Cyber Security
EC-Council Certified Ethical Hacker program
CEH
69 Chapters
Cyber Security

Course Curriculum
Documents Submissions
CEH Lab Setup
01LAB Setup
Academic Introduction to CEH
Module 1 : Introduction to Ethical Hacking
01Introduction to Ethical Hacking
Industry task - 1: Creating a risk register
Brush-up basic concepts
Review section
Module-2 : Footprinting and Reconnaissance
01 Footprinting and Reconnaissance
02footprinting and reconnaissance 2
Module 3 : Scanning Networks
01Scanning Networks
02 Network scanning brush up basic
03Network scanning Scan types
04Scanning networks defense evasion
Networking Refresher
01Gamified lesson : Assigning IP in a network
02DNS- Explained
03DNS- Reliability
04DNS- TTL, Recursive and Non-recursive queries
05Gamified lesson : NetBIOS Introduction
06Gamified lesson : Netbios enumeration and attacks
07Gamified lesson: SNMP Introduction
08Gamified lesson: LDAP Introduction
09Gamified lesson: NTP Introduction
10Gamified lesson: NFS Introduction
11Gamified lesson: SMB Introduction
Module 4 : Enumeration
01Enumeration of common protocols- live session
02Enumeration: Topics continued
Module 4 LAB
01NetBIOS Enumeration
02Perform SNMP Enumeration
03Perform LDAP Enumeration
04Perform NFS Enumeration
05Perform DNS Enumeration
06Perform SMTP Enumeration
07Perform Enumeration using Various Enumeration Tools
Module 5: Vulnerability Analysis
01Vulnerability Analysis Live session
Module 5 Lab
01LAB 01
02LAB 2
Module 6: System Hacking
01System Hacking
02Buffer Overflow
Module 7: Malware Threats
01Malware threats- Types of Malwares
02Advanced Persistent Threats(APTs)
03Malware Types- Explained
04File-less Malware
05AI Based Malware
06Malware Analysis- Introduction
07Static Malware Analysis
08Dynamic Malware Analysis
09Malware- Countermeasures
Module 07 LABS
01LAB 01
02LAB 02
03LAB 03
04LAB 04
Module 8: Sniffing
01Sniffing Introduction, Hubs and Switches
02CAM Table related attacks
03Gamified Lesson: MAC Flooding
04DHCP Attacks
05ARP, IRDP, MAC attacks
06VLAN, Default VLAN, VLAN Tags
07Native VLAN and Trunk ports
08Switch spoofing, Double tagging
Module 08 LABS
01LAB 01
02LAB 02
03LAB 03
Module 9: Social Engineering
01Tech based Social engineering
02Mobile-based SE and countermeasures
Module 9 LABS: Social Engineering
01Module 9 LABS
Module 10: Denial-of-Service
01Denial-of-Service
02D Dos
03DoS and DDoS attacks
Module 10 LABS
01LAB 1
02LAB 2
Module 11 : Session Hijacking
01Session Hijacking
Module 12 : Evading IDS, Firewalls, and Honeypots
Module 13 : Hacking Web Servers
01 Hacking Web Servers
Module 14 : Hacking Web Applications
Module 15 : SQL Injection
Module 16 : Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
01Hacking Mobile Platforms
Module 18 : loT Hacking
01loT and OT Hacking
Module 19 : Cloud Computing
Module 20 : Cryptography
Ready to get started?
Enroll now and start learning with hands-on, expert-led training.
Enroll Now — ₹82,837