The Certified Ethical Hacker (CEH) Practical course is an advanced, hands-on extension of the CEH certification program, designed to provide cybersecurity professionals with practical experience in ethical hacking and penetration testing. The CEH Practical focuses on applying ethical hacking techniques in real-world scenarios to enhance practical skills and demonstrate the ability to identify, exploit, and remediate security vulnerabilities effectively. This course is ideal for professionals looking to validate their hands-on skills and advance their careers in cybersecurity.
Course Prerequisites
To participate in the CEH Practical course, candidates should:
-
Hold a valid CEH certification or equivalent experience.
-
Have practical experience in ethical hacking and penetration testing.
-
Possess knowledge of various hacking tools and techniques.
-
Be familiar with network security, web application security, cloud security, and wireless security principles.
Target Audience
The CEH Practical course is intended for:
-
Certified Ethical Hackers (CEH) looking to validate their practical skills.
-
Penetration Testers and Security Consultants seeking advanced certification.
-
IT Security Professionals aiming to enhance their practical hacking abilities.
-
Incident Responders and Forensic Investigators.
-
Network and System Administrators with a focus on security.
Course Outline
1) Introduction to Ethical Hacking
-
Information Security Overview
-
Hacking Methodologies and Frameworks
-
Hacking Concepts
-
Ethical Hacking Concepts
-
Information Security Controls
-
Information Security Laws and Standards
2) Footprinting and Reconnaissance
-
Footprinting Concepts
-
Footprinting through Search Engines
-
Footprinting through Web Services
-
Footprinting through Social Networking Sites
-
Website Footprinting
-
Email Footprinting
-
Whois Footprinting
-
DNS Footprinting
-
Network Footprinting
-
Footprinting through Social Engineering
-
Footprinting Tools
-
Footprinting Countermeasures
3) Scanning Networks
-
Network Scanning Concepts
-
Scanning Tools
-
Host Discovery
-
Port and Service Discovery
-
OS Discovery (Banner Grabbing/OS Fingerprinting)
-
Scanning Beyond IDS and Firewall
-
Network Scanning Countermeasures
4) Enumeration
5) Vulnerability Analysis
-
Vulnerability Assessment Concepts
-
Vulnerability Classification and Assessment Types
-
Vulnerability Assessment Tools
-
Vulnerability Assessment Reports
6) System Hacking
-
Gaining Access
-
Escalating Privileges
-
Maintaining Access
-
Clearing Logs
7) Malware Threats
8) Sniffing
-
Sniffing Concepts
-
Sniffing Technique: MAC Attacks
-
Sniffing Technique: DHCP Attacks
-
Sniffing Technique: ARP Poisoning
-
Sniffing Technique: Spoofing Attacks
-
Sniffing Technique: DNS Poisoning
-
Sniffing Tools
9) Social Engineering
-
Social Engineering Concepts
-
Social Engineering Techniques
-
Insider Threats
-
Impersonation on Social Networking Sites
-
Identity Theft
-
Social Engineering Countermeasures
10) Denial-of-Service
11) Session Hijacking
-
Session Hijacking Concepts
-
Application-Level Session Hijacking
-
Network-Level Session Hijacking
-
Session Hijacking Tools
-
Session Hijacking Countermeasures
12) Evading IDS, Firewalls, and Honeypots
-
IDS, IPS, Firewall, and Honeypot Concepts
-
IDS, IPS, Firewall, and Honeypot Solutions
-
Evading IDS
-
Evading Firewalls
-
Evading NAC and Endpoint Security
-
IDS/Firewall Evading Tools
-
Detecting Honeypots
-
IDS/Firewall Evasion Countermeasures
13) Hacking Web Servers
14) Hacking Web Applications
-
Web Application Concepts
-
Web Application Threats
-
Web Application Hacking Methodology
-
Web API, Webhooks, and Web Shell
-
Web Application Security
15) SQL Injection
16) Hacking Wireless Networks
17) Hacking Mobile Platforms
18) IoT and OT Hacking
-
IoT Hacking
-
IoT Concepts
-
IoT Attacks
-
IoT Hacking Methodology
-
OT Hacking
-
OT Concepts
-
OT Attacks
-
OT Hacking Methodology
19) Cloud Computing
20) Cryptography