TUV Rheiland Cerificated
+ 91 902 049 0011

Certified Ethical Hacking Training (CEH)

Certified Ethical Hacking Training

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

CEH Courses

Certified ethical Hacker

Enroll Now

Certified ethical Hacker with CCNA Security

Enroll Now

The purpose of the CEH credential is to

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession

Eligibility : Any Degree, Diploma / BE / B-tech / ME / M-tech / Graduates - Mechanical, Electrical, Electronics, Instrumentation, Autombile, Mechanical Production, Chemical Engineering (Ongoing and Result waiting Candidates also Apply)


Course Contents for CEH (Certified ethical Hacker )

ethical Hacking (CEH) Training cochin
Ethical Hacking

Introduction to Ethical Hacking

  • Understanding hacker objectives
  • Outlining the differences between ethical hackers and malicious hackers
  • Examining how the ethical hacking process has come about
ethical Hacking (CEH) Training cochin
Footprinting and Reconnaissance

Footprinting and Reconnaissance

  • Information Gathering
  • Port Scanning
  • World Wide Web spidering
  • IP Lookup / Reverse IP
ethical Hacking (CEH) Training cochin
Scanning Networks

Scanning Networks

  • Identifying active hosts on a network
  • Usage of Nmap
  • Understanding various scanning techniques
ethical Hacking (CEH) Training cochin
Enumeration

Enumeration

  • Understanding Enumeration concepts
  • Understanding different techniques for NetBIOS Enumeration
  • Enumeration countermeasures
  • Tools for enumeration
ethical Hacking (CEH) Training cochin
System Hacking

System Hacking

  • Overview of CEH Hacking methodology
  • Understanding Rootkit
  • Overview of steganography
  • Different tools for system hacking
ethical Hacking (CEH) Training cochin
Malware Threats

Malware Threats

  • Understanding about Malware and types
  • Understanding different technique to detect malware
  • Malware countermeasures
ethical Hacking (CEH) Training cochin
Sniffing

Sniffing

  • Overview of sniffing concepts
  • Understanding MAC attacks
  • Understanding ARP Poisoning
  • Sniffing tools
  • Countermeasure for sniffing
ethical Hacking (CEH) Training cochin
Social Engineering

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Social Engineering Countermeasure
  • Tools for social engineering
ethical Hacking (CEH) Training cochin
Denial of Service

Denial of Service

  • Overview of DoS and DDoS Attack
  • Countermeasures for DDoS / DoS
  • Botnet concepts
ethical Hacking (CEH) Training cochin
Session Hijacking

Session Hijacking

  • Overview of Session Hijacking
  • Session hijacking tools
  • Countermeasure for session hijacking
  • Disadvantages of session hijacking
ethical Hacking (CEH) Training cochin
Hacking web servers

Hacking web servers

  • What is a web server
  • Understanding web server concepts
  • Different shells for web hacking
  • Countermeasure for web servers
ethical Hacking (CEH) Training cochin
Hacking web applications

Hacking web applications

  • What is a web application
  • Concepts of web application
  • Burpsuite tool
ethical Hacking (CEH) Training cochin
SQL injection

SQL injection

  • What is SQL Injection
  • Various types of SQL injection methods
  • SQL Map
  • SQL ninja
  • Database retrieval or Dumping
ethical Hacking (CEH) Training cochin
Hacking wireless networks

Hacking wireless networks

  • Understanding wireless concepts
  • Understanding wireless threats
  • Different types of Wireless attacks
  • Countermeasure for wireless security
ethical Hacking (CEH) Training cochin
Hacking mobile platforms

Hacking mobile platforms

  • Android RAT
  • Mobile spam
  • Countermeasure for mobile security
ethical Hacking (CEH) Training cochin
Evading IDS, Firewalls and Honeypot

Evading IDS, Firewalls and Honeypot

  • Understanding IDS, Firewalls, and Honeypot
  • IDS/Firewall Tools
ethical Hacking (CEH) Training cochin
Cloud computing

Cloud computing

  • Concepts of cloud computing
  • Cloud computing security tools
ethical Hacking (CEH) Training cochin
Cryptography

Cryptography

  • MD5 Cracking
  • Concepts of Cryptography
Back to Top