About this Course
Certified Ethical Hacker (CEH) Course Description
The Certified Ethical Hacker (CEH) course provides a comprehensive understanding of ethical hacking methodologies and techniques. This intensive program equips participants with the knowledge and skills needed to identify vulnerabilities in systems, networks, and applications. Unlike other courses, the CEH program is designed to immerse participants in the practical aspects of penetration testing, allowing them to think and act like a security professional. The course doesn't just focus on theory; it emphasizes hands-on labs, simulations, and real-world scenarios to prepare individuals for the dynamic cybersecurity landscape.
Course Objectives
- Understand the core principles of ethical hacking and its significance in information security.
- Identify and evaluate vulnerabilities using various scanning and enumeration techniques.
- Learn to perform penetration testing using advanced hacking tools and methodologies.
- Develop a practical understanding of how hackers exploit system and application weaknesses.
- Acquire knowledge about various security threats such as malware, social engineering, and denial-of-service attacks.
- Understand cryptography concepts and its role in information security.
- Learn how to protect systems, networks, and applications against potential security breaches.
- Develop incident response skills for effective handling of security incidents.
- Understand legal and ethical considerations related to ethical hacking and penetration testing.
- Gain insights into current security trends and emerging threats.
Course Outline
Introduction to Ethical Hacking
- Defining ethical hacking and its role in cybersecurity.
- Understanding the various types of hackers: black hat, white hat, and grey hat.
- Exploring the phases of hacking methodologies and the legal landscape.
- The importance of information security policies and standards.
Footprinting and Reconnaissance
- Using Google hacking techniques to gather information.
- Exploring website footprinting techniques.
- Network scanning using Nmap, Shodan, and other tools.
- Identifying network infrastructure and target systems.
- Gathering information on DNS, routing, and system configurations.
Scanning Networks
- Performing port scanning to detect open ports.
- Identifying live hosts and operating systems.
- Vulnerability scanning using tools like Nessus and OpenVAS.
- Performing network mapping and topology discovery.
- Analyzing scan results and identifying potential weaknesses.
Enumeration
- Enumerating user accounts and groups.
- Gathering network resource information.
- Enumerating Windows and Linux based systems
- Using SNMP, SMTP, and other protocols for enumeration.
- Identifying shared folders and services.
Vulnerability Analysis
- Understanding common vulnerabilities and weaknesses.
- Categorizing vulnerabilities according to their severity.
- Analyzing vulnerabilities for impact and exploitability.
- Understanding the CVE database and exploiting security gaps.
- Performing static and dynamic analysis.
System Hacking
- Understanding password cracking techniques.
- Exploring privilege escalation on windows and linux systems
- Understanding rootkits, backdoors and other malware.
- Covering tracks after gaining access to a system.
- Understanding and applying various system exploitation techniques
Malware Threats
- Understanding various types of malware: viruses, worms, trojans, and ransomware.
- Analyzing malware behavior and characteristics.
- Detecting malware using security tools and techniques.
- Understanding malware propagation and infection vectors.
- Malware prevention and protection strategies.
Sniffing
- Understanding network sniffing techniques.
- Using tools like Wireshark for network traffic analysis.
- Capturing and analyzing network packets.
- Identifying sensitive data transmitted over the network.
- Protecting networks against sniffing attacks.
Social Engineering
- Understanding the principles of social engineering.
- Exploring different types of social engineering attacks.
- Performing social engineering penetration testing.
- Creating social engineering awareness programs.
- Protecting yourself and others against social engineering attacks.
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
- Understanding the concept of DoS and DDoS attacks.
- Exploring various DoS and DDoS attack techniques.
- Protecting systems and networks against DoS/DDoS attacks.
- Using tools to analyze DoS/DDoS attacks
- Implementing prevention strategies.
Session Hijacking
- Understanding session hijacking mechanisms.
- Exploring different session hijacking techniques.
- Protecting systems against session hijacking attacks.
- Implementing secure session management practices.
- Using tools for session hijacking analysis
Hacking Web Servers
- Understanding web server vulnerabilities.
- Identifying web server configuration issues.
- Performing web server exploitation techniques.
- Protecting web servers from attacks.
- Webserver hardening and security controls.
Hacking Web Applications
- Understanding web application vulnerabilities like SQL injection and Cross-Site Scripting (XSS).
- Exploring different web application attack techniques.
- Performing web application penetration testing.
- Identifying security issues with web application frameworks.
- Implementing secure coding practices.
SQL Injection
- Understanding the mechanics of SQL injection attacks.
- Exploring different SQL injection techniques.
- Preventing SQL injection vulnerabilities.
- Using SQL injection tools for testing.
- Testing for vulnerabilities related to SQL injection
Wireless Network Hacking
- Understanding various wireless standards and protocols.
- Identifying wireless network vulnerabilities.
- Exploring wireless hacking techniques.
- Protecting wireless networks from unauthorized access
- Using tools to perform wireless network assessment
Hacking Mobile Platforms
- Understanding mobile platform vulnerabilities.
- Exploring mobile application attack techniques.
- Performing mobile penetration testing.
- Protecting mobile devices and data from unauthorized access.
- Understanding permissions and authorization
Cryptography
- Understanding cryptographic concepts.
- Exploring different encryption algorithms.
- Implementing cryptographic solutions.
- Exploring digital signatures and certificates.
- Understanding Hash functions
Cloud Computing
- Understanding cloud computing concepts.
- Exploring cloud vulnerabilities and security best practices.
- Identifying security issues with cloud service providers.
- Protecting cloud environments.
- Using security controls specific to cloud infrastructure
Penetration Testing
- Performing practical penetration tests in real-world scenarios.
- Understanding and applying different penetration testing methodologies.
- Reporting and documenting penetration test results.
- Analyzing penetration testing tools.
- Post-penetration remediation processes.
Incident Response
- Understanding the incident response process.
- Developing incident response plans and procedures.
- Identifying and analyzing security incidents.
- Implementing containment and eradication strategies.
- Post-incident recovery and analysis
Course Values and Benefits
The CEH certification is a highly recognized credential in the cybersecurity industry. The practical experience gained in this course gives students a significant advantage over others in the field. Participants will not only learn how to identify and exploit vulnerabilities, but also understand the legal and ethical implications of such actions. This training enhances the ability to proactively safeguard organizations from a variety of cyber threats and build robust security programs. With the demand for security professionals consistently increasing, individuals holding the CEH certification are highly sought-after and often qualify for lucrative careers in this rapidly evolving sector. The skills acquired in this course are invaluable for those seeking a career in cybersecurity, as they provide a comprehensive view of offensive security practices and strategies.
New here? Sign in to learn and earn certificates!
External Resources
How to Get Certified
Enroll in the Course
Click the "Enroll" button to view the pricing plans.
There, you can select a plan or your preferred options and complete your payment to access the course.
Complete the Course
Answer the certification questions by selecting a difficulty level:
Beginner: Master the material with interactive questions and more time.
Intermediate: Get certified faster with hints and balanced questions.
Advanced: Challenge yourself with more questions and less time
Earn Your Certificate
To download and share your certificate, you must achieve a combined score of at least 75% on all questions answered.
Course Features
24/7 Support
Around-the-clock assistance for any questions or concerns you may have.
Study Guides
Easy-to-follow guides that break down complex topics for better understanding.
Honorary Certification
Receive a recognized certification before completion of the course.
Career Workshops
Hands-on workshops that help you build important career skills.
Networking Events
Special events designed for you to connect with industry leaders and fellow participants.
Insightful Webinars
Live sessions led by experts to help you deepen your understanding of key topics.
Expert Coaching
One-on-one sessions with industry experts to enhance your skills and knowledge.
Pricing Plans
Currency
Log in to change your currency
I'm not ready to enroll?
Our team is here to help you choose the best options for your learning goals.
Frequently Asked Questions
For detailed information about our Certified Ethical Hacker (CEH) course, including what you’ll learn and course objectives, please visit the "About This Course" section on this page.
The course is offered online. If you want to meet people in person, you can choose the "Networking Events" option when you enroll. These events allow you to connect with instructors and fellow participants in person.
The course doesn't have a fixed duration. It has 20 questions, and each question takes about 5 to 30 minutes to answer. You’ll receive your certificate once you’ve answered most of the questions. Learn more here.
The course is always available, so you can start at any time that works for you!
We partner with various organizations to curate and select the best networking events, webinars, and instructor Q&A sessions throughout the year. You’ll receive more information about these opportunities when you enroll.
You will receive a Certificate of Excellence when you score 75% or higher in the course, showing that you have learned about Certified Ethical Hacker (CEH).
An Honorary Certificate allows you to receive a Certificate of Commitment right after enrolling, even if you haven’t finished the course. It’s ideal for busy professionals who need certification quickly but plan to complete the course later.
The course price varies based on the features you select when you enroll. We also have plans that bundle related features together, so you can choose what works best for you.
No, you won't. Once you obtain a certificate in a course, you retain access to it and the completed exercises even after your subscription expires. However, to take new exercises, you'll need to re-enroll if your subscription has run out.
To verify a certificate, visit the Verify Certificate page on our website and enter the 12-digit certificate ID. You can then confirm the authenticity of the certificate and review details such as the enrollment date, completed exercises, and their corresponding levels and scores.
Can't find answers to your questions?
Discussion Forum
Join the discussion!
No comments yet. Sign in to share your thoughts and connect with fellow learners.
Featured Courses
- 52 Views
- 22 Questions
- 751 Views
- 17 Questions
- 17 Views
- 15 Questions
- 399 Views
- 22 Questions
- 479 Views
- 17 Questions
- 272 Views
- 12 Questions
- 437 Views
- 16 Questions
- 239 Views
- 23 Questions