Course Outline

Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Viruses and Worms
Module 8: Sniffers
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS, Firewalls and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing

Requirements

There are no specific prerequisites for the C|EH program, however we strongly recommend candidates possess a minimum of 2 years’ experience in IT security before joining a C|EH training program. C|EH training is about testing systems and using them for purposes not originally intended, candidates should understand the basic functions of those IT systems before attempting to hack them.

 35 Hours

Testimonials (1)

Related Courses

Certified Penetration Testing Professional - CPENT

35 Hours

EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)

21 Hours

Incident Response

21 Hours

Threat Hunting

21 Hours

CISM - Certified Information Security Manager

28 Hours

Web Security Testing - Security and Testing of Web Applications using OWASP

21 Hours

CAS for Administrators

7 Hours

Shadowsocks: Set Up a Proxy Server

7 Hours

Network Security Administrator

35 Hours

IoT Security Architecture

14 Hours

Understanding Modern Information Communication Technology

7 Hours

BeyondCorp: Implementing Zero Trust Security

14 Hours

Business Continuity Practitioner

14 Hours

Cyber Crisis & Communications Planning

7 Hours

Automotive Cyber Security Fundamentals

21 Hours

Related Categories