A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies
A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies
What will You Learn?
Key issues plaguing the information security world are the incident management process and penetration testing.
Various types of foot printing, foot printing tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
System hacking methodology, steganography, stegananalysis attacks, and covering tracks.
Different types of Trojans, Trojan analysis, and Trojan countermeasures.
The working of viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.
Packet sniffing techniques and how to defend against sniffing.
Social engineering techniques, identifying theft, and social engineering countermeasures.
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
Session hijacking techniques and countermeasures.
There are different types of webserver attacks, attack methodologies, and countermeasures.
There are different types of web application attacks, web application hacking methodologies, and countermeasures.
SQL injection attacks and injection detection tools.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vectors, Android vulnerabilities, mobile security guidelines, and tools.
Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.
Various cloud computing concepts, threats, attacks, and security techniques and tools.
There are different types of cryptography ciphers, public key infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Various types of penetration testing, security audits, vulnerability assessments, and penetration testing roadmaps.
Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.
Different threats to IoT platforms and learn how to defend IoT devices securely.
CEH Course Outline
Introduction to Ethical Cyber Piracy
Foot printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Cyber Piracy
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS
Firewalls and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Cryptography
Kensley College is a premier learning institute widely recognized for our outstanding academic reputation. With a beautiful campus and vibrant community holding in, we have excelled in various course compositions.
We are happy to have experienced, engaged and successful professionals who hold the soul of impact for the students. Our striving intellectual community will help you kick start your career foundations!
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy