This course is designed for IT professionals aiming to become certified ethical hackers. It's ideal for security officers, auditors, security professionals, site administrators, and anyone concerned about the integrity of their network infrastructure. The course prepares participants for the EC-Council Certified Ethical Hacker exam.
Solid understanding of networking principles and practices.
Familiarity with various operating systems (Windows, Linux, macOS).
Basic knowledge of scripting languages (e.g., Python, Bash) is beneficial.
Prior experience in IT security is advantageous but not mandatory.
Participants will be equipped to:
Understand ethical hacking principles and the legal framework.
Conduct penetration tests to identify vulnerabilities in networks and systems.
Use various tools and techniques for network scanning, enumeration, and exploitation.
Implement countermeasures to secure systems against cyber attacks.
Prepare for the EC-Council CEH certification exam.
Session 1: Introduction to Ethical Hacking
Session 2: Footprinting and Reconnaissance
Session 3: Scanning Networks
Network Scanning Techniques
Vulnerability Scanning Tools
Interpreting Scan Results
Session 4: Enumeration
Session 5: Vulnerability Analysis
Identifying Vulnerabilities
Using Vulnerability Assessment Tools
Prioritizing Vulnerabilities for Remediation
Session 6: System Hacking
Session 7: Malware Threats
Session 8: Sniffing
Session 9: Social Engineering
Session 10: Denial-of-Service
Session 11: Session Hijacking
Techniques for Session Hijacking
Tools and Countermeasures
Protecting Against Session Hijacking
Session 12: Evading IDS, Firewalls, and Honeypots
Session 13: Hacking Web Servers
Session 14: Hacking Web Applications
Web Application Vulnerabilities
Web Application Hacking Tools
Web Application Security Measures
Session 15: SQL Injection
Session 16: Hacking Wireless Networks
Wireless Network Security Principles
Wireless Hacking Techniques and Tools
Securing Wireless Networks
Session 17: Hacking Mobile Platforms
Mobile Platform Vulnerabilities
Mobile Hacking Techniques
Mobile Security Guidelines
Session 18: IoT and OT Hacking
IoT and OT Security Challenges
Hacking Techniques for IoT and OT
Securing IoT and OT Environments
Session 19: Cloud Computing
Cloud Computing Security Challenges
Hacking Cloud Environments
Cloud Security Best Practices
Session 20: CEH Exam Preparation