Certified Ethical Hacker (CEH) V12

Closed Caption

Certificate

Dedicated Tutors

322 Videos
56.21 Hours
322 Test Questions

Certified Ethical Hacker (CEH) V12

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

56.21 Hours
322 Videos

Certified Ethical Hacker (CEH) V12

Course Description

56.21 Hours

322 Videos

Certified Ethical Hacker (CEH) V12

The Certified Ethical Hacker (CEH) V12 certification is an advanced credential designed for cybersecurity professionals who want to develop and enhance their skills in ethical hacking and network security. This certification, offered by the EC-Council, provides comprehensive training on the latest techniques and methodologies used by ethical hackers to identify and address vulnerabilities in systems, networks, and applications. CEH V12 covers a wide range of topics, including hacking technologies, penetration testing, and cybersecurity laws and standards. The program aims to equip professionals with the knowledge needed to protect organizations from malicious cyber threats.

Key Features:

  • Comprehensive Curriculum: CEH V12 covers an extensive range of topics, including network security, web application security, wireless security, mobile security, cloud security, and IoT security. The curriculum is designed to provide a thorough understanding of various hacking techniques and countermeasures.
  • Hands-On Labs: The certification program includes practical, hands-on labs that allow participants to apply their knowledge in real-world scenarios. These labs cover various hacking techniques, such as footprinting, scanning, enumeration, vulnerability assessment, system hacking, and more.
  • Latest Tools and Techniques: CEH V12 keeps participants updated with the latest tools, techniques, and methodologies used by ethical hackers and cybersecurity professionals. This ensures that they are well-prepared to tackle current and emerging cyber threats.
  • Penetration Testing: The program provides in-depth training on penetration testing methodologies and frameworks. Participants learn how to conduct thorough penetration tests to identify vulnerabilities and recommend remediation strategies.
  • Cybersecurity Laws and Standards: CEH V12 covers important cybersecurity laws, regulations, and standards, ensuring that participants understand the legal and ethical aspects of ethical hacking. This knowledge is essential for conducting security assessments within the boundaries of the law.
  • Certified Trainers: The training is delivered by certified instructors with extensive experience in the field of cybersecurity and ethical hacking. They provide expert guidance and insights, enhancing the learning experience.
  • Exam Preparation: The program includes comprehensive exam preparation materials, practice tests, and study guides to help participants prepare for the CEH V12 certification exam. This ensures that they have the knowledge and confidence needed to pass the exam.
  • Career Advancement: CEH V12 certification is recognized globally and highly valued by employers in the cybersecurity industry. Obtaining this certification enhances career prospects and demonstrates a high level of expertise in ethical hacking and network security.
  • Continuous Learning: The EC-Council provides continuous updates and resources to CEH-certified professionals, helping them stay current with the latest trends and developments in cybersecurity.
  • Global Recognition: The CEH certification is recognized worldwide as a standard for ethical hacking expertise. It is a key credential for cybersecurity professionals looking to advance their careers and take on roles such as penetration testers, security analysts, and security consultants.

This Certified Ethical Hacker (CEH) V12 certification program is ideal for IT professionals, network administrators, cybersecurity analysts, and anyone seeking to develop advanced skills in ethical hacking and cybersecurity. By completing this certification, participants will be well-equipped to identify and mitigate security threats, protect sensitive data, and contribute to the overall security posture of their organizations.

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

Share on:

Proudly Display Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.

Course Syllabus

Chapter One:

Module 1 – Introduction To Ethical Hacking

  1. Introduction to CEH v12
  2. Elements of Security
  3. Cyber Kill Chain
  4. MITRE ATT&CK Framework
    1. Activity – Researching the MITRE ATTACK Framework
  5. Hacking
  6. Ethical Hacking
  7. Information Assurance
  8. Risk Management
  9. Incident Management
  10. Information Security Laws and Standards
  11. Introduction to Ethical Hacking Review

Chapter Two:

Module 2: Footprinting and Reconnaissance

  1. Footprinting Concepts
  2. OSINT Tools
    1. Activity – Conduct OSINT with OSR Framework
    2. Activity – OSINT with theHarvester
    3. Activity – Add API Keys to theHarvester
    4. Activity – Extract Document Metadata with FOCA
    5. Activity – Extract Document Metadata with FOCA
  3. Advanced Google Search
    1. Activity – Google Hacking
  4. Whois Footprinting
    1.    2.4.1 Activity – Conducting Whois Research
  5. DNS Footprinting
    1.    2.5.1 Activity – Query DNS with NSLOOKUP
  6. Website Footprinting
    1. Activity – Fingerprint a Webserver with ID Serve
    2. Activity – Extract Data from Websites
    3. Activity – Mirror a Website with HTTrack
  7. Email Footprinting
    1. Activity – Trace a Suspicious Email
  8. Network Footprinting
  9. Social Network Footprinting
  10. Footprinting and Reconnaissance Countermeasures
  11. Footprinting and Reconnaissance Review
Chapter Three:

Module 3: Scanning Networks

  1. Scanning Concepts
  2. Discovery Scans
    1. Activity – ICMP ECHO and ARP Pings
    2. Activity – Host Discovery with Angry IP Scanner
  3. Port Scans
    1. Activity – Port Scan with Angry IP Scanner
  4. Other Scan Types
  5. Scanning Tools
    1. Activity – Hping3 Packet Crafting
    2. Activity – Fingerprinting with Zenmap
  6. NMAP
    1. Activity – Nmap Basic Scans
    2. Activity – Host Discovery with Nmap
    3. Activity – Nmap Version Detection
    4. Activity – Nmap Idle (Zombie) Scan
    5. Activity – Nmap FTP Bounce Scan
    6. Activity – NMAP Scripts
  7. Firewall and IDS Evasion
    1. Activity – Nmap Advanced Scans
  8. Proxies
  9. Scanning Countermeasures
  10. Scanning Networks Review

Chapter Four:

Module 4: Enumeration

  1. Enumeration Overview
  2. SMB_NetBIOS_Enumeration
    1. Activity – Enumerate NetBIOS Information with Hyena
  3. File Transfer Enumeration
  4. WMI Enumeration
    1. Activity – Enumerating WMI with Hyena
  5. SNMP Enumeration
    1. Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
  6. LDAP Enumeration
  7. DNS Enumeration
  8. SMTP Enumeration
    1. Activity – Enumerate Email Users with SMTP
  9. Remote Connection Enumeration
  10. Website Enumeration
    1. Activity – Enumerate a Website with DirBuster
  11. Other Enumeration Types
  12. Enumeration Countermeasures and Review

Chapter Five:

Module 5: Vulnerability Analysis

  1.    5.1 Vulnerability Scanning
    1. Vulnerability Scanning with OpenVAS
  2. Vulnerability Assessment
  3. Vulnerability Analysis Review

Chapter Six:

Module 6: System Hacking

  1. System Hacking Concepts
  2. Common OS Exploits
  3. Buffer Overflows
    1. Activity – Performing a Buffer Overflow
  4. System Hacking Tools and Frameworks
    1. Activity – Hack a Linux Target from Start to Finish
  5. Metasploit
    1. Activity – Get Started with Metasploit
  6. Meterpreter
  7. Keylogging and Spyware
    1. Activity – Keylogging with Meterpreter
  8. Netcat
    1. Activity – Using Netcat
  9. Hacking Windows
    1. Activity – Hacking Windows with Eternal Blue
  10. Hacking Linux
  11. Password Attacks
    1. Activity – Pass the Hash
    2. Activity – Password Spraying
  12. Password Cracking Tools
  13. Windows Password Cracking
    1. Activity – Cracking Windows Passwords
    2. Activity – Cracking Password Hashes with Hashcat
  14. Linux Password Cracking
  15. Other Methods for Obtaining Passwords
  16. Network Service Attacks
    1. Activity – Brute Forcing a Network Service with Medusa
  17. Post Exploitation
  18. Pivoting
    1. Activity – Pivoting Setup and Attack
  19. Maintaining Access
    1. Activity – Persistence
  20. Hiding Data
    1. Activity – Hiding Data Using Least Significant Bit Steganography
  21. Covering Tracks
    1. Activity – Clearing Tracks in Windows
    2. Activity – View and Clear Audit Policies with Auditpol
  22. System Hacking Countermeasures
  23. System Hacking Review

Chapter Seven:

Module 7: Malware Threats

  1. Malware Overview
  2. Viruses
  3. Trojans
    1. Activity – Deploying a RAT
  4. Rootkits
  5. Other Malware
  6. Advanced Persistent Threat
  7. Malware Makers
    1. Activity – Creating a Malware Dropper and Handler
  8. Malware Detection
  9. Malware Analysis
    1. Activity – Performing a Static Code Review
    2. Activity – Analyzing the SolarWinds Orion Hack
  10. Malware Countermeasures
  11. Malware Threats Review

Chapter Eight:

Module 8: Sniffing

  1. Network Sniffing
  2. Sniffing Tools
    1. Activity- Sniffing HTTP with Wireshark
    2. Activity – Capturing Files from SMB
  3. ARP and MAC Attacks
    1. Activity – Performing an MITM Attack with Ettercap
  4. Name Resolution Attacks
    1. Activity – Spoofing Responses with Responder
  5. Other Layer 2 Attacks
  6. Sniffing Countermeasures
  7. Sniffing Review

Chapter Nine:

Module 9: Social Engineering

  1. Social Engineering Concepts
  2. Social Engineering Techniques
    1. Activity – Deploying a Baited USB Stick
    2. Activity – Using an O.MG Lightning Cable
  3. Social Engineering Tools
    1. Activity – Phishing for Credentials
  4. Social Media, Identity Theft, Insider Threats
  5. Social Engineering Countermeasures
  6. Social Engineering Review

Chapter Ten:

Module 10: Denial-of-Service

  1. DoS-DDoS Concepts
  2. Volumetric Attacks
  3. Fragmentation Attacks
  4. State Exhaustion Attacks
  5. Application Layer Attacks
    1. Activity – Performing a LOIC Attack
    2. Activity – Performing a HOIC Attack
    3. Activity – Conducting a Slowloris Attack
  6. Other Attacks
  7. DoS Tools
  8. DoS Countermeasures
  9. DoS Review

Chapter Eleven:

Module 11: Session Hijacking

  1. Session Hijacking
  2. Compromising a Session Token
  3. XSS
  4. CSRF
  5. Other Web Hijacking Attacks
  6. Network-Level Session Hijacking
    1. Activity – Hijack a Telnet Session
  7. Session Hijacking Tools
  8. Session Hijacking Countermeasures
  9. Session Hijacking Review

Chapter Twelve:

Module 12: Evading IDS, Firewalls, and Honeypots

  1. Types of IDS
  2. Snort
  3. System Logs
  4. IDS Considerations
  5. IDS Evasion
    1. Activity – Fly Below IDS Radar
  6. Firewalls
  7. Packet Filtering Rules
  8. Firewall Deployments
  9. Split DNS
  10. Firewall Product Types
  11. Firewall Evasion
    1. Activity – Use Social Engineering to Bypass a Windows Firewall
    2. Activity – Busting the DOM for WAF Evasion
  12. Honeypots
  13. Honeypot Detection and Evasion
    1. Activity – Test and Analyze a Honey Pot
  14. Evading IDS, Firewalls, and Honeypots Review
Chapter Thirteen:

Module 13: Hacking Web Servers

  1. Web Server Operations
  2. Hacking Web Servers
  3. Common Web Server Attacks
    1. Activity – Defacing a Website
  4. Web Server Attack Tools
  5. Hacking Web Servers Countermeasures
  6. Hacking Web Servers Review

Chapter Fourteen:

Module 14: Hacking Web Applications

  1. Web Application Concepts
  2. Attacking Web Apps
  3. A01 Broken Access Control
  4. A02 Cryptographic Failures
  5. A03 Injection
    1. Activity – Command Injection
  6. A04 Insecure Design
  7. A05 Security Misconfiguration
  8. A06 Vulnerable and Outdated Components
  9. A07 Identification and Authentication Failures
  10. A08 Software and Data integrity Failures
  11. A09 Security Logging and Monitoring Failures
  12. A10 Server-Side Request Forgery
  13. XSS Attacks
    1. Activity – XSS Walkthrough
    2. Activity – Inject a Malicious iFrame with XXS
  14. CSRF
  15. Parameter Tampering
    1. Activity – Parameter Tampering with Burp
  16. Clickjacking
  17. SQL Injection
  18. Insecure Deserialization Attacks
  19. IDOR
    1. Activity – Hacking with IDOR
  20. Directory Traversal
  21. Session Management Attacks
  22. Response Splitting
  23. Overflow Attacks
  24. XXE Attacks
  25. Web App DoS
  26. Soap Attacks
  27. AJAX Attacks
  28. Web API Hacking
  29. Webhooks and Web Shells
  30. Web App Hacking Tools
  31. Hacking Web Applications Countermeasures
  32. Hacking Web Applications Review
Chapter Fifteen:

Module 15: SQL Injection

  1. SQL Injection Overview
  2. Basic SQL Injection
  3. Finding Vulnerable Websites
  4. Error-based SQL Injection
  5. Union SQL Injection
    1. Activity – Testing SQLi on a Live Website – Part 1
    2. Activity – Testing SQLi on a Live Website – Part 2
  6. Blind SQL Injection
  7. SQL Injection Tools
    1.  Activity – SQL Injection Using SQLmap
  8. Evading Detection
  9. Analyzing SQL Injection
  10. SQL Injection Countermeasures
  11. SQL Injection Review

Chapter Sixteen:

Module 16: Hacking Wireless Networks

  1. Wireless Concepts
  2. Wireless Security Standards
  3. WI-FI Discovery Tools
  4. Common Wi-Fi Attacks
  5. Wi-Fi Password Cracking
  6. WEP Cracking
    1. Activity – Cracking WEP
  7. WPA,WPA2,WPA3 Cracking
    1.  Activity – WPA KRACK Attack
  8. WPS Cracking
  9. Bluetooth Hacking
  10. Other Wireless Hacking
    1. Activity – Cloning an RFID badge
    2. Activity – Hacking with a Flipper Zero
  11. Wireless Security Tools
  12. Wireless Hacking Countermeasures
  13. Hacking Wireless Networks Review
Chapter Seventeen:

Module 17: Hacking Mobile Platforms

  1. Mobile Device Overview
  2. Mobile Device Attacks
  3. Android Vulnerabilities
  4. Rooting Android
  5. Android Exploits
    1. Activity – Hacking Android
    2. Activity – Using a Mobile Device in a DDoS Campaign
  6. Android-based Hacking Tools
  7. Reverse Engineering an Android App
  8. Securing Android
  9. iOS Overview
  10. Jailbreaking iOS
  11. iOS Exploits
  12. iOS-based Hacking Tools
  13. Reverse Engineering an iOS App
  14. Securing iOS
  15. Mobile Device Management
  16. Hacking Mobile Platforms Countermeasures
  17. Hacking Mobile Platforms Review
Chapter Eighteen:

Module 18: IoT AND OT Hacking

  1. IoT Overview
  2. IoT Infrastructure
  3. IoT Vulnerabilities and Threats
    1. Activity – Searching for Vulnerable IoT Devices
  4. IoT Hacking Methodology and Tools
  5. IoT Hacking Countermeasures
  6. OT Concepts
  7. IT-OT Convergence
  8. OT Components
  9. OT Vulnerabilities
  10. OT Attack Methodology and Tools
  11. OT Hacking Countermeasures
  12. IoT and OT Hacking Review

Chapter Ninteen:

Module 19: Cloud Computing

  1. Cloud Computing Concepts
  2. Cloud Types
  3. Cloud Benefits and Considerations
  4. Cloud Risks and Vulnerabilities
  5. Cloud Threats and Countermeasures
    1. Activity – Hacking S3 Buckets
  6. Cloud Security Tools And Best Practices
  7. Cloud Computing Review

Chapter Twenty:

Module 20: Cryptography

  1. Cryptography Concepts
  2. Symmetric Encryption
    1. Activity – Symmetric Encryption
  3. Asymmetric Encryption
    1. Activity – Asymmetric Encryption
  4. Public Key Exchange
  5. PKI
    1. Activity – Generating and Using an Asymmetric Key Pair
  6. Digital Signatures
  7. Hashing
    1. Activity – Calculating Hashes
  8. Common Cryptography Use Cases
  9. Cryptography Tools
  10. Cryptography Attacks
  11. Cryptography Review
  12. Course Conclusion

Chapter Twenty One:

 

$49.95

$49.95

Share on:

You Will Get Certification After Completion of This Course.

$49.95

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Recently Viewed

Description

Certified Ethical Hacker (CEH) V12

The Certified Ethical Hacker (CEH) V12 certification is an advanced credential designed for cybersecurity professionals who want to develop and enhance their skills in ethical hacking and network security. This certification, offered by the EC-Council, provides comprehensive training on the latest techniques and methodologies used by ethical hackers to identify and address vulnerabilities in systems, networks, and applications. CEH V12 covers a wide range of topics, including hacking technologies, penetration testing, and cybersecurity laws and standards. The program aims to equip professionals with the knowledge needed to protect organizations from malicious cyber threats.

Key Features:

  • Comprehensive Curriculum: CEH V12 covers an extensive range of topics, including network security, web application security, wireless security, mobile security, cloud security, and IoT security. The curriculum is designed to provide a thorough understanding of various hacking techniques and countermeasures.
  • Hands-On Labs: The certification program includes practical, hands-on labs that allow participants to apply their knowledge in real-world scenarios. These labs cover various hacking techniques, such as footprinting, scanning, enumeration, vulnerability assessment, system hacking, and more.
  • Latest Tools and Techniques: CEH V12 keeps participants updated with the latest tools, techniques, and methodologies used by ethical hackers and cybersecurity professionals. This ensures that they are well-prepared to tackle current and emerging cyber threats.
  • Penetration Testing: The program provides in-depth training on penetration testing methodologies and frameworks. Participants learn how to conduct thorough penetration tests to identify vulnerabilities and recommend remediation strategies.
  • Cybersecurity Laws and Standards: CEH V12 covers important cybersecurity laws, regulations, and standards, ensuring that participants understand the legal and ethical aspects of ethical hacking. This knowledge is essential for conducting security assessments within the boundaries of the law.
  • Certified Trainers: The training is delivered by certified instructors with extensive experience in the field of cybersecurity and ethical hacking. They provide expert guidance and insights, enhancing the learning experience.
  • Exam Preparation: The program includes comprehensive exam preparation materials, practice tests, and study guides to help participants prepare for the CEH V12 certification exam. This ensures that they have the knowledge and confidence needed to pass the exam.
  • Career Advancement: CEH V12 certification is recognized globally and highly valued by employers in the cybersecurity industry. Obtaining this certification enhances career prospects and demonstrates a high level of expertise in ethical hacking and network security.
  • Continuous Learning: The EC-Council provides continuous updates and resources to CEH-certified professionals, helping them stay current with the latest trends and developments in cybersecurity.
  • Global Recognition: The CEH certification is recognized worldwide as a standard for ethical hacking expertise. It is a key credential for cybersecurity professionals looking to advance their careers and take on roles such as penetration testers, security analysts, and security consultants.

This Certified Ethical Hacker (CEH) V12 certification program is ideal for IT professionals, network administrators, cybersecurity analysts, and anyone seeking to develop advanced skills in ethical hacking and cybersecurity. By completing this certification, participants will be well-equipped to identify and mitigate security threats, protect sensitive data, and contribute to the overall security posture of their organizations.

Reviews

There are no reviews yet.

Be the first to review “Certified Ethical Hacker (CEH) V12”

Your email address will not be published. Required fields are marked *