Certified Ethical Hacking Course - CEH v12

BY
Intellipaat

Learn the skills and techniques of ethical hacking such as penetration testing through the programme Certified Ethical Hacking Course - CEH v11 by Intellipaat.

Mode

Online

Fees

₹ 49020

Quick Facts

particular details
Collaborators EC-Council
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based
Frequency of Classes Weekends

Course overview

The Certified Ethical Hacking Course  - CEH v12 by Intellipaat is a programme that helps candidates to learn the skills required for ethical hacking. The duration of the course is six months. The programme will help the students to learn through the forty hours of instructor-led training. The course curriculum is designed by experienced faculty. Candidates will learn about penetration testing, enumeration, sniffing, Vulnerability, SQL injection, network packet analysis through the programme. Additionally, the Certified Ethical Hacking Course  - CEH v11 is suitable for working professionals. Candidates can get an increase in job opportunities and salaries after the course completion.

The highlights

  • The course duration of six months
  • 24 hours of self-paced videos 
  • Programme imparted in collaboration with EC-Council
  • 6 months iLab access (Cloud Lab)
  • Forty hours of instructor-led training 
  • Certified course by Intellipaat
  • Discount available

Program offerings

  • Online learning
  • Videos
  • Training
  • Cloud lab
  • Self-paced course

Course and certificate fees

Fees information
₹ 49,020

Certified Ethical Hacking Course - CEH v12 fee details are as follows:

  • Candidates have to pay Rs. 49,020 for the online classroom.
  • For corporate training, candidates have to contact the platform authorities. 
  • Candidates can avail of a limited period offer of 10% discount. 

Certified Ethical Hacking Course  - CEH v12 fee structure

Fee

Amount in INR

Online classroom 

Rs. 49,020 + GST

certificate availability

Yes

certificate providing authority

Intellipaat

Who it is for

The Certified Ethical Hacking Course  - CEH v12 online course is suitable for:

  • Working professionals such as network security officers, site administrators, system analysts, IT operations managers, senior system engineers and IT security officers.
  • Students who are interested in the field.

Eligibility criteria

Education 

There is no particular requirement but if candidates have knowledge of TCP and IP then it will be an added advantage. 

Certification qualifying details

Candidates through the Certified Ethical Hacking Course  - CEH v12 certification course will gain certification after course completion. They need to complete all the modules as well as projects to get the certificate of completion. In addition to this, candidates have to secure more than 60% in the quiz. Post which, candidates will then be able to get a certificate of completion.

What you will learn

Knowledge of hacking concepts Ethical hacking

Candidates through the Certified Ethical Hacking Course- CEH v12 certification will learn through the following:

  • They will learn about the hacking concepts.
  • Candidates can learn about ethical hacking.
  • Through the Certified Ethical Hacking Course  - CEH v12 certification course candidates will gain knowledge on Information assurance.
  • Students can gain knowledge on Information security policies.
  • Participants will learn about network security zoning.

The syllabus

Preparatory Sessions – Python

Python
  • Introduction to Python and IDEs
  • Python Basics
  • Object Oriented Programming
  • Hands-on Sessions and Assignments for Practice

Module 01: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Methodologies and Frameworks
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards

Module 02: Footprinting and Reconnaissance

  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures

Module 03: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures

Module 04: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures

Module 05: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

Module 06: System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs

Module 07: Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software

Module 08: Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attack
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures

Module 09: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management

Module 14: Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security

Module 15: SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • SQL Injection Countermeasures

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools

Module 18: IoT and OT Hacking

  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Attack Countermeasures
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Attack Countermeasures

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Threats
  • Cloud Hacking
  • Cloud Security

Module 20: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attack Countermeasures

Module 21: Working with Kali Linux 2021.1

  • Introduction to Kali Linux
  • Services in Kali (HTTP, SSH)
  • Command-line utilities (Wget, curl, grep, awk, and many more)
  • Key concepts and basics of scripting (Piping, Redirection and Bash Scripting)
  • Tools and utilities in Kali Linux ( Netcat, Socat, Powercat, Powershell, etc.)

Admission details

The students interested in Certified Ethical Hacking Course training can refer to the following:

Step 1: Candidates have to visit the official URL https://intellipaat.com/ceh-ethical-hacking-certification-course/.

Step 2: Candidates have to click on the ‘Enroll Now’ button.

Step 3: Thereafter, the candidates will be diverted to the payment page.

Step 4: The candidate has to make the payment and confirm their admission.


Filling the form

There is no application form. Candidates have to make the payment.

Evaluation process

Candidates interested in the Certified Ethical Hacking Course  - CEH v12 online course have to complete the course contents to achieve certification.

How it helps

Certified Ethical Hacking Course  - CEH v12 certification benefits individuals who want to pursue a career in this field. The verified certification increases the overall benefits of the course. Additionally, the Certified Ethical Hacking Course  - CEH v12 certification benefits the working professionals. They can expect development in their careers after the course completion.

FAQs

What is the duration of the Certified Ethical Hacking Course - CEH v12 programme?

The duration of the course is six months.

How can I access the course contents?

Candidates can access the course contents and Certified Ethical Hacking Course  - CEH v12 certification syllabus after the successful enrollment.

What if I have any queries?

In case of queries, candidates can visit the help centre.

What is the mode of learning?

Candidates have to learn in online mode only.

What if I have any doubts after the Certified Ethical Hacking Course - CEH v12 classes?

Candidates can refer to assistance provided by the platform.

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books