Prepare for the Certified Ethical Hacker (CEH) certification with the course Certified Ethical Hacker (CEH v12). Gain in-demand skills in security testing, ethical hacking and vulnerability identification. Interactive lessons, quizzes and hands-on labs provide a practical learning experience on ethical hacking. This course primarily focuses on ethics, which ensures responsible and professional practices. This course covers concepts through the use of tools, such as Kali Linux.
What will you get:
The Certified Ethical Hacker exam is to validate that those holding the certification understand the broad range of subject matter that is required for someone to be an effective ethical hacker. It is a certification that recognises the importance of identifying security issues to get them remediated. It validates a candidate’s knowledge of foot-printing and reconnaissance, scanning networks, enumeration, vulnerability analysis, system hacking, malware threats, cryptography and cloud computing.
Lessons 1: Introduction
- What Is a CEH?
- About EC‐Council
- Objective Map
Lessons 2: Ethical Hacking
- Overview of Ethics
- Overview of Ethical Hacking
- Attack Modeling
- Methodology of Ethical Hacking
Lessons 3: Networking Foundations
- Communications Models
- Topologies
- Physical Networking
- IP
- TCP
- UDP
- Internet Control Message Protocol
- Network Architectures
- Cloud Computing
Lessons 4: Security Foundations
- The Triad
- Information Assurance and Risk
- Policies, Standards and Procedures
- Organising Your Protections
- Security Technology
Lessons 5: Footprinting and Reconnaissance
- Open Source Intelligence
- Domain Name System
- Passive Reconnaissance
- Website Intelligence
- Technology Intelligence
Lessons 6: Scanning Networks
- Ping Sweeps
- Port Scanning
- Vulnerability Scanning
- Packet Crafting and Manipulation
- Evasion Techniques
- Protecting and Detecting
Lessons 7: Enumeration
- Service Enumeration
- Remote Procedure Calls
- Server Message Block
- Simple Network Management Protocol
- Simple Mail Transfer Protocol
- Web‐Based Enumeration
Lessons 8: System Hacking
- Searching for Exploits
- System Compromise
- Gathering Passwords
- Password Cracking
- Client‐Side Vulnerabilities
- Living Off the Land
- Fuzzing
- Post Exploitation
Lessons 9: Malware
- Malware Types
- Malware Analysis
- Creating Malware
- Malware Infrastructure
- Antivirus Solutions
- Persistence
Lessons 10: Sniffing
- Packet Capture
- Detecting Sniffers
- Packet Analysis
- Spoofing Attacks
Lessons 11: Social Engineering
- Social Engineering
- Physical Social Engineering
- Phishing Attacks
- Social Engineering for Social Networking
- Website Attacks
- Wireless Social Engineering
- Automating Social Engineering
Lessons 12: Wireless Security
- Wi‐Fi
- Bluetooth
- Mobile Devices
Lessons 13: Attack and Defense
- Web Application Attacks
- Denial‐of‐Service Attacks
- Application Exploitation
- Lateral Movement
- Defence in Depth/Defence in Breadth
- Defensible Network Architecture
Lessons 14: Cryptography
- Basic Encryption
- Symmetric Key Cryptography
- Asymmetric Key Cryptography
- Certificate Authorities and Key Management
- Cryptographic Hashing
- PGP and S/MIME
- Disk and File Encryption
Lessons 15: Security Architecture and Design
- Data Classification
- Security Models
- Application Architecture
- Security Architecture
Lessons 16: Cloud Computing and the Internet of Things
- Cloud Computing Overview
- Cloud Architectures and Deployment
- Common Cloud Threats
- Internet of Things
- Operational Technology
Hands-on LAB Activities
Security Foundations
- Creating a Personal Linux Firewall Using iptables
- Viewing Syslog for Monitoring Logs
- Using Event Viewer
- Configuring Audit Policies in Windows
Footprinting and Reconnaissance
- Using Recon-ng to Gather Information
- Using Maltego to Gather Information
- Using the Harvester Tool
- Using the whois Program
- Using dnsrecon to Perform Enumeration
- Performing Zone Transfer Using dig
- Using ipconfig to Perform Reconnaissance
- Mirroring Sites with HTTrack
- Using and Checking Google Hacking Database (GHDB)
Scanning Networks
- Using the Zenmap Tool
- Conducting Vulnerability Scanning Using Nessus
- Performing Vulnerability Scanning Using OpenVAS
Enumeration
- Enumerating Data Using enum4linux
System Hacking
- Searching Exploits Using searchsploit
- Grabbing a Screenshot of a Target Machine Using Metasploit
- Loading and Using Mimikatz
- Cracking a Linux Password Using John the Ripper
- Cracking Windows Passwords
- Using Rainbow Tables to Crack Passwords
- Exploiting Windows 7 Using Metasploit
Malware
- Observing an MD5-Generated Hash Value
- Using the msfvenom Program
- Scanning Malware Using Antivirus
Sniffing
- Capturing Packets Using Wireshark
- Performing ARP Spoofing
Social Engineering
- Detecting a Phishing Site Using Netcraft
- Using the SET Tool
Attack and Defence
- Exploiting a Website Using SQL Injection
- Attacking a Website Using XSS Injection
- Defending Against a Buffer Overflow Attack
- Simulating a DoS Attack
Cryptography
- Performing Symmetric Encryption
- Examining Asymmetric Encryption
- Using OpenSSL to Create a Public/Private Key Pair
- Observing an SHA-Generated Hash Value
- Creating PGP Certification
Exam FAQs
To be eligible to apply to sit for the CEH (ANSI) Exam, a candidate must either: (Prior to being ANSI accredited, EC-Council's certifications were named, based on versions - CEHV1, CEHV2 etc. During that time, candidates that attempted the certification exams were vetted for eligibility. In order to avoid "being double bill", the EC-Council Certification department shall issue a waiver of the application fee of any candidate that has a CEH V1- CEH V7 certification and wishes to attempt the CEH ANSI certification.) or Have a minimum of 2 years of work experience in the InfoSec domain (You will need to pay GBP£100 as a non-refundable application fee); Or Have attended an official EC-Council training (All candidates are required to pay the $100 application fee; however, your training fee shall include this fee)
The fee is GBP £1500
ECC EXAM, VUE
Summary
Standard:
Certified Ethical Hacker
Lessons:
16+ Lessons
Delivery Method:
Online
Language:
English