The Certified Ethical Hacker (CEH) version 12 provides in-depth knowledge of the phases of ethical hacking, various attack vectors, and preventive security measures.
It equips you with an understanding of how malicious hackers think and operate, enabling you to build a secure infrastructure and defend against future threats.
By identifying system vulnerabilities and weaknesses, organizations can reinforce their security controls, minimizing the risk of incidents.
CEH follows a systematic approach across all domains and methodologies of ethical hacking, helping you develop the essential knowledge and skills required to excel as an ethical hacker.
You’ll gain valuable insights into the responsibilities and actions needed to ensure security.
MODULE 1
Introduction to Ethical Hacking
MODULE 2
Footprinting and Reconnaissance
MODULE 3
Scanning Networks
MODULE 4
Enumeration
MODULE 5
Vulnerability Analysis
MODULE 6
System Hacking
MODULE 7
Malware Threats
MODULE 8
Sniffing
MODULE 9
Social Engineering
MODULE 10
Denial-of-Service
MODULE 11
Session Hijacking
MODULE 12
Evading IDS, Firewalls, and Honeypots
MODULE 13
Hacking Web Servers
MODULE 14
Hacking Web Applications
MODULE 15
SQL Injection
MODULE 16
Hacking Wireless Networks
MODULE 17
Hacking Mobile Platforms
MODULE 18
IoT Hacking
MODULE 19
Cloud Computing
MODULE 20
Cryptography
Course attendance certificate issued by Semos Education