Cyber Security

EC-Council Certified Ethical Hacker program

CEH

69 Chapters
Cyber Security
EC-Council Certified Ethical Hacker program

Course Curriculum

Documents Submissions

CEH Lab Setup

01LAB Setup

Academic Introduction to CEH

Module 1 : Introduction to Ethical Hacking

01Introduction to Ethical Hacking

Industry task - 1: Creating a risk register

Brush-up basic concepts

Review section

Module-2 : Footprinting and Reconnaissance

01 Footprinting and Reconnaissance
02footprinting and reconnaissance 2

Module 3 : Scanning Networks

01Scanning Networks
02 Network scanning brush up basic
03Network scanning Scan types
04Scanning networks defense evasion

Networking Refresher

01Gamified lesson : Assigning IP in a network
02DNS- Explained
03DNS- Reliability
04DNS- TTL, Recursive and Non-recursive queries
05Gamified lesson : NetBIOS Introduction
06Gamified lesson : Netbios enumeration and attacks
07Gamified lesson: SNMP Introduction
08Gamified lesson: LDAP Introduction
09Gamified lesson: NTP Introduction
10Gamified lesson: NFS Introduction
11Gamified lesson: SMB Introduction

Module 4 : Enumeration

01Enumeration of common protocols- live session
02Enumeration: Topics continued

Module 4 LAB

01NetBIOS Enumeration
02Perform SNMP Enumeration
03Perform LDAP Enumeration
04Perform NFS Enumeration
05Perform DNS Enumeration
06Perform SMTP Enumeration
07Perform Enumeration using Various Enumeration Tools

Module 5: Vulnerability Analysis

01Vulnerability Analysis Live session

Module 5 Lab

01LAB 01
02LAB 2

Module 6: System Hacking

01System Hacking
02Buffer Overflow

Module 7: Malware Threats

01Malware threats- Types of Malwares
02Advanced Persistent Threats(APTs)
03Malware Types- Explained
04File-less Malware
05AI Based Malware
06Malware Analysis- Introduction
07Static Malware Analysis
08Dynamic Malware Analysis
09Malware- Countermeasures

Module 07 LABS

01LAB 01
02LAB 02
03LAB 03
04LAB 04

Module 8: Sniffing

01Sniffing Introduction, Hubs and Switches
02CAM Table related attacks
03Gamified Lesson: MAC Flooding
04DHCP Attacks
05ARP, IRDP, MAC attacks
06VLAN, Default VLAN, VLAN Tags
07Native VLAN and Trunk ports
08Switch spoofing, Double tagging

Module 08 LABS

01LAB 01
02LAB 02
03LAB 03

Module 9: Social Engineering

01Tech based Social engineering
02Mobile-based SE and countermeasures

Module 9 LABS: Social Engineering

01Module 9 LABS

Module 10: Denial-of-Service

01Denial-of-Service
02D Dos
03DoS and DDoS attacks

Module 10 LABS

01LAB 1
02LAB 2

Module 11 : Session Hijacking

01Session Hijacking

Module 12 : Evading IDS, Firewalls, and Honeypots

Module 13 : Hacking Web Servers

01 Hacking Web Servers

Module 14 : Hacking Web Applications

Module 15 : SQL Injection

Module 16 : Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

01Hacking Mobile Platforms

Module 18 : loT Hacking

01loT and OT Hacking

Module 19 : Cloud Computing

Module 20 : Cryptography

Ready to get started?

Enroll now and start learning with hands-on, expert-led training.

Enroll Now — ₹82,837