Certified Ethical Hacker
(CEH v11)
Course Agenda
sales@infosectrain.com | www.infosectrain.com
Course Outline
Module 01: Introduction to Ethical Hacking: This module introduces
you to the basic concepts of hacking, what is hacking, who are hackers,
their intent, and other related terminologies.
The next modules dive deeper into the various phases of hacking,
which would help you in thinking with the mindset of a hacker.
Module 02: Footprinting and Reconnaissance: Gathering information
from various sources using footprinting tools and how to defend
against the same.
Module 03: Scanning Networks: Different techniques to identify and
scan the network, host, and port discovery by utilizing various scanning
tools.
Module 04: Enumeration: Finding detailed information about the hosts
and ports discovered during scanning. This module now includes
sub-domains like NFS enumeration and related tools, DNS cache snoop-
ing, and DNSSEC Zone walking, along with the countermeasures.
Module 05: Vulnerability Analysis: It introduces the concepts of vul-
nerability assessment, its types, along with a hands-on experience of
tools that are currently used in the industry.
Module 06: System Hacking: It focuses on the "how" part. How to
gain access of the system, how to escalate privileges, how to maintain
access, and how to clear your tracks.
The next modules help to develop a deeper understanding of various
defense and attack methodologies and concepts that aid the process of
hacking.
sales@infosectrain.com | www.infosectrain.com
Module 07: Malware Threats: Malware threat terminologies, viruses,
worms, trojans, their analysis, and countermeasures to prevent data
loss. The introduction and analysis of malware like, Emotet and fileless
that are gaining popularity have been updated under this section. APT
concepts have also been added.
Module 08: Sniffing: Packet sniffing techniques, associated tools, and
related defensive techniques.
Module 09: Social Engineering: Since humans are the most significant
vulnerability for any organization, it becomes essential to understand
how attackers use them for their purpose for carrying out attacks like
identity theft, impersonation, insider threat, and how to defend against
such social engineering attacks.
Module 10: Denial-of-Service: As DoS and DDoS are some of the
most common purposes of attackers, this module talks about these
attacks, use cases, and the related attack and defense tools.
Module 11: Session Hijacking: To provide a deeper understanding of
the technique, its purpose, tools used along with the countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots: Understand the
terminologies and working of these inline defenses and techniques to
learn how to evade these while performing an attack.
Module 13: Hacking Web Servers: Web servers based attacks, meth-
odologies, tools used, and defense
Module 14: Hacking Web Applications: Web application-based
attacks, techniques, and mitigation.
sales@infosectrain.com | www.infosectrain.com
Module 16: Hacking Wireless Networks: Wireless encryption, wire-
less hacking, and Bluetooth hacking-related concepts
Module 17: Hacking Mobile Platforms: Management of mobile devic-
es, mobile platform attack vectors, and vulnerabilities related to An-
droid and iOS systems
Module 18: IoT Hacking: Recognizing the vulnerabilities in IoT and
ensuring the safety of IoT devices. Operational Technology (OT) essen-
tials, introduction to ICS, SCADA, and PLC, threats, attack methodolo-
gies, and attack prevention. The concept of OT is a new addition.
Module 19: Cloud Computing: Cloud computing, threats, and security.
Additionally, the essentials of container technology and serverless com-
puting have been added.
Module 20: Cryptography: Encryption algorithms, Public Key Infra-
structure (PKI), cryptographic attacks, and cryptanalysis.
sales@infosectrain.com | www.infosectrain.com
New York, United States
99 Wall Street #599 New York, NY 10005, United States
Phone No: +1 657-207-1466
UAE
Gasco Tower, Near Corniche, P.O. Box 665, Abu Dhabi, UAE
Phone No: +971-569908131
Canada
170 The Donway West, Suite # 6A, Toronto, Ontario M3C2E8, Canada
Phone No: +1-657-207-1466
Delhi
4B, 4th Floor, Plot No. A-8, Bigjos Tower, Netaji Subhash Place,
Pitampura, Delhi - 110034, India
Phone No: +91-97736-67874
Bangalore
Manyata Embassy Business Park, Ground Floor, E1 Block, Beech Building,
Outer Ring Road, Bangalore - 560045
Kerala
Trivandrum, 1st Floor, RRD Building, Sasthamangalam Junction,
Sasthamangalam, Thiruvananthapuram, Kerala 695010
sales@infosectrain.com | www.infosectrain.com