0% found this document useful (0 votes)
623 views11 pages

Ethical Hacking Course CEH v12

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
623 views11 pages

Ethical Hacking Course CEH v12

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Ethical Hacking Course -

CEH v12 Certification


Master Ethical Hacking skills and take your career to the

next level!

2 Million 1:1 Personlized 55% Average

Learners Mentorship Salary Hike

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


Ethical Hacking Course -
CEH v12 Certification
Intellipaat’s online Ethical hacking course will teach you vital skills like session hijacking,
footprinting, cryptography, network security, building firewalls, and more. Enroll now to take
advantage of this well-curated online ethical hacking training course and become a Certified
Ethical Hacker (CEH).

Hottest Job of 21st Century

1.9 Million Job Postings Skill Development


There is a global estimate of 1.9 million Ethical Hacking professionals are
job postings for Ethical Hacking roles equipped with various relevant skills
by 2022 fetching lucrative job offers

Growing Ethical Hacking Industry Future-oriented Career


Ethical Hacking is a budding field; a head
38% CAGR in the global Ethical Hacking start will prove to be beneficial
industry

Popular Degree High Demand


46% of Ethical Hacking professionals
By 2022, India and US will face a demand-
supply gap of 450,000 Ethical Hacking
have a Master’s degree
professionals

Our Credentials

2 Million+ 1,000+ 400+


Aspiring Active Students Industry-expert Instructors Hiring Partners

500+ 55% 155+


Corporates Upskilled Average Salary Hike Countries’ Learners

Page - 1

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


About Program
This EC-Council-accredited Certified Ethical Hacking certification is designed to help you
master the essential skills and techniques of ethical hacking, including penetration
testing, sniffing, vulnerability analysis, enumeration, network packet analysis, SQL injection,
etc. It is aligned with the CEH v12 exam.

Key Highlights
40 Hrs Instructor-Led Training 24 Hrs Self-paced Videos

3 Guaranteed Interviews by Intellipaat Includes CEH v12 Exam Voucher from EC-Council

No-cost EMI Option lifetime lab access -Kali linux

1:1 with Industry Mentors Flexible Schedule

Program Pedagogy
Att
In str
end Live
uctor Class
-led Trai
ens i ng Ha ovatho
Innck ativensLMS
From
G worldsby
et trained top Faculty
top and
experts
industry For
G eteffective
a sense of how Learnin
online real projects
g
are built
Industry experts experience

Lear
1:1 Penrso ali
bynDoized
ng Learning Peer Networking and Group Learning
Hands-on
Hands on exercises,
exercises,project
projectwork,
work, Improve
For effective
youronline
professional
Learning

network and learn from


quizz
z, es,
capstone
and capstone
projectsprojects experience
peers

ProPjeec
1:1 tsnaali
rso ndzed rcar
ExeLe isensing Gamified Learning
Hands
G et real-world
on exercises,
experience
projectthrough
work, Learn trough in
Get involved Hackathons and
to
group activities
quiz, capstone projects
projects Groupreal-world
solve Learning problems

24*7 Support
Hands on exercises, project work,
quiz, capstone projects

Page - 2

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


Program Curriculum
Preparatory Sessions – Python Module 4
Python Basics of Enumeration
Introduction to Python and IDEs
Concepts of Enumeration

Python Basics
NetBIOS Enumeration

Object Oriented Programming


SNMP Enumeration

Hands-on Sessions and Assignments for Practice LDAP Enumeration

NTP Enumeration

Module 1 SMTP and DNS Enumeration

Ethical Hacking: An Introduction Other Enumeration Techniques

Overview of Information Security


Enumeration Countermeasures

Attack Vectors and Threats to Information Security


Enumeration Pen Testing
Basic Concepts of Hacking
Module 5
Basic Concepts of Ethical Hacking

Information Security Controls


Vulnerability Analysis
Concepts of Penetration testing
Concepts of Vulnerability Assessment

Laws and Standards of information Security Solutions for Vulnerability Assessment

Vulnerability Scoring Systems

Module 2 Vulnerability Assessment Tools

Basics of Reconnaissance and Footprinting Vulnerability Assessment Reports


Concepts of Footprinting
Module 6
Footprinting Using Search Engines

Footprinting Using Web Services


Basics of System Hacking
Footprinting Using Social Networking Sites
Concepts of System Hacking

Footprinting of Websites
Cracking Passwords

Footprinting of Emails
Escalating Privileges

Competitive Intelligence
Executing Applications

Footprinting using Whois


Hiding Files

DNS Footprinting
Covering Tracks

Network Footprinting
Penetration Testing
Footprinting by Social Engineering
Module 7
Tools used for Footprinting

Countermeasures
Threats from Malware
Footprinting Pen Testing Concepts of Malwares

Concepts of Trojans

Module 3 Concepts of Viruses and Worms

Network Scanning Malware Analysis

Concepts Network Scanning


Countermeasures

Tools used for Scanning


Anti-Malware Software

Techniques used for Scanning


Malware Penetration Testing
Scanning Beyond IDS and Firewall

Banner Grabbing

Network Diagrams

Scanning Pen Testing


Page - 3
IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com
Program Curriculum
Module 8 Module 12
Basics of Sniffing How to Evade IDS, Firewalls, and Honeypots
Concepts of Sniffing
Concepts of IDSs, Firewalls, and Honeypots

Sniffing Technique: MAC Attacks


IDS, Firewall, and Honeypot Solutions

Sniffing Technique: DHCP Attacks


IDS Evasion

Sniffing Technique: ARP Poisoning


Firewall Evasion

Sniffing Technique: Spoofing Attacks


Tools for IDS/Firewall Evasion

Sniffing Technique: DNS Poisoning


Detecting Honeypots

Tools for Sniffing


IDS/Firewall Evasion Countermeasures

Countermeasures
Penetration Testing
Sniffing Detection Techniques

Sniffing Pen Testing Module 13


Basics of Hacking e Servers W b
Module 9 e Server Concepts

Social Engineering
W b

Attacks of e Servers

W b

Concepts of Social Engineering


Methodology of e Server Attacks

W b

Techniques of Social Engineering


Tools of e Server Attacks

W b

Insider Threats
Countermeasures

Impersonation on Social Networking Sites


Patch Management

Identity Theft
Tools of e Server Security

W b

Countermeasures
e Server Pen Testing
W b

Social Engineering Pen-Testing


Module 1 4

Module 10 e Application Hacking


W b

Denial-of-Service Attack e App Concepts

W b

DoS/DDoS Concepts
Threats to e Ap
W b p

Techniques used for DoS/DDoS Attacks


Hacking Methodology

Botnets
e App Hacking Tools

W b

DDoS Case Study


Countermeasures

Tools used for DoS/DDoS Attack


e App Security Testing Tools

W b

Countermeasures
e App Pen Testing
W b

Tools used for DoS/DDoS Protection


Module 1 5
DoS/DDoS Penetration Testing
Basics of S In ection
QL j

Module 11 S In ection Concepts

QL j

Session Hi acking j Types of S In ection

QL j

Concepts of Session Hi acking


S In ection Methodology

QL j

S In ection Tools

Application evel Session Hi acking


QL j

Evasion Techniques

L j

Network evel Session Hi acking

Countermeasures
L j

Session Hi acking Tools

Countermeasures

Penetration Testing

Page - 4

IND: +91 702237 1 46 4 S: 1-800-21 -8930


U 6 sales intellipaat com
@ . www intellipaat com
. .
Program Curriculum
Module 16 Module 20
Wireless Network Hacking Basics of Cryptography
Wireless Concepts
Cryptography Concepts

Wireless Encryption
Encryption Algorithms

Wireless Threats
Cryptography Tools

Wireless Hacking Methodology


Public Key Infrastructure (PKI)

Tools for Wireless Hacking


Email Encryption

Bluetooth Hacking
Disk Encryption

Countermeasures
Cryptanalysis

Tools Wireless Security


Countermeasures

Wireless Pen Testing


Module 17 Skills to Master
Hacking Mobile Platforms Footprinting and Scanning Networks

Mobile Platform Attack Vectors


Reconnaissance
DNS Cache Snooping

Hacking Android OS
Vulnerability Analysis
System Hacking

Hacking iOS

Mobile Spyware
Malware Threats
Sniffing

Mobile Device Management


Social Engineering
Denial-of-service

Mobile Security Guidelines and Tools


Session Hijacking
Evading IDS

Mobile Pen Testing Firewalls and Honeypots


Hacking Web Servers

Hacking Wireless Hacking Mobile Platforms

Module 18 Networks
IoT Hacking
Basics of IoT Hacking
Cryptography
IoT Concepts

Attacks on IoT

Methodology used for IoT Hacking

Tools used for IoT Hacking

Countermeasures
Tools to Master
IoT Pen Testing

Module 19
Basics of Cloud Computing
Cloud Computing Concepts

Cloud Computing Threats

Cloud Computing Attacks

Cloud Security

Page - 5
IND: +91 7022374614 S 1 800-216-8930
U : - sales@intellipaat.com www.intellipaat.com
Course Projects
Projects cover the following industries:

Retail Social Media Supply Chain Entrepreneurship E-commerce Banking Healthcare Insurance

Threat Detection Cracking Wifi


You will be offered with several cases where you will You will gain extensive knowledge in cracking wifi in
gain hands-on experience in being a part of the this project. You will crack wifi with various relevant
ethical hacking team. You will be involved in tools, technologies and techniques. You will learn to
detecting threats/ data breaches and predicting/ crack various wifi routers. The WPA/WPA2 are usually
protecting from cybercrimes. used.

Improvement of Auditing in the Restaurant Data Security of a BPO Firm


The project equips you in learning to make You will understand the BPO firm data security. You
necessary improvements in the auditing security will work with machine-generated data to look for
system of any given restaurant. You will primarily use suspicious activities, anomalies, suspected threats
various methods such as KPI implementation and and more. You will also deploy Splunk SIEM tool to
system resiliency in addition to others. handle huge database.

Page - 6

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


Meet the Batch

Industries Our Learners Come From

12% - BFSI

20% - BFSI
50% Information Technology
45%
5% - Healthcare

5% - Healthcare
10% - Consulting

10% - Consulting
6% - Others

20% - Others
17% - BPO/ KPO

Work Experience

12%

12+ years Some of their current employers include


12%
12%

12% 9-12 years

18%

6-9 years
18%

22%

3-6 years

22%

36%

0-3 years

36%

Page - 7

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


Glimpse of our
Successful Transitions

4.6 4.5 4.38

Career Transitions
To

Kunduru Nagaraju From

Network Security
Network Security Engineer SOC Analyst
Engineer

Poojitha Pastham From
 To



Sr. Software Engineer Assistant Manager Sr. Software Engineer

Er. Sushil Kuvind From
 To



Software Engineer Developer Software Engineer

To

Yogesh Kumar From
 Senior Software
Senior Software Engineer Associate Consultant Engineer

Page - 8

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


Program Partners

About Intellipaat
Intellipaat is one of the leading online training providers with more than 1.2 million learners in over 155
countries. We are on a mission to democratize education as we believe that everyone has the right to
quality education.

We create courses in collaboration with top universities and MNCs for employability like IIT Madras, IU,
LSBU, University of Essex, University of Liverpool, IIT Roorkee, IIT Guwahati, SPJIMR, IBM, Microsoft, etc.

Our courses are delivered by SMEs & our pedagogy enables quick learning of difficult topics. 24/7
technical support & career services help learners to jump-start their careers.

About EC-Council
EC-Council is an American organization that offers education, training, and services on
Cyber Security and Ethical Hacking. A certification from EC-Council will validate your Cyber
Security and Ethical Hacking skills.

Page - 9

IND: +91 7022374614 US: 1-800-216-8930 sales@intellipaat.com www.intellipaat.com


1.2 Million Learners & 200+ corporates across 155+ countries

upskilling on Intellipaat platform

Contact Us
INDIA

AMR Tech Park 3, Ground Floor, Tower B, Hongasandra Village,
Bommanahalli, Hosur Road, Bangalore, Karnataka 560068, India

Phone No: +91-7022374614

UK

Flat 16 Bluepoint Court, 203 Station Road, Harrow,

Middlesex HA1 2TS, UK

USA

1219 E. Hillsdale Blvd. Suite 205, Foster City, CA 94404

Phone No: 1-800-216-8930

sales@intellipaat.com

www.intellipaat.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy