The Certified Ethical Hacker V12 (CEHv12) certification is a globally recognized and highly sought-after credential in the field of network security. This certification validates a professional’s knowledge and skills in identifying vulnerabilities and weaknesses in target systems, using the same knowledge and hacking tools as a malicious hacker but in a lawful and legitimate manner. These ethical hackers help to improve system security by identifying and fixing potential security threats before they can be exploited. Industries across the globe utilize ethical hackers to protect sensitive information and vulnerable systems. Further, CEHv12 has updated schemas targeting the latest vulnerabilities, making it an essential certification for security professionals.
- Certifications
FIND YOUR COURSE
CERTIFICATIONS
- Insights
- Company
CERTIFIED ETHICAL HACKER
- Overview
- Course Outline
Course Prerequisites
• Prior understanding of networking concepts
• Experience in Windows and Linux operating systems
• Familiarity with hacking methodologies and cyber attack techniques
• Fundamental knowledge of information security concepts
• Background in IT or related fields.
• Ability to understand English language as course material is in English.
Certified Ethical Hacker v12 – CEHv12 Certification Training Overview
CEHv12 certification training equips IT professionals with essential knowledge on identifying, countering, and defeating cyber threats. The course covers understanding of attack vectors, performing network scanning, identifying vulnerabilities, system hacking concepts, malware threats, sniffing, social engineering, and hacking web servers and applications. It also includes session hacking, SQL injection, cryptography, IoT and OT hacking, cloud computing, and penetration testing. Trainees get direct, cloud-based lab experience and must pass an exam to earn their Certified Ethical Hacker designation.
Why Should You Learn Certified Ethical Hacker v12 – CEHv12?
Learning the Certified Ethical Hacker v12 – CEHv12 course equips aspirants with crucial cybersecurity skills. It enhances understanding of potential vulnerabilities, equips with comprehensive knowledge on attack prevention methods, and prepares for real-life scenarios. Businesses highly appreciate these skills, leading to an increase in career opportunities and potential income growth.
Target Audience for Certified Ethical Hacker v12 – CEHv12 Certification Training
• Information technology professionals
• Network security officers and practitioners
• Site administrators
• IS/IT Specialist, Analyst or Manager
• IS/IT Auditor or Consultant
• IT Operations Manager
• IT Security Officer, Auditor, or Engineer
• Network Specialist, Analyst, or Manager
• Technical Support Engineer
• Senior Systems Engineer
• Systems Analyst or Administrator.
-
Module 1: Introduction to Ethical Hacking
- Information Security Overview
- Hacking Methodologies and Frameworks
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Information Security Laws and Standards
-
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
-
Module 3: Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Network Scanning Countermeasures
-
Module 4: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
-
Module 5: Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Classification and Assessment Types
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
-
Module 6: System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
-
Module 7: Malware Threats
- Malware Concepts
- APT Concepts
- Trojan Concepts
- o Worm Makers
- Fileless Malware Concepts
- Malware Analysis
- Malware Countermeasures
- Anti-Malware Software
-
Module 8: Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
-
Module 9: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
-
Module 10: Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DoS/DDoS Attack Techniques
- DDoS Case Study
- DoS/DDoS Attack Countermeasures
-
Module 11: Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
-
Module 12: Evading IDS, Firewalls, and Honeypots
- IDS, IPS, Firewall, and Honeypot Concepts
- IDS, IPS, Firewall, and Honeypot Solutions
- Evading IDS
- Evading Firewalls
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
-
Module 13: Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
-
Module 14: Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API, Webhooks, and Web Shell
- Web Application Security
-
Module 15: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- SQL Injection Countermeasures
-
Module 16: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Attack Countermeasures
- Wireless Security Tools
-
Module 17: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
-
Module 18: IoT and OT Hacking
- IoT Hacking
- IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- OT Hacking
- OT Concepts
- OT Attacks
- OT Hacking Methodology
-
Module 19: Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Manipulating CloudTrial Service
- Cloud Security
-
Module 20: Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Cryptography Attack Countermeasures
Related Courses Available
Certified Penetration Testing Professional
Certified Secure Computer User
About Supreme Information
Supreme Training, a leading provider of comprehensive and cutting-edge IT training solutions. We are dedicated to empowering individuals and organizations with the knowledge and skills needed to thrive in today’s dynamic technology landscape.
SOLUTIONS
-
Value of Training
-
Group Training
-
Training Tools & Resources
-
Industries
-
Government
© 2023 Supreme Information Security LLC
proudly support with ♥ by SP SYSTEMS & NET SOLUTIONS