Training Type | Classroom & Online |
---|---|
Course Duration | 50 Days |
No. of Hours | Weekdays( Mon to Thu)- 2hrs/Day, Weekend (Sat & Sun)- 4hrs/Day, Only Sunday- 6hrs Per Day |
Certificate | Yes |
Skill Level | Intermediate |
Study Material | Yes |
Batches Available | (Mon-Thu) & (Sat-Sun) |
Roadmap
Roadmap
Course Outline
The Certified Ethical Hacker (CH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of C H in 2003, it is recognized as a standard within the information security community. C H v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of C H remain valid and relevant today: "To beat a hacker, you need to think like a hacker."
- • Session hijacking techniques to discover network-level session
- management, authentication/authorization, cryptographic weaknesses, and countermeasures.
- • Web server attacks and a comprehensive attack methodology to audit
- vulnerabilities in web server infrastructure, and countermeasures.
- • Web application attacks and comprehensive web application hacking
- methodology to audit vulnerabilities in web applications, and countermeasures.
- • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
- • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines andtools.
- • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
- • Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and securitytechniques and tools.
- • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
- • Threats to loT and OT platforms and learn how to defend loT and OT devices securely.
- • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
- Overview of Current Security Trends
- Understanding the Elements of Information Security
- Understanding Information Security Threats and Attack Vectors
- Overview of Hacking Concepts, Types, and Phases
- Understanding Ethical Hacking Concepts and Scope
- Overview of Information Security Controls
- Overview of Penetration Testing
- Overview of Information Security Acts and Laws
- Understanding Footprinting Concepts
- Footprinting through Search Engines and Advanced Google Hacking Techniques
- Footprinting through Web Services and Social Networking Sites
- Understanding Website Footprinting, Email Footprinting, and Competitive Intelligence
- Understanding WHOIS, DNS, and Network Footprinting
- Footprinting through Social Engineering
- Understanding different Footprinting Tools and Countermeasures
- Understanding Footprinting Penetration Testing
- Understanding Network Scanning Concepts
- Understanding various Scanning Tools
- Understanding various Scanning Techniques
- Understanding various Techniques to Scan Beyond IDS and Firewall
- Understanding Banner Grabbing
- Drawing Network Diagrams
- Overview of Scanning Pen Testing
- Understanding Enumeration Concepts
- Understanding Different Techniques for NetBIOS Enumeration
- Understanding Different Techniques for SNMP Enumeration
- Understanding Different Techniques for LDAP and NTP Enumeration
- Understanding Different. Techniques for SMTP and DNS Enumeration
- Understanding Other Enumerations such as IPsec, VolP, RPC, and Linux/Unix enumeration
- Understanding Different Enumeration Countermeasures
- Overview of Enumeration Pen Testing
- Overview of Vulnerability Research and Vulnerability Classification
- Overview of Vulnerability Assessment
- Overview of Vulnerability Management Life Cycle (Vulnerability Assessment Phases)
- Understanding Different Approaches of Vulnerability Assessment Solutions
- Understanding Different Types of Vulnerability Assessment Tools
- Overview of Vulnerability Scoring Systems
- Vulnerability Assessment Tools
- Overview of Vulnerability Assessment Reports
- Overview of EH Hacking Methodology
- Understanding Techniques to Gain Access to the System
- Understanding Privilege Escalation Techniques
- Understanding Techniques to Create and Maintain Remote Access to the System
- Overview of Different Types of Rootkits
- Overview of Steganography and Steganalysis Techniques
- Understanding Techniques to Hide the Evidence of Compromise
- Overview of System Hacking Penetration Testing
- Understanding Malware and Malware Propagation Techniques
- Overview of Trojans, Their Types, and How they Infect Systems
- Overview of Viruses, Their Types, and How They Infect Files
- Overview of Computer Worms
- Understanding the Malware Analysis Process
- Understanding Different Techniques to Detect Malware
- Understanding Different Malware Countermeasures
- Understand Malware Penetration Testing
- Overview of Sniffing Concepts
- Understanding Various Sniffing Techniques
- Understanding How to Defend Against Various Sniffing Techniques
- Overview of Various Sniffing Tools
- Understanding Different Sniffing Countermeasures
- Understanding Different Techniques to Detect Sniffing
- Overview of Sniffing Penetration Testing
- Understanding Social Engineering Concepts
- Understanding various Social Engineering Techniques
- Understanding Insider Threats
- Understanding Impersonation on Social Networking Sites
- Understanding Identity Theft
- Understanding Different Social Engineering Countermeasures
- Understanding Different Insider Threats and Identity Theft Countermeasures
- Overview of Social Engineering Penetration Testing
- Overview of Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- Understanding Different Dos/DDoS Attack Techniques
- Understanding the Botnet Network
- Understanding Various DoS and DDoS Attack Tools
- Understanding Different Techniques to Detect DoS and DDoS Attacks
- Understanding Different Dos/DDoS Countermeasures
- Overview of DoS Attack Penetration Testing
- Understanding Session Hijacking Concepts
- Understanding Application Level Session
- Understanding Network Level Session Hijacking
- Overview of Session Hijacking Tools
- Understanding Different Session Hijacking Countermeasures
- Overview of Session Hijacking Penetration Testing
- Understanding IDS, Firewall, and Honeypot Concepts
- IDS, Firewall and Honeypot Solutions
- Understanding different Techniques to Bypass IDS
- Understanding different Techniques to Bypass Firewalls
- IDS/Firewall Evading Tools
- Understanding different Techniques to Detect honeypots
- IDS/Firewall Evasion Countermeasures
- Overview of IDS and Firewall Penetration Testing
- Understanding Web Server Concepts
- Understanding Web Server Attacks
- Understanding Web Server Attack Methodology
- Overview ofiWeb Server Attack Tools
- Understanding Different Web Server Attack Countermeasures
- Understanding Patch Management Concepts
- Overview of Web Server Security Tools
- Overview of Web 5 ever Penetration Testing
- Understanding Web Application Concepts
- Understanding Web Application Threats
- Understanding Web Application Hacking Methodology
- Overview of Web Application Hacking Tools
- Understanding Different Web Application Attack's Countermeasures
- Overview of Web Application Security Testing Tools
- Overview of Web Application Penetration Testing
- Understanding SQL Injection Concepts
- Understanding various types of SQUinjection Attacks
- Understanding SOL injection Methodology
- Understanding various SQL injection Taos
- Understanding different IDS Evasion Techniques
- Overview of SQL Injection Countermeasures
- Overview of various SQL injection Detection Tools
- Overview of Wireless Concepts
- Overview of Wireless Encryption Algorithms
- Understanding Wireless Threats
- Understanding Wireless Hacking Methodology
- Overview of Different Wireless Hacking Tools
- Understanding Bluetooth Hacking Techniques
- Overview of Wireless Hacking Countermeasures and Security Tools
- Overview of Wireless Penetration Testing
- Understanding Mobile Platform Attack Vectors
- Understanding various Android Threats and Attacks
- Understanding various IOS Threats and Attacks
- Understanding various Mobile Spyware
- Understanding Mobile Device Management (MDM)
- Mobile Security Guidelines and Security Tools
- Overview of Mobile Penetration Testing
- Understanding loT Concepts
- Overview of loT Threats and Attacks
- Understanding loT Hacking Methodology
- IoT Hacking Tools
- IoT Hacking Countermeasures
- Mot Security Tools
- Overview of loT Penetration Testing
- Understanding Cloud Computing Concepts
- Understanding Cloud Computing Threats
- Understanding Cloud Computing Attacks
- Understanding Cloud Computing Security
- Cloud Computing Security Tools
- Overview of Cloud Penetration testing
- Understanding Cryptography Concepts
- Overview of Encryption Algorithr
- Cryptography Tools
- Understanding Public Key Infrastructure (PI)
- Understanding Email Encryption
- Understanding Disk Encryption
- Understanding Cryptography Attacks
- Cryptanalysis Tools
Track | Classroom & Online |
---|---|
Duration | 50 Days |
Hours | Weekdays( Mon to Thu)- 2hrs/Day, Weekend (Sat & Sun)- 4hrs/Day, Only Sunday- 6hrs Per Day |