The Certified Ethical Hacker

Description

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies, the use of creative attack vectors,
and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors,
Certified Ethical Hackers operate with permission from the system owners and take all precautions
to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who
use their attack skills to uncover vulnerabilities in the systems.

Curriculum Objectives

20 Modules That Help You Master the Foundations of Ethical Hacking and Prepare to Take the C|EH Certification Exam:

  • Introduction to Ethical Hacking
  • Foot Printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Key Updates of C|EH® v12

Features:
1. New Learning Methodology: Learn – Certify – Engage – Compete
2. Compete: new challenges every month to test your job-ready skills!
3. 100% Compliance to NICE 2.0 Framework
4. Based on a comprehensive industry-wide job-task analysis
5. Hands-on learning labs
6. Practice Range
7. Global C|EH community competitions
8. Cheat Sheet
9. Coverage of the latest malware
10. Lab-intensive program (Every learning objective is demonstrated using labs)
11. Hands-on program (More than 50% of training time is dedicated to labs)
12. Lab environment simulates a real-time environment(Lab setup simulates
real-life networks and platforms)
13. Covers the latest hacking tools (Based on Windows, macOS, and Linux)
14. Latest OS covered and a patched testing environment
15. All the tool screenshots are replaced with the latest version
16. All the tool listing slides are updated with the latest tools
17. All the countermeasure slides are updated
Technology Updates:
1. MITRE ATTACK Framework
2. Diamond Model of Intrusion Analysis
3. Techniques for Establishing Persistence
4. Evading NAC and Endpoint Security
5. Fog Computing
6. Edge Computing
7. Grid Computing

Department
EC-Council
Campus
Sunrise Institute
Level
Beginner
Credit
Method
Physical
Start Date
Duration
45hrs (Mon-Fri 6pm-8pm and Weekend 8am-12pm or 2pm-5pm)