0% found this document useful (0 votes)
372 views5 pages

Ceh v11 Course Content

The document outlines the agenda for the Certified Ethical Hacker (CEH v11) course. The 20 modules cover various phases of hacking including footprinting, scanning, enumeration, vulnerability analysis, and system hacking. Additional modules address malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, evading security systems, hacking web servers, applications, wireless networks and mobile platforms. The final modules cover IoT hacking, cloud computing, and cryptography. The course provides hands-on experience with industry tools to teach both attacking techniques and defensive countermeasures.

Uploaded by

Mehmet Kılınç
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
372 views5 pages

Ceh v11 Course Content

The document outlines the agenda for the Certified Ethical Hacker (CEH v11) course. The 20 modules cover various phases of hacking including footprinting, scanning, enumeration, vulnerability analysis, and system hacking. Additional modules address malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, evading security systems, hacking web servers, applications, wireless networks and mobile platforms. The final modules cover IoT hacking, cloud computing, and cryptography. The course provides hands-on experience with industry tools to teach both attacking techniques and defensive countermeasures.

Uploaded by

Mehmet Kılınç
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Certified Ethical Hacker

(CEH v11)
Course Agenda

sales@infosectrain.com | www.infosectrain.com
Course Outline
Module 01: Introduction to Ethical Hacking: This module introduces
you to the basic concepts of hacking, what is hacking, who are hackers,
their intent, and other related terminologies.

The next modules dive deeper into the various phases of hacking,
which would help you in thinking with the mindset of a hacker.

Module 02: Footprinting and Reconnaissance: Gathering information


from various sources using footprinting tools and how to defend
against the same.

Module 03: Scanning Networks: Different techniques to identify and


scan the network, host, and port discovery by utilizing various scanning
tools.

Module 04: Enumeration: Finding detailed information about the hosts


and ports discovered during scanning. This module now includes
sub-domains like NFS enumeration and related tools, DNS cache snoop-
ing, and DNSSEC Zone walking, along with the countermeasures.

Module 05: Vulnerability Analysis: It introduces the concepts of vul-


nerability assessment, its types, along with a hands-on experience of
tools that are currently used in the industry.

Module 06: System Hacking: It focuses on the "how" part. How to


gain access of the system, how to escalate privileges, how to maintain
access, and how to clear your tracks.

The next modules help to develop a deeper understanding of various


defense and attack methodologies and concepts that aid the process of
hacking.

sales@infosectrain.com | www.infosectrain.com
Module 07: Malware Threats: Malware threat terminologies, viruses,
worms, trojans, their analysis, and countermeasures to prevent data
loss. The introduction and analysis of malware like, Emotet and fileless
that are gaining popularity have been updated under this section. APT
concepts have also been added.

Module 08: Sniffing: Packet sniffing techniques, associated tools, and


related defensive techniques.

Module 09: Social Engineering: Since humans are the most significant
vulnerability for any organization, it becomes essential to understand
how attackers use them for their purpose for carrying out attacks like
identity theft, impersonation, insider threat, and how to defend against
such social engineering attacks.

Module 10: Denial-of-Service: As DoS and DDoS are some of the


most common purposes of attackers, this module talks about these
attacks, use cases, and the related attack and defense tools.

Module 11: Session Hijacking: To provide a deeper understanding of


the technique, its purpose, tools used along with the countermeasures.

Module 12: Evading IDS, Firewalls, and Honeypots: Understand the


terminologies and working of these inline defenses and techniques to
learn how to evade these while performing an attack.

Module 13: Hacking Web Servers: Web servers based attacks, meth-
odologies, tools used, and defense

Module 14: Hacking Web Applications: Web application-based


attacks, techniques, and mitigation.

sales@infosectrain.com | www.infosectrain.com
Module 16: Hacking Wireless Networks: Wireless encryption, wire-
less hacking, and Bluetooth hacking-related concepts

Module 17: Hacking Mobile Platforms: Management of mobile devic-


es, mobile platform attack vectors, and vulnerabilities related to An-
droid and iOS systems

Module 18: IoT Hacking: Recognizing the vulnerabilities in IoT and


ensuring the safety of IoT devices. Operational Technology (OT) essen-
tials, introduction to ICS, SCADA, and PLC, threats, attack methodolo-
gies, and attack prevention. The concept of OT is a new addition.

Module 19: Cloud Computing: Cloud computing, threats, and security.


Additionally, the essentials of container technology and serverless com-
puting have been added.

Module 20: Cryptography: Encryption algorithms, Public Key Infra-


structure (PKI), cryptographic attacks, and cryptanalysis.

sales@infosectrain.com | www.infosectrain.com
New York, United States
99 Wall Street #599 New York, NY 10005, United States
Phone No: +1 657-207-1466

UAE
Gasco Tower, Near Corniche, P.O. Box 665, Abu Dhabi, UAE
Phone No: +971-569908131

Canada
170 The Donway West, Suite # 6A, Toronto, Ontario M3C2E8, Canada
Phone No: +1-657-207-1466

Delhi
4B, 4th Floor, Plot No. A-8, Bigjos Tower, Netaji Subhash Place,
Pitampura, Delhi - 110034, India
Phone No: +91-97736-67874

Bangalore
Manyata Embassy Business Park, Ground Floor, E1 Block, Beech Building,
Outer Ring Road, Bangalore - 560045

Kerala
Trivandrum, 1st Floor, RRD Building, Sasthamangalam Junction,
Sasthamangalam, Thiruvananthapuram, Kerala 695010

sales@infosectrain.com | www.infosectrain.com

You might also like