HomeCourseCertified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Hands-On Penetration Testing

Become a certified cybersecurity professional with the Certified Ethical Hacker (CEH) course—one of the most globally recognised credentials in ethical hacking and penetration testing. This program provides hands-on training in identifying vulnerabilities, securing networks, and thinking like a hacker to protect systems effectively.

Module 1: Introduction to Ethical Hacking

  • Overview of information security
  • Threats, attack vectors, and threat actors
  • Ethical hacking phases
  • Legal and regulatory considerations

Module 2: Footprinting and Reconnaissance

  • Footprinting techniques (active and passive)
  • Tools for reconnaissance
  • WHOIS, DNS enumeration, email footprinting
  • Countermeasures

Module 3: Scanning Networks

  • Network scanning types and techniques
  • Host discovery, port scanning, and service enumeration
  • Vulnerability scanning
  • Tools: Nmap, Nessus, OpenVAS

Module 4: Enumeration

  • NetBIOS, SNMP, LDAP, NFS enumeration
  • Windows and Linux enumeration
  • Enumeration tools and countermeasures

Module 5: Vulnerability Analysis

  • Types of vulnerabilities
  • Tools for vulnerability assessment
  • Interpreting scan results
  • Remediation techniques

Module 6: System Hacking

  • Gaining access: password cracking, exploits
  • Privilege escalation techniques
  • Maintaining access (backdoors, trojans)
  • Covering tracks (log clearing, rootkits)

Module 7: Malware Threats

  • Types of malware: viruses, worms, trojans, ransomware
  • Malware analysis basics
  • Anti-malware evasion

Module 8: Sniffing

  • Packet sniffing basics
  • ARP poisoning and MAC flooding
  • Tools: Wireshark, tcpdump
  • Prevention techniques

Module 9: Social Engineering

  • Types of social engineering attacks
  • Phishing, baiting, and pretexting
  • Tools and countermeasures

Module 10: Denial of Service

  • DoS and DDoS attack mechanisms
  • Botnets, amplification attacks
  • Detection and mitigation

Module 11: Session Hijacking

  • TCP/IP hijacking, session fixation
  • Tools for hijacking sessions
  • Prevention and mitigation

Module 12: Evading IDS, Firewalls, and Honeypots

  • Techniques for bypassing detection systems
  • Tools and techniques
  • Countermeasures

Module 13: Hacking Web Servers

  • Web server architecture and vulnerabilities
  • Attacks: directory traversal, misconfiguration
  • Tools and security practices

Module 14: Hacking Web Applications

  • OWASP Top 10
  • Input validation, session management attacks
  • SQL injection, XSS, CSRF
  • Web application testing tools

Module 15: SQL Injection

  • Manual and automated SQLi
  • Exploitation techniques
  • Mitigation and secure coding practices

Module 16: Hacking Wireless Networks

  • Wireless encryption (WEP, WPA, WPA2)
  • Attacks: sniffing, rogue AP, Evil Twin
  • Wireless hacking tools

Module 17: Hacking Mobile Platforms

  • Mobile OS vulnerabilities (iOS, Android)
  • App analysis and threats
  • Mobile security guidelines

Module 18: IoT and OT Hacking

  • IoT attack surface and vectors
  • Device fingerprinting
  • Threat modelling and secure design

Module 19: Cloud Computing

  • Cloud service models and threats
  • Attacking cloud infrastructures
  • Security tools for cloud

Module 20: Cryptography

  • Encryption algorithms (symmetric, asymmetric)
  • Hashing, digital signatures
  • Cryptanalysis and attacks
Show More