CEH (V12) Online Certification
About the Course
The Certified Ethical Hacker (CEH) is a professional certification program provided by the International Council of E-Commerce Consultants (EC-Council). The CEH certification is aimed at individuals who want to demonstrate their skills in network security, cryptography, web application security, and system hacking. The Objective of this course is to enhance individuals to understand and identify weaknesses and vulnerabilities in a computer system through CEH training. The CEH program emphasizes ethical hacking practices, meaning that individuals who obtain this certification are expected to use their skills for legitimate and legal purposes, such as securing systems and networks. Our instructors are highly skilled and experienced professionals who are dedicated to providing you with a comprehensive and hands-on learning experience. Employers often look for candidates with a combination of Certification and practical experience. Thank you for choosing LINT. We look forward to helping you enhance your skills, advance your career, and succeed in the dynamic world of Cyber Security.
Pre-requisites
Recommended to have at least two years of work experience in the networking and information security domain
Key Topics
1. Introduction to Ethical Hacking
- Cybersecurity fundamentals, hacking phases, legal/ethical issues.
2. Footprinting and Reconnaissance
- Information gathering, active/passive reconnaissance, tools for footprinting.
3. Scanning Networks
- Network discovery, vulnerability scanning, tools like Nmap and Nessus.
4. Enumeration
- Extracting network and system information, using tools for enumeration.
5. Vulnerability Analysis
- Assessing system vulnerabilities, patch management, using tools like OpenVAS.
6. System Hacking
- Password cracking, privilege escalation, malware, hiding tracks.
7. Malware Threats
- Trojans, worms, ransomware, malware analysis, and defenses.
8. Sniffing
- Packet capturing, MITM attacks, tools like Wireshark.
9. Social Engineering
- Phishing, impersonation, advanced social engineering techniques.
10. Denial of Service (DoS)
- DoS/DDoS attacks, botnets, mitigation strategies.
11. Session Hijacking
- Techniques for hijacking sessions, countermeasures.
12. Evading IDS, Firewalls, and Honeypots
- Evasion techniques and tools, bypassing security systems.
13. Hacking Web Servers
- Web server vulnerabilities, exploiting misconfigurations.
14. Hacking Web Applications
- SQL injection, XSS, securing web applications.
15. SQL Injection
- Types of SQL injections, tools like SQLmap, defense strategies.
16. Hacking Wireless Networks
- Cracking WEP/WPA, rogue access points, wireless security.
17. Hacking Mobile Platforms
- Mobile OS vulnerabilities, mobile device management, securing mobile platforms.
18. IoT and OT Hacking
- IoT vulnerabilities, hacking tools, IoT security best practices.
19. Cloud Computing
- Cloud threats, cloud penetration testing, securing cloud environments.
20. Cryptography
- Encryption standards, public key infrastructure, cryptography attacks.
For detailed topics and Labs : Signup to Free LINT Account and take tour of our Student Dashboard
Exam Information
Ideal Candidates for CEHv12 :
The ideal candidates for CEHv12 typically include individuals who are involved in securing IT systems and networks. Here are the key profiles that benefit from obtaining this certification.
- Information Security Analyst
- Penetration Testers (Ethical Hackers)Network Security Engineers
- Security ConsultantsIT Managers
- IT AuditorsRisk and Compliance Analysts
Career Benefits:
Industry Recognition : Globally recognized certification in ethical hacking
Skill Validation : Validates skills in identifying and mitigating security vulnerabilities
Career Advancement : Opens up opportunities for advanced roles in cybersecurity
Related Courses : CompTIA Pentest+, Palo Alto, Fortinet, Cisco Firewalls, Check Points,
Related Job Oriented Programs : Cyber Security Analyst, Security Engineering, Network Engineering