Instructor

EC-Council Certified Ethical Hacker (CEH) Practical Training

Curriculum

Master advanced hacking tools, techniques, and methodologies with EC-Council CEH Practical Training. Boost your cybersecurity career with hands-on ethical hacking skills!

Ratings

( 4.8 Ratings )

Live Online Classes starting on 01 January, 1970

EC-Council Certified Ethical Hacker (CEH) Practical

The Certified Ethical Hacker (CEH) Practical course is an advanced, hands-on extension of the CEH certification program, designed to provide cybersecurity professionals with practical experience in ethical hacking and penetration testing. The CEH Practical focuses on applying ethical hacking techniques in real-world scenarios to enhance practical skills and demonstrate the ability to identify, exploit, and remediate security vulnerabilities effectively. This course is ideal for professionals looking to validate their hands-on skills and advance their careers in cybersecurity.

 

Course Prerequisites

To participate in the CEH Practical course, candidates should:

  • Hold a valid CEH certification or equivalent experience.

  • Have practical experience in ethical hacking and penetration testing.

  • Possess knowledge of various hacking tools and techniques.

  • Be familiar with network security, web application security, cloud security, and wireless security principles.

 

Target Audience

The CEH Practical course is intended for:

  • Certified Ethical Hackers (CEH) looking to validate their practical skills.

  • Penetration Testers and Security Consultants seeking advanced certification.

  • IT Security Professionals aiming to enhance their practical hacking abilities.

  • Incident Responders and Forensic Investigators.

  • Network and System Administrators with a focus on security.

 

Course Outline

1) Introduction to Ethical Hacking

  • Information Security Overview

  • Hacking Methodologies and Frameworks

  • Hacking Concepts

  • Ethical Hacking Concepts

  • Information Security Controls

  • Information Security Laws and Standards

2) Footprinting and Reconnaissance

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

  • Website Footprinting

  • Email Footprinting

  • Whois Footprinting

  • DNS Footprinting

  • Network Footprinting

  • Footprinting through Social Engineering

  • Footprinting Tools

  • Footprinting Countermeasures

3) Scanning Networks

  • Network Scanning Concepts

  • Scanning Tools

  • Host Discovery

  • Port and Service Discovery

  • OS Discovery (Banner Grabbing/OS Fingerprinting)

  • Scanning Beyond IDS and Firewall

  • Network Scanning Countermeasures

4) Enumeration

  • Enumeration Concepts

  • NetBIOS Enumeration

  • SNMP Enumeration

  • LDAP Enumeration

  • NTP and NFS Enumeration

  • SMTP and DNS Enumeration

  • Other Enumeration Techniques

  • Enumeration Countermeasures

5) Vulnerability Analysis

  • Vulnerability Assessment Concepts

  • Vulnerability Classification and Assessment Types

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

6) System Hacking

  • Gaining Access

  • Escalating Privileges

  • Maintaining Access

  • Clearing Logs

7) Malware Threats

  • Malware Concepts

  • APT Concepts

  • Trojan Concepts

  • Worm Makers

  • Fileless Malware Concepts

  • Malware Analysis

  • Malware Countermeasures

  • Anti-Malware Software

8) Sniffing

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

  • Sniffing Tools

9) Social Engineering

  • Social Engineering Concepts

  • Social Engineering Techniques

  • Insider Threats

  • Impersonation on Social Networking Sites

  • Identity Theft

  • Social Engineering Countermeasures

10) Denial-of-Service

  • DoS/DDoS Concepts

  • Botnets

  • DoS/DDoS Attack Techniques

  • DDoS Case Study

  • DoS/DDoS Attack Countermeasures

11) Session Hijacking

  • Session Hijacking Concepts

  • Application-Level Session Hijacking

  • Network-Level Session Hijacking

  • Session Hijacking Tools

  • Session Hijacking Countermeasures

12) Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts

  • IDS, IPS, Firewall, and Honeypot Solutions

  • Evading IDS

  • Evading Firewalls

  • Evading NAC and Endpoint Security

  • IDS/Firewall Evading Tools

  • Detecting Honeypots

  • IDS/Firewall Evasion Countermeasures

13) Hacking Web Servers

  • Web Server Concepts

  • Web Server Attacks

  • Web Server Attack Methodology

  • Web Server Attack Countermeasures

14) Hacking Web Applications

  • Web Application Concepts

  • Web Application Threats

  • Web Application Hacking Methodology

  • Web API, Webhooks, and Web Shell

  • Web Application Security

15) SQL Injection

  • SQL Injection Concepts

  • Types of SQL Injection

  • SQL Injection Methodology

  • SQL Injection Tools

  • SQL Injection Countermeasures

16) Hacking Wireless Networks

  • Wireless Concepts

  • Wireless Encryption

  • Wireless Threats

  • Wireless Hacking Methodology

  • Wireless Hacking Tools

  • Bluetooth Hacking

  • Wireless Attack Countermeasures

  • Wireless Security Tools

17) Hacking Mobile Platforms

  • Mobile Platform Attack Vectors

  • Hacking Android OS

  • Hacking iOS

  • Mobile Device Management

  • Mobile Security Guidelines and Tools

18) IoT and OT Hacking

  • IoT Hacking

  • IoT Concepts

  • IoT Attacks

  • IoT Hacking Methodology

  • OT Hacking

  • OT Concepts

  • OT Attacks

  • OT Hacking Methodology

19) Cloud Computing

  • Cloud Computing Concepts

  • Container Technology

  • Manipulating CloudTrial Service

  • Cloud Security

20) Cryptography

  • Cryptography Concepts

  • Encryption Algorithms

  • Cryptography Tools

  • Email Encryption

  • Disk Encryption

  • Cryptanalysis

  • Cryptography Attack Countermeasures

(4.8 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications