Content
(Total learning: 151 lessons
Time: 150 hours)
Module 1: Introduction to Ethical Hacking
0/7
Module 2: Footprinting and Reconnaissance
0/14
-
2.1
-
2.2
-
2.3
-
2.4
-
2.5
-
2.6
-
2.7
-
2.8
-
2.9
-
2.10
-
2.11
-
2.12
-
2.13
-
2.14
Module 3: Scanning Networks
0/7
Module 4: Enumeration
0/8
Module 5: Vulnerability Analysis
0/5
Module 6: System Hacking
0/7
-
6.1
-
6.2
-
6.3
-
6.4
-
6.5
-
6.6
-
6.7
Module 7: Malware Threats
0/7
-
7.1
-
7.2
-
7.3
-
7.4
-
7.5
-
7.6
-
7.7
Module 8: Sniffing
0/10
-
8.1
-
8.2
-
8.3
-
8.4
-
8.5
-
8.6
-
8.7
-
8.8
-
8.9
-
8.10
Module 9: Social Engineering
0/7
Module 10: Denial-of-Service
0/8
-
10.1
-
10.2
-
10.3
-
10.4
-
10.5
-
10.6
-
10.7
-
10.8
Module 11: Session Hijacking
0/6
Module 12: Evading IDS, Firewalls, and Honeypots
0/8
Module 13: Hacking Web Servers
0/8
-
13.1
-
13.2
-
13.3
-
13.4
-
13.5
-
13.6
-
13.7
-
13.8
Module 14: Hacking Web Applications
0/7
-
14.1
-
14.2
-
14.3
-
14.4
-
14.5
-
14.6
-
14.7
Module 15: SQL Injection
0/6
-
15.1
-
15.2
-
15.3
-
15.4
-
15.5
-
15.6
Module 16: Hacking Wireless Networks
0/9
-
16.1
-
16.2
-
16.3
-
16.4
-
16.5
-
16.6
-
16.7
-
16.8
-
16.9
Module 17: Hacking Mobile Platforms
0/7
-
17.1
-
17.2
-
17.3
-
17.4
-
17.5
-
17.6
-
17.7
Module 18: IoT Hacking
0/6
-
18.1
-
18.2
-
18.3
-
18.4
-
18.5
-
18.6
Module 19: Cloud Computing
0/6
-
19.1
-
19.2
-
19.3
-
19.4
-
19.5
-
19.6
Module 20: Cryptography
0/8
-
20.1
-
20.2
-
20.3
-
20.4
-
20.5
-
20.6
-
20.7
-
20.8
Advantages
- EC-Council Certified & Authorised Mentors
- Access to CEHv11 iLabsStudy material
- 24/7 Access to Codemithra Learning & Assessment Platform
- Live instructor led training sessions
- Live hands-on lab and mini-project sessions
- Digital content valid for two years
Additional Access to Basic Essential Course (Total learning: 50+ lessons Time: 250 hours)
- Basics of Java
- Aptitude with Quantitative + Verbal + Reasoning
- Eguru Online Mock Interviews with Industry Experts
- 100+ hours training for learners who need extra training
Course Outcome
You will learn
- Information security controls, laws, and standards.
- Various types of footprinting, footprinting tools, and countermeasures.
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
- System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
- Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
- Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
- Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
- DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
- Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
- Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
- Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
- SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
- Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
- Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
- Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
- Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
- Threats to IoT and OT platforms and defending IoT and OT devices.
- Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Career Opportunities
- Manual Ethical Hacker
- Junior Penetration Tester
- Red Team Operator
- Network Security Engineer
This content is protected, please login and enroll in the course to view this content!