Course Code: ceh
Duration: 35 hours
Prerequisites:
  • Basics of Networks TCP/IP
  • Basics of operating Systems
Overview:

Audience:

  • security officers, 
  • auditors,
  • security professionals, 
  • site administrators, 
  • anyone who is involved in the integrity of their network infrastructure

What you will learn:

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Network scanning techniques and scanning countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware, analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identity theft, and social engineering countermeasures 
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking
  • iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Exam Details:

If you intend to go through certifiaction then you will need to arrange this exam using a suitable testing facility (eg Pearson Vue).

  • Duration - 4 hours
  • Questions - 125
  • Further informationcan be found here: https://cert.eccouncil.org/faq.html
Course Outline:
  • Module 1 : Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3 : Scanning Networks
  • Module 4: Enumeration
  • Module 5: System Hacking
  • Module 6: Malware Threats
  • Module 7: Sniffing
  • Module 8: Social Engineering
  • Module 9: Denial-of-Service
  • Module 10: Session Hijacking
  • Module 11: Hacking Webservers
  • Module 12: Hacking Web Applications
  • Module 13: SQL Injection
  • Module 14: Hacking Wireless Networks
  • Module 15: Hacking Mobile Platforms
  • Module 16: Evading IDS, Firewalls, and Honeypots
  • Module 17: Cloud Computing
  • Module 18: Cryptography