Certified Ethical Hacker (CEH) v12 with Exam (312-50)

Unlock the skills of a Certified Ethical Hacker to protect critical infrastructure with CEH v12, the globally trusted cybersecurity certification designed for IT security professionals.

Course Thumbnail

Essential Skills Gained

Checkmark

Understand the phases of ethical hacking and attack vectors.

Checkmark

Implement preventative countermeasures against malicious hacking.

Checkmark

Design security infrastructure to defend against future attacks.

Checkmark

Engage in hands-on labs to develop hacking skills and knowledge.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • IT Security Professionals
  • Network Administrators
  • System Administrators
  • Cybersecurity Analysts

Description

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.” CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure. In its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. This course includes one remote exam voucher for the CEH – Certified Ethical Hacker exam (312-50).

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Module 01: Introduction to Ethical Hacking

  1. Fundamentals of ethical hacking

  2. Information security controls

  3. Relevant laws and standard procedures

Module 02: Foot Printing and Reconnaissance

  1. Techniques and tools for foot printing

  2. Critical pre-attack phase of ethical hacking

Module 03: Scanning Networks

  1. Fundamentals of network scanning

  2. Information security controls for networks

Module 04: Enumeration

  1. Enumeration techniques

  2. BGP and NFS exploits

  3. Associated countermeasures

Module 05: Vulnerability Analysis

  1. Identifying network security loopholes

  2. Communication infrastructure vulnerabilities

Module 06: System Hacking

  1. System hacking methodologies

  2. Steganography and steganalysis attacks

Module 07: Malware Threats

  1. Types of malware: Trojans, viruses, worms

  2. System auditing and malware analysis

Module 08: Sniffing

  1. Packet-sniffing techniques

  2. Countermeasures against sniffing

Module 09: Social Engineering

  1. Social engineering concepts and techniques

  2. Human-level vulnerability auditing

Module 10: Denial-of-Service

  1. DoS and DDoS attack techniques

  2. Tools and countermeasures for DoS protection

Module 11: Session Hijacking

  1. Session hijacking techniques

  2. Network-level session management vulnerabilities

Module 12: Evading IDS, Firewalls, and Honeypots

  1. Evasion techniques for IDS and firewalls

  2. Countermeasures for network perimeter security

Module 13: Hacking Web Servers

  1. Web server attack methodologies

  2. Auditing web server vulnerabilities

Module 14: Hacking Web Applications

  1. Web application attack methodologies

  2. Auditing web application vulnerabilities

Module 15: SQL Injection

  1. SQL injection attack techniques

  2. Detection tools and countermeasures

Module 16: Hacking Wireless Networks

  1. Wireless encryption and hacking tools

  2. Wi-Fi security methodologies

Module 17: Hacking Mobile Platforms

  1. Mobile platform attack vectors

  2. Android vulnerability exploits

Module 18: IoT and OT Hacking

  1. Packet-sniffing techniques

  2. Defending against IoT vulnerabilities

Module 19: Cloud Computing

  1. Cloud computing concepts and technologies

  2. Cloud-based security threats and tools

Module 20: Cryptography

  1. Cryptography and cipher techniques

  2. Cryptanalysis tools and public-key infrastructure

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.