts

  • Web Server Attacks

  • Web Server Attack Methodology

  • Web Server Attack Countermeasures

14. Hacking Web Applications

  • Web Application Concepts

  • Web Application Threats

  • Web Application Hacking Methodology

  • Web API, Webhooks, and Web Shell

  • Web Application Security

15. SQL Injection

  • SQL Injection Concepts

  • Types of SQL Injection

  • SQL Injection Methodology

  • SQL Injection Tools

  • SQL Injection Countermeasures

16. Hacking Wireless Networks

  • Wireless Concepts

  • Wireless Encryption

  • Wireless Threats

  • Wireless Hacking Methodology

  • Wireless Hacking Tools

  • Bluetooth Hacking

  • Wireless Attack Countermeasures

  • Wireless Security Tools

17. Hacking Mobile Platforms

  • Mobile Platform Attack Vectors

  • Hacking Android OS

  • Hacking iOS

  • Mobile Device Management

  • Mobile Security Guidelines and Tools

18. IoT and OT Hacking

  • IoT Hacking

  • IoT Concepts

  • IoT Attacks

  • IoT Hacking Methodology

  • OT Hacking

  • OT Concepts

  • OT Attacks

  • OT Hacking Methodology

19. Cloud Computing

  • Cloud Computing Concepts

  • Container Technology

  • Manipulating CloudTrial Service

  • Cloud Security

20. Cryptography

  • Cryptography Concepts

  • Encryption Algorithms

  • Cryptography Tools

  • Email Encryption

  • Disk Encryption

  • Cryptanalysis

  • Cryptography Attack Countermeasures

(4.6 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications