- Cyber Security
- 4230 (Registered)
-
Course/Certification | Available Dates Classroom & Online (Iweek class) |
---|---|
CEH v12 Training and Certification | October:2022 Weekday: October 3rd – 28th, 2022 / October 17th – Nov 16th, 2022 Weekend: October 15th – 30th, 2022 / October 22nd – Nov 6th, 2022 |
CEH v12 Training and Certification | November:2022 Weekday: November 7th – 30th, 2022 / November 21st – Dec 20th, 2022 Weekday: November 5th – 27th, 2022 / November 12th – Dec 11th, 2022 |
CEH v12 Training and Certification | December : 2022 Weekday: December 5th – 30th , 2022 / December 12th – Jan 12th , 2022 Weekend: December 3rd – 18th , 2022 / December 10th – 18th , 2022 |
CEH v12 Training and Certification | January: 2023 Weekday: January 9th – 31st , 2023 / January 16th – Feb 17th , 2023 Weekend: January 14th – 29th , 2023 / January 21th – Feb 12th , 2023 |
CEH v12 Training and Certification | February: 2023 Weekday: February 6th – 28th , 2023 / February 13th – Mar 13th , 2023 Weekend: February 4th – 26th , 2023 / February 11th – Mar 5th , 2023 |
CEH v12 Training and Certification | March:2023 Weekday: March 6th- March 31st, 2023 / March 13th- April 10th, 2023 Weekend: March 11th- March 26th, 2023 / March 18th- April 9th, 2023 |
CEH v12 Training and Certification | April 2023 Weekday: April 3rd- April 30th, 2023 /April 10th- May 12th, 2023 Weekend: April 8th- April 30th, 2023 /April 15th- May 7th, 2023 |
CEH v12 Training and Certification | May 2023 Weekday: May 8th- May 31st , 2023 /May 15th- June 15th, 2023 Weekend: May 13th- June 11th,2023 / May 27th -June 18th, 2023 |
CEH v12 Training and Certification | June 2023 Weekday: June 5th – June 30th, 2023 / June 12th – July 12th 2023 Weekend: June 10th – July 2nd 2023 / June 17th – July 16th 2023 |
CEH v12 Training and Certification | July 2023 Weekday: July 3rd- July 31st, 2023 / July 10th – August 10th 2023 Weekend: July 8th- July 30th, 2023 / July 15th – August 13th 2023 |
CEH v12 Training and Certification | August 2023 Weekday: August 7th- September 7th, 2023 / August 14th – Sep 15th 2023 Weekend: August 12th- August 27th, 2023 / August 19th – Sep 10th, 2023 |
CEH v12 Training and Certification | September 2023 Weekday: September 4th- Sept 30th, 2023 /Sep 11th – October 10th 2023 Weekend: September 9th – Sept 24th 2023 / Sep 16th – October 15th 2023 |
CEHV12 TRAINING
Certified Ethical Hacker CEH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
About the Program
Hackers University APC Learning Solutions places great emphasis on the quality of its instructors. A 17-year-old will not be teaching security to professionals at our accredited training centres. Certainly, experience is the greatest teacher. However, Hackers University APC Learning Solutions adheres to a code of ethics and encourages security professionals with significant years of teaching experience in the industry and a security background to handle our security related programs.
Target Audience
- Ethical hackers
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Auditors
- Security Professionals
Exam Information
- For EC-Council Certified Ethical Hacker v12 (CEH) certification
- Certification Name: 312-50 (ECC EXAM), 312-50 (VUE)
- Test Format: Multiple Choice
- Number of Questions: 125
- Test Duration: 4 Hours
- Test Delivery: ECC EXAM, VUE
- EC council provides exams in the form of different question banks with varying difficulty levels. Cut scores can range from 60% to 85%, depending on which Exam information of CEH v12 form is challenged.
CEH V 12 Course Objectives
- Successful completion of the CEH v12 certification training empowers you with across a broad understanding of:
- Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
- Footprinting concepts and methodologies and utilizing Footprinting tools along with the countermeasures
- Performing network scans, host and port discovery by utilizing different scanning tools
- Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
- Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
- Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
- Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
- Packet sniffing concepts, techniques, and protection against the same.
- Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defense tools
- Security solutions like firewall, IPS, honeypots, their evasion, and protection
- Web server and web application-based attacks, methodologies
- SQL injection, hijacking, and evasion techniques
- Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
- Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
- Operational Technology (OT) essentials, threats, attack methodologies and attack prevention. The concept of OT is a new addition.
- Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
- Cloud computing, threats and security, essentials of container technology and server less computing
WHY IS CEH IN-DEMAND GLOBALLY?
With the CEH v12 we’ve taken all that the CEH already is and added more to it, to make it even better, more advanced, more detailed, and yet succinct. Pioneer in Setting a Global Standard for Ethical Hacking
In 2003, CEH introduced the five phases of ethical hacking, the blueprint for approaching your target and succeeding at breaking in. We have continued to hone these 5 phases, updating and refining them to match the skillset ethical hackers need today:
- Reconnaissance
- Gaining Access
- Enumeration
- Maintaining Access
- Covering Your Tracks
Imparting Skills to Combat Emerging Attack Vectors
CEH v12 covers more than 500 new threats and vulnerability scenarios. This includes but is not limited to: APT, Fileless Malware, Web API Threats, Webhooks, Web Shell, OT Attacks, Cloud Attacks, AI, ML, and much more.
Gain Expertise in Modern Malware Analysis
CEH v12 now includes the latest Malware Analysis tactics for ransomware, banking and financial malware, IoT botnets, OT Malware Analysis, Android Malware, and more!
What makes this program different from others in the market?
The program focuses on hacking techniques and technologies from an offensive perspective. This advanced security program is regularly updated to reflect the latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.
What can I take back to my organization if I certify as a CEH?
Hackers University APC Learning Solutions believes in giving back to the security community as it has partaken of it. When you are a Certified Ethical Hacker, you are more than a security auditor or a vulnerability tester or a penetration tester alone. You are exposed to security checklists that will help you audit the organization’s information assets, tools which will check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organization by doing a penetration test against it. In short, the knowledge you will acquire has practical value to make your work place a more secure and efficient one.
Where does CEH stand when compared to other educational offerings in the field of information security?
Consider this: A security defense program educates candidates regarding proper configuration, firewalls, or rather pre-emptive security. CEH takes the alternative approach – defense in depth by attacking the systems. This is in sharp contrast to programs that teach defensive tactics alone. CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a holistic security perspective of the organization.
What are Hacking techniques and their technology?
Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures. Hacking technologies are used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skills required to execute a hack are much lesser as pre-compiled programs are available to effect havoc with simple point and click.
I am a CEH. What is my level?
Congratulations on becoming a CEH! You have joined an elite group of professionals around the world. Your next level is to become an EC-Council Certified Penetration Testing Professional (E|CPENT) or proceed with the CEH (Master).
What is the employment value of CEH?
The ANSI accredited Ethical Hacking program is primarily targeted at security professionals who want to acquire a well-rounded body of knowledge to have better opportunities in this field. Acquiring a Certified Ethical Hacking Certification means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.
What is the value of CEH certification compared to other educational offerings in the field of information security?
While other certification trains a candidate about proper configuration, firewalls, or rather preemptive security, CEH course trains them to adopt defense by attacking the systems. Thus, this course focuses on offensive tactics in synchronization with defensive countermeasures. Therefore, the candidates are fed with holistic approach towards organization’s security.
Are the trainers reformed hackers?
The quality of instructor is never compromised for the training of this course. Security professionals with significant years of teaching experience in the industry and a security background to efficiently deal with security related courses are promoted to be the trainers.
Course Content
-
Course Outline
- Module 01: Introduction to Ethical Hacking: This module introduces you to the basic concepts of hacking, what is hacking, who are hackers, their intent, and other related terminologies.
- Module 02: Footprinting and Reconnaissance: Gathering information from various sources using footprinting tools and how to defend against the same.
- Module 03: Scanning Networks: Different techniques to identify and scan the network, host, and port discovery by utilizing various scanning tools.
- Module 04: Enumeration: Finding detailed information about the hosts and ports discovered during scanning. This module now includes sub-domains like NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking, along with the countermeasures.
- Module 05: Vulnerability Analysis: It introduces the concepts of vulnerability assessment, its types, along with a hands-on experience of tools that are currently used in the industry.
- Module 06: System Hacking: It focuses on the “how” part. How to gain access of the system, how to escalate privileges, how to maintain access, and how to clear your tracks. The next modules help to develop a deeper understanding of various defense and attack methodologies and concepts that aid the process of hacking.
- Module 07: Malware Threats: Malware threat terminologies, viruses, worms, trojans, their analysis, and countermeasures to prevent data loss. The introduction and analysis of malware like, Emotet and fileless that are gaining popularity have been updated under this section. APT concepts have also been added.
- Module 08: Sniffing: Packet sniffing techniques, associated tools, and related defensive techniques.
- Module 09: Social Engineering: Since humans are the most significant vulnerability for any organization, it becomes essential to understand how attackers use them for their purpose for carrying out attacks like identity theft, impersonation, insider threat, and how to defend against such social engineering attacks.
- Module 10: Denial-of-Service: As DoS and DDoS are some of the most common purposes of attackers, this module talks about these attacks, use cases, and the related attack and defense tools.
- Module 11: Session Hijacking: To provide a deeper understanding of the technique, its purpose, tools used along with the countermeasures.
- Module 12: Evading IDS, Firewalls, and Honeypots: Understand the terminologies and working of these inline defenses and techniques to learn how to evade these while performing an attack.
- Module 13: Hacking Web Servers: Web servers based attacks, methodologies, tools used, and defense
- Module 14: Hacking Web Applications: Web application-based attacks, techniques, and mitigation.
- Module 15: SQL Injection: An in-depth understanding of the top OWASP top 10 web app vulnerability, it’s working and the mitigation.
- Module 16: Hacking Wireless Networks: Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
- Module 17: Hacking Mobile Platforms: Management of mobile devices, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
- Module 18: IoT Hacking & OT Hacking : Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices. Operational Technology (OT) essentials, introduction to ICS, SCADA, and PLC, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
- Module 19: Cloud Computing: Cloud computing, threats, and security. Additionally, the essentials of container technology and serverless computing have been added.
- Module 20: Cryptography: Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis.
Prerequisites
Who Should take this course ?
