Course Duration in Hours
90
90
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing
Cryptography
Perform footprinting and
reconnaissance using the latest
footprinting techniques and tools as
a critical pre-attack phase required in
ethical hacking.
Network scanning techniques and
scanning countermeasures.
• Enumeration techniques and
enumeration countermeasures.
• Vulnerability analysis to identify security
loopholes in the target organization’s
network, communication infrastructure,
and end systems.
• System hacking methodology,
steganography, steganalysis attacks,
and covering tracks to discover system
and network vulnerabilities
Different types of malware (Trojan,
Virus, worms, etc.), system auditing for
malware attacks, malware analysis, and
countermeasures.
• Packet sniffing techniques to
discover network vulnerabilities and
countermeasures to defend sniffing.
• Social engineering techniques and how
to identify theft attacks to audit humanlevel vulnerabilities and suggest social
engineering countermeasures.
• DoS/DDoS attack techniques and
tools to audit a target and DoS/DDoS
countermeasures.
• Session hijacking techniques to discover
network-level session management,
authentication/authorization,
cryptographic weaknesses, and
countermeasures.
Attend Official Network Security Training by EC-Council:
If a candidate has completed an official EC-Council training either at an Accredited Training
Center, via the iClass platform, or at an approved academic institution, the candidate is eligible
to challenge the relevant EC-Council exam without going through the application process.
Attempt the Exam without Official EC-Council Training:
In order to be considered for the EC-Council CEH exam without attending official network
security training, the candidate must have at least 2 years of work experience in the Information
Security domain. If the candidate has the required work experience, they can submit an eligibility
application form along with USD 100.00, a non-refundable fee
Hacktech Media, Belapur (Mumbai),Mumbai,IN