EC-COUNCIL (CEH 312-50)

The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the credibility and value to credential members.n recent years, electronic devices and handheld applications have become an indispensible part of daily life, backed by the rapid development of internet technologies. At the same time, the widespread adoption of these technologies has led to incidents involving unauthorised access or leakage of sensitive information and private data. This has raised public awareness of the importance of information security.


Click here to Enroll


Course Objective


  • Key issues plaguing the information security world, incident management process, and penetration testing. Various types of footprinting, footprinting tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely

Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography

LABS

  • Lab Session 1 - Gathering Information about target Computer Systems - Footprinting and Investigation
  • Lab Session 2 - Scanning Computers in the Networks
  • Lab Session 3 - Exploring Malware Threats and Their Countermeasures
  • Lab Session 4 - Enumeration- Listing the Systems/Users and Connecting Them
  • Lab Session 5 - Gaining Access to the Systems - Hacking
  • Lab Session 6 - Monitoring and Capturing Data Packets Using Sniffing
  • Lab Session 7 - Restricting the System Access - Denial of Service (DoS Attack)
  • Lab Session 8 - Tricking People to Gather Confidential Information - Social Engineering
  • Lab Session 9 - Web Servers and Threats Associated with It
  • Lab Session 10 - Web Applications and Threats Associated with It
  • Lab Session 11 - Controlling User Session with Authenticated TCP Connection - Session Hijacking
  • Lab Session 12 - Injecting Code in Data Driven Applications: SQL Injection
  • Lab Session 13 - Hacking Mobile Platforms
  • Lab Session 14 - Encrypting and Decrypting the Code – Cryptography and Its Types
  • Lab Session 15 - Evading IDS, Firewalls and Honeybots
  • Lab Session 16 - Wireless networks and Threats Associated with It
  • Lab Session 17 - Cloud Computing, Virtualisation and Threats Associated with It
  • Lab Session 18 - Output Analysis and Report

Click here to Enroll


img

teachers

2000

img

studests

3000

img

Graduates

1500

img

countries

1000

our gallery

#

 

Sign Up for Newsletter

If you sign up for newsletter you’ll not fail to get our update.

Follow Us: