CEH v12 Certified Ethical Hacker Training

BY
Simplilearn

The CEH v12 Certified Ethical Hacker Training will furnish you with comprehensive knowledge about advanced processes involved in ethical hacking.

Mode

Online

Fees

₹ 49999 79363

Important Dates

13 Oct, 2024 - 17 Nov, 2024

Course Commencement Date

10 Nov, 2024 - 14 Dec, 2024

Course Commencement Date

05 Dec, 2024 - 15 Jan, 2025

Course Commencement Date

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based
Frequency of Classes Weekends

Course overview

The CEH v12 - Certified Ethical Hacker Training by Simplilearn is an EC-Council accredited course that will prepare candidates for the CEH exams. The course is in alignment with the latest CEH v12 by the EC-Council. It’s an online training program that will help the learner become an expert in system penetration testing techniques and network packet analysis so that they can build their network security skill set and safeguard against hackers. 

This CEH v12 - Certified Ethical Hacker Training by Simplilearn also provides practical hands-on training to the learners so that they can understand the techniques hackers use to infiltrate network systems. All candidates get six month access to CEHv10 iLabs. The course will teach candidates how to secure a system against hackers and enhance their blue team skills.

The course provides access to 90 days of live online classes and lifetime access to self-paced online learning content. The candidates also get the EC-Council study material and a CEH exam voucher. There is also a corporate training learning model available so that businesses can train their IT employees in ethical hacking.

The highlights

  • 40 hours of online blended learning
  • 20 contemporary security domain
  • Real-world project-based
  • Certification by Simplilearn

Program offerings

  • Self-paced learning
  • Corporate training
  • 24x7 learner assistance and support
  • Live classroom training
  • Accredited by the ec-council
  • Access to ec-council study material
  • Access to cehv12 ilabs for six months

Course and certificate fees

Fees information
₹ 49,999  ₹79,363

The CEH v12 Certified Ethical Hacker Training fee details have been mentioned in the table. As soon as you pay the fee, you will be ready to attend the course. 

Fee Structure

HeadAmount
Original PriceRs. 79,363
Discounted PriceRs. 49,999
certificate availability

Yes

certificate providing authority

Simplilearn

Who it is for

The CEH v12 - Certified Ethical Hacker Training is highly suitable for - 

  • IT Security Officers – Anyone who wants to work as a security officer in the IT department can opt for the CEH v12 - Certified Ethical Hacker Training.

Eligibility criteria

Certification Qualifying Detail

The candidate must appear in the CEH exam to get the certification. A maximum of 5 attempts can be made in a period of 12-months to get the certificate. A candidate cannot retake the same version of the exam, if they have already passed the particular version.

What you will learn

Sql knowledge Knowledge of cloud computing Knowledge of honeypots

Upon course completion, you will learn the following skills:

  • Learn how to secure a system using IDS, Honeypots and Firewalls
  • Learn how to avoid system penetration attempts by hackers like Backdoors and Trojans
  • Learn how to intercept and analyse network packets
  • Learn how to safeguard against advanced methods of hacking
  • Learn how to deal with log messages generated by systems
  • Learn how to secure mobile and web systems

The syllabus

Introduction to Ethical Hacking

Information Security Overview
  • Demo of Aspen and iLabs
  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
  • Essential Terminology
  • Elements of Information Security
  • The Security, Functionality, and Usability Triangle
Information Security Threats and Attack Vectors
  • Motives, Goals, and Objectives of Information Security Attacks
  • Top Information Security Attack Vectors
  • Information Security Threat Categories
  • Types of Attacks on a System01:56
  • Information Warfare
Hacking Concepts
  • What is Hacking?
  • Who is a Hacker?
  • Hacker Classes 
  • Hacking Phases
Ethical Hacking Concepts
  • What is Ethical Hacking?
  • Why Ethical Hacking is Necessary
  • Scope and Limitations of Ethical Hacking
  • Skills of an Ethical Hacker
Information Security Controls
  • Information Assurance (IA)
  • Information Security Management Program
  • Enterprise Information Security Architecture (EISA)
  • Network Security Zoning
  • Defense in Depth
  • Information Security Policies
  • Physical Security
  • What is Risk?
  • Threat Modeling
  • Incident Management
  • Security Incident and Event Management (SIEM)
  • User Behavior Analytics (UBA)
  • Network Security Controls
  • Identity and Access Management (IAM)
  • Data Leakage
  • Data Backup
  • Data Recovery
  • Role of AI/ML in Cyber Security
Penetration Testing Concepts
  • Penetration Testing
  • Why Penetration Testing
  • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • Blue Teaming/Red Teaming
  • Types of Penetration Testing
  • Phases of Penetration Testing
  • Security Testing Methodology
Information Security Laws and Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • ISO/IEC 27001:2013
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Sarbanes Oxley Act (SOX)
  • The Digital Millennium Copyright Act (DMCA)
  • Federal Information Security Management Act (FISMA)
  • Cyber Law in Different Countries

Footprinting and Reconnaissance

Footprinting Concepts
  • What is Footprinting?
  • Objectives of Footprinting
Footprinting through Search Engines
  • Footprinting through Search Engines
  • Footprinting using Advanced Google Hacking Techniques
  • Information Gathering Using Google Advanced Search and Image Search
  • Google Hacking Database
  • VoIP and VPN Footprinting through Google Hacking Database
Footprinting through Web Services
  • Finding Company’s Top-level Domains (TLDs) and Sub-domains
  • Finding the Geographical Location of the Target
  • People Search on Social Networking Sites and People Search Services07:41
  • Gathering Information from LinkedIn
  • Gather Information from Financial Services
  • Footprinting through Job Sites00:56
  • Monitoring Target Using Alerts
  • Information Gathering Using Groups, Forums, and Blogs
  • Determining the Operating System
  • VoIP and VPN Footprinting through SHODAN
Footprinting through Social Networking Sites
  • Collecting Information through Social Engineering on Social Networking Sites

Website Footprinting
  • Website Footprinting
  • Website Footprinting using Web Spiders
  • Mirroring Entire Website
  • Extracting Website Information from https://archive.org
  • Extracting Metadata of Public Documents
  • Monitoring Web Pages for Updates and Changes
Email Footprinting
  • Tracking Email Communications
  • Collecting Information from Email Header
  • Email Tracking Tools
Competitive Intelligence
  • Competitive Intelligence Gathering
  • Competitive Intelligence - When Did this Company Begin? How Did it Develop?
  • Competitive Intelligence - What Are the Company's Plans?
  • Competitive Intelligence - What Expert Opinions Say About the Company
  • Monitoring Website Traffic of Target Company
  • Tracking Online Reputation of the Target
Whois Footprinting
  • Whois Lookup
  • Whois Lookup Result Analysis30:26
  • Whois Lookup Tools
  • Finding IP Geolocation Information
DNS Footprinting
  • Extracting DNS Information
  • DNS Interrogation Tools
Network Footprinting
  • Locate the Network Range
  • Traceroute
  • Traceroute Tools
Footprinting through Social Engineering
  • Footprinting through Social Engineering
  • Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
Footprinting Tools
  • Maltego
  • Recon-ng
  • FOCA
  • Recon-Dog
  • OSRFramework
  • Additional Footprinting Tools
Countermeasures
  • Footprinting Countermeasures

Footprinting Pen Testing
  • Footprinting Pen Testing
  • Footprinting Pen Testing Report Templates

Scanning Networks

Network Scanning Concepts
  • Overview of Network Scanning
  • TCP Communication Flags
  • TCP/IP Communication
  • Creating Custom Packet Using TCP Flags
  • Scanning in IPv6 Networks
Scanning Tools
  • Nmap
  • Hping2 / Hping3
  • Scanning Tools
  • Scanning Tools for Mobile
Scanning Techniques
  • Scanning Technique
  • Port Scanning Countermeasures
Scanning Beyond IDS and Firewall
  • IDS/Firewall Evasion Techniques
Banner Grabbing
  • Banner Grabbing
  • How to Identify Target System OS
  • Banner Grabbing Countermeasures
Draw Network Diagrams
  • Draw Network Diagrams
  • Network Discovery and Mapping Tools
  • Network Discovery Tools for Mobile
Scanning Pen Testing
  • Scanning Pen Testing

Enumeration

Enumeration Concepts
  • What is Enumeration?
  • Techniques for Enumeration
  • Services and Ports to Enumerate
NetBIOS Enumeration
  • NetBIOS Enumeration
  • NetBIOS Enumeration Tool
  • Enumerating User Accounts
  • Enumerating Shared Resources Using Net View
SNMP Enumeration
  • SNMP (Simple Network Management Protocol) Enumeration06:20
  • Working of SNMP
  • Management Information Base (MIB)
  • SNMP Enumeration Tools
LDAP Enumeration
  • LDAP Enumeration
  • LDAP Enumeration Tools
NTP Enumeration
  • NTP Enumeration
  • NTP Enumeration Commands
  • NTP Enumeration Tools
SMTP Enumeration and DNS Enumeration
  • SMTP Enumeration
  • SMTP Enumeration Tools
  • DNS Enumeration Using Zone Transfer
Other Enumeration Techniques
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
Enumeration Countermeasures
  • Enumeration Countermeasures

Enumeration Pen Testing
  • Enumeration Pen Testing

Vulnerability Analysis

Vulnerability Assessment Concepts
  • Vulnerability Research
  • Vulnerability Classification
  • What is Vulnerability Assessment?
  • Types of Vulnerability Assessment
  • Vulnerability-Management Life Cycle
Vulnerability Assessment Solutions
  • Comparing Approaches to Vulnerability Assessment
  • Working of Vulnerability Scanning Solutions
  • Types of Vulnerability Assessment Tools
  • Characteristics of a Good Vulnerability Assessment Solution
  • Choosing a Vulnerability Assessment Tool
  • Criteria for Choosing a Vulnerability Assessment Tool
  • Best Practices for Selecting Vulnerability Assessment Tools
Vulnerability Scoring Systems
  • Common Vulnerability Scoring System (CVSS)
  • Common Vulnerabilities and Exposures (CVE)
  • National Vulnerability Database (NVD)
  • Resources for Vulnerability Research
Vulnerability Assessment Tools
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Tools for Mobile
Vulnerability Assessment Reports
  • Vulnerability Assessment Reports
  • Analyzing Vulnerability Scanning Report

System Hacking

System Hacking Concepts
  • CEH Hacking Methodology (CHM)
  • System Hacking Goals
Cracking Passwords
  • Password Cracking
  • Types of Password Attacks
  • Password Recovery Tools
  • Microsoft Authentication
  • How Hash Passwords Are Stored in Windows SAM?
  • NTLM Authentication Process
  • Kerberos Authentication
  • Password Salting
  • Tools to Extract the Password Hashes
  • Password Cracking Tools
  • How to Defend against Password Cracking
  • How to Defend against LLMNR/NBT-NS Poisoning
Escalating Privileges
  • Privilege Escalation
  • Privilege Escalation Using DLL Hijacking
  • Privilege Escalation by Exploiting Vulnerabilities
  • Privilege Escalation Using Dylib Hijacking
  • Privilege Escalation using Spectre and Meltdown Vulnerabilities
  • Other Privilege Escalation Techniques
  • How to Defend Against Privilege Escalation
Executing Applications
  • Executing Applications
  • Keylogger
  • Spyware
  • How to Defend Against Keyloggers
  • How to Defend Against Spyware
Hiding Files
  • Rootkits
  • NTFS Data Stream
  • What is Steganography?
Covering Tracks
  • Covering Tracks
  • Disabling Auditing: Auditpol
  • Clearing Logs
  • Manually Clearing Event Logs
  • Ways to Clear Online Tracks
  • Covering BASH Shell Tracks
  • Covering Tracks on Network
  • Covering Tracks on OS
  • Covering Tracks Tools
Penetration Testing
  • Password Cracking
  • Privilege Escalation
  • Executing Applications
  • Hiding Files
  • Covering Tracks

Malware Threats

Malware Concepts
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to Distribute Malware on the Web
  • Components of Malware
Trojan Concepts
  • What is a Trojan?
  • How Hackers Use Trojans
  • Common Ports used by Trojans
  • How to Infect Systems Using a Trojan
  • Trojan Horse Construction Kit
  • Wrappers
  • Crypters
  • How Attackers Deploy a Trojan
  • Exploit Kits
  • Evading Anti-Virus Techniques
  • Types of Trojans
Virus and Worm Concepts
  • Introduction to Viruses
  • Stages of Virus Life
  • Working of Viruses
  • Indications of Virus Attack
  • How does a Computer Get Infected by Viruses
  • Virus Hoaxes
  • Fake Antiviruses
  • Ransomware
  • Types of Viruses
  • Creating Virus
  • Computer Worms
  • Worm Makers
Malware Analysis
  • What is Sheep Dip Computer?
  • Anti-Virus Sensor Systems
  • Introduction to Malware Analysis
  • Malware Analysis Procedure: Preparing Testbed
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Virus Detection Methods
  • Trojan Analysis: ZeuS/Zbot
  • Virus Analysis: WannaCry
Countermeasures
  • Trojan Countermeasures
  • Backdoor Countermeasures
  • Virus and Worms Countermeasures
Anti-Malware Software
  • Anti-Trojan Software
  • Antivirus Software
Malware Penetration Testing
  • Malware Penetration Testing

Sniffing

Sniffing Concepts
  • Network Sniffing
  • Types of Sniffing
  • How an Attacker Hacks the Network Using Sniffers
  • Protocols Vulnerable to Sniffing
  • Sniffing in the Data Link Layer of the OSI Model
  • Hardware Protocol Analyzers
  • SPAN Port
  • Wiretapping
  • Lawful Interception
Sniffing Technique: MAC Attacks
  • MAC Address/CAM Table
  • How CAM Works
  • What Happens When CAM Table Is Full?
  • MAC Flooding
  • Switch Port Stealing
  • How to Defend against MAC Attacks
Sniffing Technique: DHCP Attacks
  • How DHCP Works
  • DHCP Request/Reply Messages
  • DHCP Starvation Attack
  • Rogue DHCP Server Attack
  • How to Defend Against DHCP Starvation and Rogue Server Attack
Sniffing Technique: ARP Poisoning
  • What Is Address Resolution Protocol (ARP)?
  • ARP Spoofing Attack
  • Threats of ARP Poisoning
  • ARP Poisoning Tools
  • How to Defend Against ARP Poisoning
  • Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
  • ARP Spoofing Detection Tools
Sniffing Technique: Spoofing Attacks
  • MAC Spoofing/Duplicating
  • MAC Spoofing Technique: Windows
  • MAC Spoofing Tools
  • IRDP Spoofing
  • How to Defend Against MAC Spoofing
Sniffing Technique: DNS Poisoning
  • DNS Poisoning Techniques
  • How to Defend Against DNS Spoofing
Sniffing Tools
  • Sniffing Tool: Wireshark
  • Sniffing Tools
  • Packet Sniffing Tools for Mobile
Countermeasures
  • How to Defend Against Sniffing
Sniffing Detection Techniques
  • How to Detect Sniffing
  • Sniffer Detection Techniques
  • Promiscuous Detection Tools
Sniffing Pen Testing
  • Sniffing Penetration Testing

Social Engineering

Social Engineering Concepts
  • What is Social Engineering?
  • Phases of a Social Engineering Attack
Social Engineering Techniques
  • Types of Social Engineering
  • Human-based Social Engineering
  • Computer-based Social Engineering
  • Mobile-based Social Engineering
Impersonation on Social Networking Sites
  • Social Engineering Through Impersonation on Social Networking Sites
  • Impersonation on Facebook
  • Risks of Social Networking Threats to Corporate Networks
Identity Theft
  • Identity Theft

Countermeasures
  • Social Engineering Countermeasures
  • Insider Threats Countermeasures
  • Identity Theft Countermeasures
  • How to Detect Phishing Emails
  • Anti-Phishing Toolbar
  • Common Social Engineering Targets and Defense Strategies
Social Engineering Penetration Testing
  • Social Engineering Pen Testing
  • Social Engineering Pen Testing Tools
Insider Threats
  • Insider Threat / Insider Attack
  • Type of Insider Threats

Denial-of-Service

DoS/DDoS Concepts
  • What is Denial of Service Attack?
  • What is Distributed Denial of Service Attack?
DoS/DDoS Attack Techniques
  • Basic Categories of DoS/DDoS Attack Vectors
  • UDP Flood Attack
  • ICMP Flood Attack
  • Ping of Death and Smurf Attack
  • SYN Flood Attack
  • Fragmentation Attack
  • HTTP GET/POST and Slowloris Attacks
  • Multi-Vector Attack
  • Peer-to-Peer Attacks
  • Permanent Denial-of-Service Attack
  • Distributed Reflection Denial-of-Service (DRDoS)
Botnets
  • Organized Cyber Crime: Organizational Chart
  • Botnet
  • A Typical Botnet Setup
  • Botnet Ecosystem
  • Scanning Methods for Finding Vulnerable Machines
  • How Malicious Code Propagates?
  • Botnet Trojan
DDoS Case Study
  • DDoS Attack
  • Hackers Advertise Links to Download Botnet
  • Use of Mobile Devices as Botnets for Launching DDoS Attacks
  • DDoS Case Study: Dyn DDoS Attack
DoS/DDoS Attack Tools
  • DoS and DDoS Attack Tool
  • DoS and DDoS Attack Tool for Mobile
Countermeasures
  • Detection Techniques
  • DoS/DDoS Countermeasure Strategies
  • DDoS Attack Countermeasures
  • Techniques to Defend against Botnets
  • DoS/DDoS Countermeasures
  • DoS/DDoS Protection at ISP Level
  • Enabling TCP Intercept on Cisco IOS Software
DoS/DDoS Protection Tools
  • Advanced DDoS Protection Appliances
  • DoS/DDoS Protection Tools
DoS/DDoS Attack Penetration Testing
  • Denial-of-Service (DoS) Attack Pen Testing

Session Hijacking

Session Hijacking Concepts
  • What is Session Hijacking?
  • Why Session Hijacking is Successful?
  • Session Hijacking Process
  • Packet Analysis of a Local Session Hijack
  • Types of Session Hijacking
  • Session Hijacking in the OSI Model
  • Spoofing vs. Hijacking
Application Level Session Hijacking
  • Application Level Session Hijacking
  • Compromising Session IDs using Sniffing and by Predicting Session Token
  • Compromising Session IDs Using Man-in-the-Middle Attack
  • Compromising Session IDs Using Man-in-the-Browser Attack
  • Compromising Session IDs Using Client-side Attacks
  • Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
  • Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
  • Compromising Session IDs Using Session Replay Attack
  • Compromising Session IDs Using Session Fixation
  • Session Hijacking Using Proxy Servers
  • Session Hijacking Using CRIME Attack
  • Session Hijacking Using Forbidden Attack
Network Level Session Hijacking
  • TCP/IP Hijacking
  • IP Spoofing: Source Routed Packets
  • RST Hijacking
  • Blind Hijacking
  • UDP Hijacking
  • MiTM Attack Using Forged ICMP and ARP Spoofing
Session Hijacking Tools
  • Session Hijacking Tools
  • Session Hijacking Tools For Mobile
Countermeasures
  • Session Hijacking Detection Methods
  • Protecting against Session Hijacking
  • Methods to Prevent Session Hijacking: To be Followed by Web Developers
  • Methods to Prevent Session Hijacking: To be Followed by Web Users
  • Session Hijacking Detection Tools
  • Approaches Vulnerable to Session Hijacking and their Preventative Solutions
  • Approaches to Prevent Session Hijacking
  • IPSec
  • Session Hijacking Prevention Tools
Penetration Testing
  • Session Hijacking Pen Testing

Evading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Concepts
  • Intrusion Detection System (IDS)
  • Firewall
  • Honeypot
IDS, Firewall and Honeypot Solutions
  • Intrusion Detection Tool
  • Firewalls
  • Honeypot Tools
Evading IDS
  • IDS Evasion Techniques
Evading Firewalls
  • Firewall Evasion Techniques
IDS/Firewall Evading Tools
  • IDS/Firewall Evasion Tools
  • Packet Fragment Generator Tools
Detecting Honeypots
  • Detecting Honeypots
  • Detecting and Defeating Honeypots
  • Honeypot Detection Tool: Send-Safe Honeypot Hunte
IDS/Firewall Evasion Countermeasures
  • How to Defend Against IDS Evasion
  • How to Defend Against Firewall Evasion
Penetration Testing
  • Firewall/IDS Penetration Testing

Hacking Web Servers

Web Server Concepts
  • Web Server Operations
  • Open Source Web Server Architecture
  • IIS Web Server Architecture
  • Web Server Security Issue
  • Why Web Servers Are Compromised?
  • Impact of Web Server Attacks
Web Server Attacks
  • DoS/DDoS Attacks
  • DNS Server Hijacking
  • DNS Amplification Attack
  • Directory Traversal Attacks
  • Man-in-the-Middle/Sniffing Attack
  • Phishing Attacks
  • Website Defacement
  • Web Server Misconfiguration
  • HTTP Response Splitting Attack
  • Web Cache Poisoning Attack
  • SSH Brute Force Attack
  • Web Server Password Cracking
  • Web Application Attacks
Web Server Attack Methodology
  • Information Gathering
  • Web Server Footprinting/Banner Grabbing
  • Website Mirroring
  • Vulnerability Scanning
  • Session Hijacking
  • Web Server Passwords Hacking
  • Using Application Server as a Proxy
Web Server Attack Tools
  • Metasploit
  • Web Server Attack Tools
Countermeasures
  • Place Web Servers in Separate Secure Server Security Segment on Network
  • Countermeasures
  • Detecting Web Server Hacking Attempts
  • How to Defend Against Web Server Attacks
  • How to Defend against HTTP Response Splitting and Web Cache Poisoning
  • How to Defend against DNS Hijacking
Patch Management
  • Patches and Hotfixes
  • What is Patch Management
  • Installation of a Patch
  • Patch Management Tools
Web Server Security Tools
  • Web Application Security Scanners
  • Web Server Security Scanners
  • Web Server Security Tools
Web Server Pen Testing
  • Web Server Penetration Testing
  • Web Server Pen Testing Tools

Hacking Web Applications

Web App Concepts
  • Introduction to Web Applications
  • Web Application Architecture
  • Web 2.0 Applications
  • Vulnerability Stack
Web App Threats
  • OWASP Top 10 Application Security Risks – 2017
  • Other Web Application Threats
Hacking Methodology
  • Web App Hacking Methodology
  • Footprint Web Infrastructure
  • Attack Web Servers
  • Analyze Web Applications
  • Bypass Client-Side Controls
  • Attack Authentication Mechanism
  • Authorization Attack Schemes
  • Attack Access Controls
  • Attack Session Management Mechanism
  • Perform Injection/Input Validation Attacks
  • Attack Application Logic Flaws
  • Attack Database Connectivity
  • Attack Web App Client
  • Attack Web Services
Web Application Hacking Tools
  • Web Application Hacking Tools

Countermeasures
  • Web Application Fuzz Testing
  • Source Code Review
  • Encoding Schemes
  • How to Defend Against Injection Attacks
  • Web Application Attack Countermeasures
  • How to Defend Against Web Application Attacks
Web App Security Testing Tools
  • Web Application Security Testing Tools
  • Web Application Firewall
Web App Pen Testing
  • Web Application Pen Testing
  • Web Application Pen Testing Framework

SQL Injection

SQL Injection Concepts
  • What is SQL Injection?
  • SQL Injection and Server-side Technologies
  • Understanding HTTP POST Request
  • Understanding Normal SQL Query
  • Understanding an SQL Injection Query
  • Understanding an SQL Injection Query – Code Analysis
  • Example of a Web App Vulnerable to SQL Injection: BadProductList.aspx
  • Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
  • Example of SQL Injection
Types of SQL Injection
  • Types of SQL Injection

SQL Injection Methodology
  • SQL Injection Methodology
SQL Injection Tools
  • SQL Injection Tools
  • SQL Injection Tools for Mobile
Evasion Techniques
  • Evading IDS
  • Types of Signature Evasion Techniques
Countermeasures
  • How to Defend Against SQL Injection Attacks?
  • SQL Injection Detection Tools

Hacking Wireless Networks

Wireless Concepts
  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standards
  • Service Set Identifier (SSID)
  • Wi-Fi Authentication Modes
  • Wi-Fi Authentication Process Using a Centralized Authentication Server
  • Types of Wireless Antenna
Wireless Encryption
  • Types of Wireless Encryption
  • WEP vs. WPA vs. WPA2
  • WEP Issues
  • Weak Initialization Vectors (IV)
Wireless Threats
  • Wireless Threats

Wireless Hacking Methodology
  • Wireless Hacking Methodology

Wireless Hacking Tools
  • WEP/WPA Cracking Tools
  • WEP/WPA Cracking Tool for Mobile
  • Wi-Fi Sniffer
  • Wi-Fi Traffic Analyser Tools
  • Other Wireless Hacking Tools
Bluetooth Hacking
  • Bluetooth Stack
  • Bluetooth Hacking
  • Bluetooth Threats
  • How to BlueJack a Victim?
  • Bluetooth Hacking Tools
Countermeasures
  • Wireless Security Layers
  • How to Defend Against WPA/WPA2 Cracking
  • How to Defend Against KRACK Attacks
  • How to Detect and Block Rogue AP
  • How to Defend Against Wireless Attacks
  • How to Defend Against Bluetooth Hacking
Wireless Security Tools
  • Wireless Intrusion Prevention Systems
  • Wireless IPS Deployment
  • Wi-Fi Security Auditing Tool
  • Wi-Fi Intrusion Prevention System
  • Wi-Fi Predictive Planning Tools
  • Wi-Fi Vulnerability Scanning Tools
  • Bluetooth Security Tool
  • Wi-Fi Security Tools for Mobile
Wi-Fi Pen Testing
  • Wireless Penetration Testing
  • Wireless Penetration Testing Framework

Hacking Mobile Platforms

Mobile Platform Attack Vectors
  • Vulnerable Areas in Mobile Business Environment
  • OWASP Top 10 Mobile Risks - 2016
  • Anatomy of a Mobile Attack
  • How a Hacker can Profit from Mobile when Successfully Compromised
  • Mobile Attack Vectors and Mobile Platform Vulnerabilities
  • Security Issues Arising from App Stores
  • App Sandboxing Issues
  • Mobile Spam
  • SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
  • Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
Hacking Android OS
  • Android OS
  • Android Rooting
  • Blocking Wi-Fi Access using NetCut
  • Hacking with zANTI
  • Hacking Networks Using Network Spoofer
  • Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
  • Performing Session Hijacking Using DroidSheep
  • Hacking with Orbot Proxy
  • Android-based Sniffers
  • Android Trojans
  • Securing Android Devices
  • Android Security Tool: Find My Device
  • Android Security Tools
  • Android Vulnerability Scanner
  • Android Device Tracking Tools
Hacking iOS
  • Apple iOS
  • Jailbreaking iOS
  • iOS Trojans
  • Guidelines for Securing iOS Devices
  • iOS Device Tracking Tools
  • iOS Device Security Tools
Mobile Spyware
  • Mobile Spyware
  • Mobile Spyware: mSpy
  • Mobile Spywares
Mobile Device Management
  • Mobile Device Management (MDM)
  • Mobile Device Management Solutions
  • Bring Your Own Device (BYOD)
Mobile Security Guidelines and Tools
  • General Guidelines for Mobile Platform Security
  • Mobile Device Security Guidelines for Administrator
  • SMS Phishing Countermeasures
  • Mobile Protection Tools
  • Mobile Anti-Spyware
Mobile Pen Testing
  • Android Phone Pen Testing
  • iPhone Pen Testing
  • Mobile Pen Testing Toolkit: Hackode

IoT Hacking

IoT Concepts
  • What is IoT
  • How IoT Works
  • IoT Architecture
  • IoT Application Areas and Devices
  • IoT Technologies and Protocols
  • IoT Communication Models
  • Challenges of IoT
  • Threat vs Opportunity
IoT Attacks
  • IoT Security Problems
  • OWASP Top 10 IoT Vulnerabilities and Obstacles
  • IoT Attack Surface Areas
  • IoT Threats
  • Hacking IoT Devices: General Scenario
  • IoT Attacks
  • IoT Attacks in Different Sectors
IoT Hacking Methodology
  • What is IoT Device Hacking?
  • IoT Hacking Methodology
IoT Hacking Tools
  • Information Gathering Tools
  • Sniffing Tools
  • Vulnerability Scanning Tools
  • IoT Hacking Tools
Countermeasures
  • How to Defend Against IoT Hacking
  • General Guidelines for IoT Device Manufacturing Companies
  • OWASP Top 10 IoT Vulnerabilities Solutions
  • IoT Framework Security Considerations
  • IoT Security Tools
IoT Pen Testing
  • IoT Pen Testing

Cloud Computing

Cloud Computing Concepts
  • Introduction to Cloud Computing
  • Separation of Responsibilities in Cloud
  • Cloud Deployment Models
  • NIST Cloud Computing Reference Architecture
  • Cloud Computing Benefits
  • Understanding Virtualization
Cloud Computing Threats
  • Cloud Computing Threats

Cloud Computing Attacks
  • Service Hijacking using Social Engineering Attacks
  • Service Hijacking using Network Sniffing
  • Session Hijacking using XSS Attack
  • Session Hijacking using Session Riding
  • Domain Name System (DNS) Attacks
  • Side Channel Attacks or Cross-guest VM Breaches
  • SQL Injection Attacks
  • Cryptanalysis Attacks
  • Wrapping Attack
  • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • Man-in-the-Cloud Attack
Cloud Security
  • Cloud Security Control Layers
  • Cloud Security is the Responsibility of both Cloud Provider and Consumer
  • Cloud Computing Security Considerations
  • Placement of Security Controls in the Cloud
  • Best Practices for Securing Cloud
  • NIST Recommendations for Cloud Security
  • Organization/Provider Cloud Security Compliance Checklist
Cloud Security Tools
  • Cloud Security Tools
Cloud Penetration Testing
  • What is Cloud Pen Testing?
  • Key Considerations for Pen Testing in the Cloud
  • Cloud Penetration Testing
  • Recommendations for Cloud Testing

Cryptography

Cryptography Concepts
  • Cryptography
  • Government Access to Keys (GAK)
Encryption Algorithms
  • Ciphers
  • Data Encryption Standard (DES)
  • Advanced Encryption Standard (AES)
  • RC4, RC5, and RC6 Algorithms
  • Twofish
  • The DSA and Related Signature Schemes
  • Rivest Shamir Adleman (RSA)
  • Diffie-Hellman
  • Message Digest (One-Way Hash) Functions
Cryptography Tools
  • MD5 Hash Calculators
  • Hash Calculators for Mobile
  • Cryptography Tools
  • Cryptography Tools for Mobile
Public Key Infrastructure (PKI)
  • Public Key Infrastructure (PKI)

Email Encryption
  • Digital Signature
  • Secure Sockets Layer (SSL)
  • Transport Layer Security (TLS)
  • Cryptography Toolkit
  • Pretty Good Privacy (PGP)
Disk Encryption
  • Disk Encryption
  • Disk Encryption Tools
Cryptanalysis
  • Cryptanalysis Methods
  • Code Breaking Methodologies
  • Cryptography Attacks
  • Cryptanalysis Tools
  • Online MD5 Decryption Tools
Countermeasures
  • How to Defend Against Cryptographic Attacks

Admission details


Filling the form

Applying for CEH v12 - Certified Ethical Hacker Training is simple and easy. All you need to do is click on the link https://www.simplilearn.com/cyber-security/ceh-certification and go to the Enroll Now button. When you click on the button a new page will open. Enter the coupon code (if applicable) or click on the Proceed button. Fill out the application form, click on the Proceed button and make the payment. Please save the receipt of the transaction for future reference.

The CEH exam voucher is included in the ethical hacking course fee of Simplilearn. However, the candidate must procure the voucher within 3 months of purchasing the course. If CEH exam price increases and the candidate has not booked the exam, they will need to pay the difference in amount to Simplilearn.

Evaluation process

Certified Ethical Hacker (CEH) Exam - A certification exam conducted by the EC-Council for information security professionals. The exam will be 4 hours long and will contain 125 Multiple Choice Questions.

Candidates must clear the CEH exam with at least 70% marks to become CEH certified.

Certified Ethical Hacker (CEH) Practical Exam – The candidates will also have to clear the practical exam by EC-Council to get the certificate. The exam will consist of 20 practical tests that will require candidates to make use of live virtual machines, applications and networks. The practical exam will be 6 hours long.

Candidates must clear the CEH Practical exam with at least 70% marks to become CEH certified.

How it helps

The CEH v12 - Certified Ethical Hacker Training instils all the skills required to become an information security professional. Almost every employer has made CEH mandatory for security-related posts in their IT department. The CEH v12 - Certified Ethical Hacker Training will also provide a certificate to the learners. The certified CEH professionals earn 44% higher salaries than their non-certified counterparts.

After the certification course, you can apply for several job titles like an Information Security Officer, Computer Forensics Engineer, Ethical Hacker, Network Security Engineer and Data Security Analysis. An average CEH professional can earn up to Rs. 11.5 lakhs per annum.

Besides, several top companies like Citibank, Deutsche Bank, and many more always have a high demand for a certified CEH professional.  

Instructors

Mr Dean Pompilio
Trainer
Freelancer

Mr Bipin Kulkarni
Instructor
Freelancer

FAQs

What is the CEH v12 - Certified Ethical Hacker Training?

The CEH v12 - Certified Ethical Hacker Training is an EC-Council accredited course that will help you become a white hacker.

How can I become a certified CEH professional?

You can become a certified CEH professional by clearing the ethical hacking certification exam after completing the course, and practising techniques on the EC-Council designed labs.

What are the prerequisites for CEH v12 - Certified Ethical Hacker Training online?

There are no prerequisites for admission in the CEH v12 - Certified Ethical Hacker Training online. Anyone with interest in ethical hacking can apply.

What is the pattern for the CEH v12 exam?

The CEH exam will be a 4-hour exam with 125 MCQ questions.

How many attempts can I take to pass the CEH v12 exam?

You can appear for the CEH exams a maximum of five times in a 12-month period.

How long is the CEH certification valid for?

The CEH certification will be valid for three years. You will have to earn 120 ECE credits to retain the certification.

Is the CEH exam fee included in this course?

Yes, the CEH exam fee is included in the course fee.

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books