CEH V12 Certification Modules
Module 1: Introduction to Ethical Hacking
Module 2: Foot Printing and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: Vulnerability Analysis
Module 6: System Hacking
Module 7: Malware Threats
Module 8: Sniffing
Module 9: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injections
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking & OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
The Certified Ethical Hacker (C|EH v12) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The C|EH exam is ANSI 17024 compliant adding credibility and value to credential members.
This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.
- Increased job opportunities: Having a CEH certification
significantly enhances your job possibilities in the cybersecurity field.
Employers often prefer candidates with specialized certifications like CEH.
- Competitive advantage: With so many professionals competing
for cybersecurity positions, having a CEH certification gives you a competitive
edge over others.
- Industry recognition: CEH is a globally recognized
certification, which means that it is valued by employers worldwide. It
demonstrates your expertise and credibility in the field.
- Enhanced skillset: The CEH certification equips you with
in-depth knowledge and skills in various areas of cybersecurity, such as
ethical hacking techniques, network security, penetration testing, and
vulnerability assessment. This enhances your overall skillset in the field.
- Staying updated: CEH certification requires you to
continuously update your knowledge and skills to keep up with the evolving
cybersecurity landscape. This ensures that you stay current and relevant in the
field.
- Increased earning potential: Certified professionals
generally earn higher salaries compared to their non-certified counterparts.
Having a CEH certification can lead to better job opportunities and higher
remuneration.
- Industry connections: The CEH certification provides you
with opportunities to network with other certified professionals, industry
experts, and employers through forums, conferences, and online communities.
- Validation of ethical hacking skills: CEH certification
validates your ethical hacking skills, demonstrating your ability to identify
and fix vulnerabilities in computer systems and networks. This can give you
more credibility and trust among employers and clients.
- Career advancement: With a CEH certification, you have the
potential for rapid career growth within the cybersecurity field. It opens
doors to positions such as penetration tester, ethical hacker, security
consultant, or security analyst.
- Personal development: Pursuing and obtaining a CEH
certification requires dedication, perseverance, and continuous learning. This
not only enhances your technical skills but also develops your discipline and
professional work ethic.
- Number of Questions: 125
- Test Duration: 4 Hours
- Test Format: Multiple Choice
- Test Delivery: IEVISION Exam Centre or VUE Testing Centre
- Exam Prefix: 312-50 (ECC-Exam & VUE)
- Key issues plaguing the information security world, incident management process, and penetration testing.
- Various types of foot printing, foot printing tools, and countermeasures.
- Network scanning techniques and scanning countermeasures.
- Enumeration techniques and enumeration countermeasures.
- System hacking methodology, steganography, steganalysis attacks, and covering tracks.
- Different types of Trojans, Trojan analysis, and Trojan countermeasures.
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
- Packet sniffing techniques and how to defend against sniffing.
- Social Engineering techniques, identify theft, and social engineering countermeasures.
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
- Session hijacking techniques and countermeasures.
- Different types of webserver attacks, attack methodology, and countermeasures.
- Different types of web application attacks, web application hacking methodology, and countermeasures.
- SQL injection attacks and injection detection tools.
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
- Various cloud computing concepts, threats, attacks, and security techniques and tools.
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
- Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
- Different threats to IoT platforms and learn how to defend IoT devices securely.
Pradeesh Kumar at
M.MOHAMMED NAHSHAL at
kiran kumar koniki at
Rasmeet Kaur at
Ankita Acharekar at