Price
Duration
Delivery
Course Objectives:
- Understanding of information security controls, laws, and standards.
- Knowledge of various types of footprinting, footprinting tools, and countermeasures.
- Proficiency in network scanning techniques and scanning countermeasures.
- Understanding of enumeration techniques and enumeration countermeasures.
- Ability to conduct vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
- Familiarity with system hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
- Knowledge of different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
- Proficiency in packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
- Understanding of social engineering techniques, identification of theft attacks, auditing of human-level vulnerabilities, and social engineering countermeasures.
- Ability to perform DoS/DDoS attack techniques and audit a target, along with knowledge of DoS/DDoS countermeasures.
- Proficiency in session hijacking techniques, discovering network-level session management, authentication/authorization, cryptographic weaknesses, and countermeasures.
- Understanding of webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure and countermeasures.
- Knowledge of web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
- Ability to execute SQL injection attack techniques, use injection detection tools to detect SQL injection attempts, and implement countermeasures.
- Proficiency in wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- Understanding of mobile platform attack vectors, android vulnerability exploitations, and mobile security guidelines and tools.
- Knowledge of firewall, IDS, and honeypot evasion techniques, evasion tools, and techniques to audit a network perimeter for weaknesses and countermeasures.
- Understanding of cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
- Ability to perform penetration testing, security audit, vulnerability assessment, and follow a penetration testing roadmap.
- Knowledge of threats to IoT and OT platforms and defending IoT and OT devices.
- Understanding of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Curriculum
- 1 Section
- 1 Lesson
- Lifetime
Expand all sectionsCollapse all sections
Requirements
- There are no prerequisites for this course.
Target audiences
- The Certified Ethical Hacking v12 course is for security officers, auditors, security professionals, site administrators, and anyone concerned about the integrity of the network infrastructure.