Certified Ethical Hacker
CEH V12
Course Overview
A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
The purpose of the CEH credential is to establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, to inform the public that credentialed individuals meet or exceed the minimum standards and reinforce ethical hacking as a unique and self-regulating profession.Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.
This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity.
EHE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.
A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
The purpose of the CEH credential is to establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, to inform the public that credentialed individuals meet or exceed the minimum standards and reinforce ethical hacking as a unique and self-regulating profession. Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pen testing fundamentals, and more.
This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity.
CEH V12-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.
What You Will Learn
- Fundamentals of information security and ethical hacking
- Information security threats and vulnerabilities, types of malwares, and vulnerability assessments
- Password cracking techniques, tools, and countermeasures
- Social engineering concepts, its phases, techniques, and countermeasures.
- Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures
- Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures
- Wireless encryption, attacks, and countermeasures
- Mobile, IoT, and OT attacks, and countermeasures
- Cloud computing threats and countermeasures
- Penetration testing fundamentals, its benefits, strategies, and phases
Who Should Take This Course?
- Ethical Hackers
- System Administrators
- Network Administrators and Engineers
- Auditors & Security Professionals
- Network Security Professionals
- Site Administrators
- Security Officers
- Anyone else entrusted with the responsibility of safeguarding the integrity of the network infrastructure
Prerequisites
A PC/Laptop with an Internet Connection.
Course Outline
- Module 1 – Information Security Fundamentals
- Module 2 – Ethical Hacking Fundamentals
- Module 3 – Information Security Threats and Vulnerability Assessment
- Module 4 – Password Cracking Techniques and Countermeasures
- Module 5 – Social Engineering Techniques and Countermeasures
- Module 6 – Network Level Attacks and Countermeasures
- Module 7 – Web Application Attacks and Countermeasures
- Module 8 – Wireless Attacks and Countermeasures
- Module 9 – Mobile Attacks and Countermeasures
- Module 10 – IOT & OT Attacks and Countermeasures
- Module 11 – Cloud Computing Threats and Countermeasures
- Module 12 – Penetration Testing Fundamentals
How do I get started with CEH V12 training?
Interested in expanding your knowledge and advancing your skills on CEH V12, Training Heights experts are here to ease the certification process and help you obtain certification in CEH V12 Credentials.