CEHv12 – Certified Ethical Hacker

CEHv12
https://www.mtc-training.co.uk/wp-content/uploads/2023/04/download-9.png

Overview

About the course

The EC-Council’s Certified Ethical Hacker (CEH v12) Training programme will enhance your knowledge of essential security fundamentals. Certified Ethical Hacker (CEH V12) certification course is one of the most sought-after security qualifications globally. This internationally recognised security course validates your ability to discover weaknesses in an organisation’s network infrastructure and aids in effectively combating cyber-attacks.

The C|EH v12 programme is a specialised, unique training programme to teach everything about ethical hacking with hands-on training, labs, assessment, a mock engagement, and a global hacking competition.

This certification is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

As the threat in the cyber world continuously increases, the industry needs cybersecurity professionals who can prevent threats and attacks in organisations worldwide. The Certified Ethical Hacker (C|EH v12) programme is one of the most respected certifications in the cybersecurity field.

The EC-Council has introduced new updated technologies in the C|EH v12 programme, including the MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, Techniques for Establishing Persistence, Evading NAC and Endpoint Security, Fog Computing, Edge Computing, and Grid Computing. These updated technologies will prepare you to think like a hacker, so you have the skills to protect your infrastructure.

This is the professional edition of the EC Council Certified Ethical Hacker and includes;

CEHv12 e-book (and next version)
x5 CEHv12 official videos 6 months access to CEHv12 labs CEHv12 exam voucher with 1 retake attempt (to be used within 6 months) CEH Engage

Audience Profile

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Prerequisites

Basic understanding of network essentials and core concepts, including server and network components.

Course Details

  • Course Ref: CEHv12
  • Course Duration: 5 days
  • Course Location: Sunderland
  • Course Dates: TBC
  • Course Price: £2495 (Excl VAT)

Modules

  • Module 1: Introduction to Ethical Hacking
    • Information security fundamentals
    • Cyber kill chain, MITRE ATT&CK
    • Ethical hacking basics
    • Security laws and regulations
  • Module 2: Footprinting and Reconnaissance
    • Footprinting techniques and tools
    • Web, email, whois, DNS footprinting
  • Module 3: Scanning Networks
    • Host/port/service discovery
    • Scanning beyond IDS/firewall
  • Module 4: Enumeration
    • NFS, DNS, SNMP enumeration
    • Countermeasures
  • Module 5: Vulnerability Analysis
    • Vulnerability research
    • Vulnerability assessment tools
  • Module 6: System Hacking
    • Password cracking
    • Privilege escalation
    • Covering tracks
  • Module 7: Malware Threats
    • Viruses, worms, trojans
    • Malware analysis
    • Malware countermeasures
  • Module 8: Sniffing
    • Packet sniffing techniques
    • Sniffing detection/protection
  • Module 9: Social Engineering
    • Social engineering concepts
    • Phishing, identity theft
  • Module 10: Denial-of-Service
    • DoS and DDoS attacks
    • Botnets
    • DoS/DDoS tools
  • Module 11: Session Hijacking
    • Session hijacking methods
    • Session hijacking tools
    • Countermeasures
  • Module 12: Evading IDS, Firewalls, Honeypots
    • Firewall/IDS evasion
    • Honeypot concepts
  • Module 13: Hacking Web Servers
    • Web server attacks
    • Website defacement
    • Patch management
  • Module 14: Hacking Web Apps
    • Web app vulnerabilities
    • Web app hacking methodology
  • Module 15: SQL Injections
    • SQL injection attacks
    • SQL injection detection
  • Module 16: Hacking Wireless
    • Wireless encryption
    • Wi-Fi/Bluetooth hacking
  • Module 17: Hacking Mobile
    • Android/iOS exploits
    • Mobile security
  • Module 18: IoT & OT Hacking
    • IoT/OT vulnerabilities
    • IoT/OT hacking methodology
  • Module 19: Cloud Computing
    • Cloud concepts
    • Cloud threats/attacks
    • Cloud security
  • Module 20: Cryptography
    • Encryption algorithms
    • Public key infrastructure
    • Cryptanalysis

Course Outline