Instructor

Curriculum

Ratings

( 4.5 Ratings )

Live Online Classes starting on 01 January, 1970

EC-Council CEH: Certified Ethical Hacker v12

Certified Ethical Hacker v12 Course Overview

The Certified Ethical Hacker v12 (CEHv12) course provides an in-depth exploration of advanced hacking tools and techniques employed by both hackers and information security professionals. This course is meticulously structured to guide learners through the systematic process of ethical hacking, starting with fundamental security concepts and progressing to sophisticated security measures.

 

Course Modules:

  1. Introduction to Ethical Hacking: This module covers the basics of ethical hacking, including the methodologies and principles involved in conducting ethical hacking assessments.

  2. Footprinting and Reconnaissance: Learn techniques for gathering information about targets to understand their vulnerabilities.

  3. Scanning Networks: Techniques for identifying live hosts, services, and vulnerabilities in a network.

  4. Enumeration: Discover methods to uncover resources and sensitive information on a network.

  5. System Hacking: Understand the processes involved in gaining, escalating, maintaining access, and covering tracks on compromised systems.

  6. Malware Threats: Analyze various types of malware, such as viruses, worms, and trojans, and learn how to defend against them.

  7. Sniffing: Techniques and tools for intercepting and analyzing network traffic.

  8. Social Engineering: Strategies for manipulating individuals to reveal confidential information.

  9. Denial-of-Service (DoS) Attacks: Explore methods of launching and defending against DoS attacks.

  10. Session Hijacking: Techniques for intercepting and taking over active sessions.

  11. Hacking Web Servers: Specific risks and defenses associated with web server security.

  12. Hacking Web Applications: Detailed exploration of web application vulnerabilities and countermeasures.

  13. Hacking Wireless Networks: Understand the risks associated with wireless networks and how to secure them.

  14. Hacking Mobile Platforms: Examine the security challenges and solutions related to mobile platforms.

  15. IoT and OT Hacking: Address the unique security challenges posed by Internet of Things (IoT) and Operational Technology (OT) devices.

  16. Cloud Computing Security: Explore the security implications of cloud computing and how to protect cloud environments.

  17. Cryptography: A deep dive into cryptographic principles and practices to secure data communications.

 

Course Prerequisites

To maximize the benefits of the CEHv12 course, you should have:

  • A basic understanding of networking concepts, including TCP/IP protocols and the OSI model.
  • Familiarity with operating systems, particularly Windows and Linux.
  • Knowledge of common cybersecurity principles and awareness of various cyber threats.
  • Fundamental skills in using computers and the internet.
  • Introductory knowledge of Information Security laws and standards.
  • Understanding of Information Security controls, including firewalls, intrusion detection systems, and antivirus software.
  • Basic problem-solving skills and the mindset to think like a hacker.

 

Target Audience

The CEHv12 course is ideal for IT professionals aiming to advance their cybersecurity skills. It is suited for:

  • IT Security Officers
  • Network Security Engineers
  • Security Analysts and Consultants
  • Ethical Hackers and Penetration Testers
  • Systems Administrators and Engineers
  • IT Auditors
  • Cybersecurity Professionals
  • Risk Assessment Professionals
  • Information Security Managers
  • Technical Support Engineers
  • Vulnerability Assessment Analysts
  • Network Managers
  • Cyber Defense Analysts
  • SOC Analysts
  • Computer Forensics Analysts
  • Incident Responders
  • Application Developers focused on security
  • IT professionals seeking to enhance their security knowledge
  • Individuals preparing for the EC-Council Certified Ethical Hacker exam

 

Learning Objectives

By completing the CEHv12 course, learners will:

  • Gain understanding of the latest hacking attacks and defensive strategies for securing information systems.
  • Conduct footprinting and reconnaissance to gather critical information about targets.
  • Perform network scanning to detect live hosts, services, and vulnerabilities.
  • Master enumeration techniques to find sensitive data on a network.
  • Learn system hacking methods, including gaining and maintaining access, and evading detection.
  • Analyze and counteract various malware types, including viruses, worms, and trojans.
  • Employ sniffing techniques to intercept and analyze network traffic.
  • Apply social engineering tactics to manipulate individuals into disclosing confidential information.
  • Understand and mitigate risks from denial-of-service attacks and session hijacking.
  • Evade security measures such as IDS, firewalls, and honeypots during ethical hacking activities.

SpireTec Unique Features

1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser