Certified Ethical Hacker (CEH) Training
Course 20315 DAY COURSE
Course Outline
In CEH v13, you will not only master AI-driven cybersecurity but also learn to hack AI systems. This comprehensive training equips you with cutting-edge AI-driven skills, enhancing your ability to execute cybersecurity tasks with up to 40% greater efficiency, while significantly boosting your productivity.
U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE
Certified Ethical Hacker (CEH) Training Benefits
-
In this CEH Certification course, you will:
- Successfully prepare for the Certified Ethical Hacker (CEH v13) Certification Exam
- Master the application of AI in cybersecurity Learn to hack AI systems
- Explore multiple AI and GPT tools
- Automate repetitive tasks
- Detect advanced threats
- Make informed decisions using AI-enhanced analysis
- Adapt to evolving threats through AI-driven learning
- Improve reporting with AI-powered insights
- Become familiar with the following AI Tools: ShellGPT, ChatGPT, FraudGPT, WormGPT, DeepExploit, Nebula, Veed.io
- Gain access to hundreds of exam prep questions
- Receive a CEH exam voucher included in the course tuition
- Access an Ethical Hacking Video Library
-
Prerequisites
Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.
CEH Training Outline
Learning Objectives
Module 01 Introduction to Ethical Hacking
- Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Module 02 Footprinting and Reconnaissance
- Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.
Module 03 Scanning Networks
- Learn different network scanning techniques and countermeasures.
Module 04 Enumeration
- Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Module 05 Vulnerability Analysis
- Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.
- Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 06 System Hacking
- Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Module 07 Malware Threats
- Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Module 08 Sniffing
- Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 09 Social Engineering
- Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10 Denial-of-Service
- Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11 Session Hijacking
- Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Module 12 Evading IDS, Firewalls, and Honeypots
- Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Module 13 Hacking Web Servers
- Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14 Hacking Web Applications
- Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.
Module 15 SQL Injection
- Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16 Hacking Wireless Networks
- Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17 Hacking Mobile Platforms
- Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18 IoT Hacking
- Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19 Cloud Computing
- Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Module 20 Cryptography
- Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
- choosing a selection results in a full page refresh