
Certified Ethical Hacking – v13 (CEH)
Duration: 5 Days
Course Outline:
Information Security Overview
Hacking Concepts
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws and Standards
Footprinting through Search Engines & Internet Services
Social Engineering and AI-based tools
Footprinting Countermeasures
Host, Port and OS Discovery
Bypassing IDS/Firewalls
Scanning Countermeasures
NetBIOS, SNMP, LDAP, SMTP, DNS Enumeration
Countermeasures
Assessment Concepts, Tools, Reports and Lifecycle
Gaining and Maintaining Access
Privilege Escalation
Clearing Logs
Trojan, Virus, Worms, Fileless and AI-Based Malware
Countermeasures and Anti-malware tools
Sniffing Techniques, Tools and Countermeasures
Human, Computer and Mobile-based Attacks
Countermeasures
DoS/DDoS Techniques, Botnets, Case Studies
Countermeasures
Application-Level and Network-Level Hijacking
Tools and Countermeasures
Evasion Techniques and Countermeasures
IDS/IPS, Firewall Tools, NAC Bypass
Attack Methodologies and Patch Management
Web App Threats, APIs, Webhooks, Security Measures
Injection Types, Methodologies, Evasion & Countermeasures
Encryption, Threats, Attacks, and Countermeasures
Android/iOS Hacking
Mobile Security Tools and MDM
IoT and OT Concepts, Attacks, Methodologies
Cloud Security, Container & Serverless Tech
AWS, Azure, GCP Hacking and Countermeasures
Encryption, Cryptanalysis and Defense Techniques