Certified Ethical Hacker (CEH V12)

The CEH training has been desinged in such a manner to help individuals to understand concepts and develop the skill sets that are attractive to all global brands. The training is a combination of both theoretical and practical which will help you understand the course in a dynamic manner and also be able to apply it in real life. 

Wissenhive's training will ensure that it prepares you well to clear the CEH- V12 exam offered by EC- Council.

4.5 (1659) 8750 Learner

Accredited By EC-Council Accredited By EC-Council

Course Features
  • Accredited Training Partner
  • Lifetime Training Access
  • Study Guides
  • Access to I labs
  • Exam Voucher Included
  • 24/7 Support

Overview

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend against future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

With the wissenhive CEH V11 training, you will be able to evolve with the latest operating systems, tools, tactics, exploits, and technologies improving your employability.

What you will learn

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.

Syllabus

International industry expertise at your disposal as you deep-dive into the research topic and sector of your choice.

Career Options

After completing a properly certified ethical hacking course, career options become diverse. Most people think there are limited options, but it’s not true. Let’s cover some prominent leading career options that can be pursued after the ethical hacking course.

According to 2021 statistics in the United States, a professional Ethical Hacker’s average salary is around $100,200, and the monthly salary is about $8350, but typically salary range falls between $89,400 and $114,000 yearly. Salary range depends on various important factors that include the certified ethical hacking training course, education qualification, years of experience, additional skills, industry, etc.

Here are some other ethical hacking profession with their annual salary

 

Job Roles

Annual Salary

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Annual Salary

Annual Salary

Top Recruiters

Top Recruiters

Course Content

Introduction to Ethical Hacking (6 Lectures)

Information Security Overview

Cyber Kill Chain Concepts

Hacking Concepts

Ethical Hacking Concepts

Information Security Controls

Information Security Laws and Standards

Footprinting and Reconnaissance (12 Lectures)

Footprinting Concepts

Footprinting through Search Engines

Footprinting through Web Services

Footprinting through Social Networking Sites

Website Footprinting

Email Footprinting

Who is Footprinting

DNS Footprinting

Network Footprinting

Footprinting through Social Engineering

Footprinting Tools

Footprinting Countermeasures

Scanning Networks (7 Lectures)

Network Scanning Concepts

Scanning Tools

Host Discovery

Port and Service Discovery

OS Discovery (Banner Grabbing/OS Fingerprinting)

Scanning Beyond IDS and Firewall

Draw Network Diagrams

Enumeration (8 Lectures)

Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques

Enumeration Countermeasures

Vulnerability Analysis (4 Lectures)

Vulnerability Assessment Concepts

Vulnerability Classification and Assessment Types

Vulnerability Assessment Solutions and Tools

Vulnerability Assessment Reports

System Hacking (5 Lectures)

System Hacking Concepts

Gaining Access

Escalating Privileges

Maintaining Access

Clearing Logs

Malware Threats (8 Lectures)

Malware Concepts

APT Concepts

Trojan Concepts

Virus and Worm Concepts

Fileless Malware Concepts

Fileless Malware Concepts

Countermeasures

Anti-Malware Software

Sniffing (9 Lectures)

Sniffing Concepts

Sniffing Technique: MAC Attacks

Sniffing Technique: DHCP Attacks

Sniffing Technique: ARP Poisoning

Sniffing Technique: Spoofing Attacks

Sniffing Technique: DNS Poisoning

Sniffing Tools

Countermeasures

Sniffing Detection Techniques

Social Engineering (6 Lectures)

Social Engineering Concepts

Social Engineering Techniques

Insider Threats

Impersonation on Social Networking Sites

Identity Theft

Countermeasures

Denial-of-Service (7 Lectures)

DoS/DDoS Concepts

DoS/DDoS Attack Techniques

Botnets

DDoS Case Study

DoS/DDoS Attack Tools

Countermeasures

DoS/DDoS Protection Tools

Session Hijacking (5 Lectures)

Session Hijacking Concepts

Application Level Session Hijacking

Network Level Session Hijacking

Session Hijacking Tools

Countermeasures

Evading IDS, Firewalls, and Honeypots (7 Lectures)

IDS, IPS, Firewall, and Honeypot Concepts

IDS, IPS, Firewall, and Honeypot Solutions

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Countermeasures

Hacking Web Servers (7 Lectures)

Web Server Concepts

Web Server Attacks

Web Server Attack Methodology

Web Server Attack Tools

Countermeasures

Patch Management

Web Server Security Tools

Hacking Web Applications (5 Lectures)

Web Application Concepts

Web Server Attacks

Web Application Hacking Methodology

Web API, Webhooks, and Web Shell

Web Application Security

SQL Injection (6 Lectures)

SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Evasion Techniques

Countermeasures

Hacking Wireless Networks (8 Lectures)

Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking

Countermeasures

Wireless Security Tools

Hacking Mobile Platforms (5 Lectures)

Mobile Platform Attack Vectors

Hacking Android OS

Hacking iOS

Mobile Device Management

Mobile Security Guidelines and Tools

IoT and OT Hacking (10 Lectures)

IoT Hacking & IoT Concepts

IoT Attacks

IoT Hacking Methodology

IoT Hacking Tools

Countermeasures

OT Hacking OT & Concepts

OT Attacks

OT Hacking Methodology

OT Hacking Tools

Countermeasures

Cloud Computing (6 Lectures)

Cloud Computing Concepts

Container Technology

Serverless Computing

Cloud Computing Threats

Cloud Hacking

Cloud Security

Cryptography (8 Lectures)

Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)

Email Encryption

Disk Encryption

Cryptanalysis

Countermeasures

Course Details

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

Target Audience

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst 
  • System Administrators
  • Network Administrators and Engineers

 

 

Enquire Now

Training Options

Loading...

Exam & Certification

CEH (ANSI)

Exam Title: Certified Ethical Hacker (ANSI)  

Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)  

Number of Questions: 125

Duration: 4 hours  

Test Format: Multiple Choice

Availability: ECC EXAM / VUE 


CEH (Practical)

Exam Title: Certified Ethical Hacker (Practical)

Number of Practical Challenges: 20  

Duration: 6 hours  

Availability: Aspen- iLabs  

Test Format: iLabs cyber range

Passing Score: 70%

 

 

Certified Ethical Hacker (CEH V12)

Frequently Asked Questions

There are no prerequisites to enroll in this Ethical Hacking course. However, having a basic understanding of TCP/IP may enhance your learning experience.

Yes. This online program is accredited by EC-Council.

To unlock the Ethical Hacking training certificate, you have to complete all the modules, along with the projects.

Yes! The CEH  exam voucher is includes in the package.

Upgrade Your Skills with Our Advanced Courses

Speak with

Our Advisor

Mail Us

info@wissenhive.com

Contact Us

Drop a query