info@techverseuel.com

+91 80 555 444 14

Let's Learn

Ethical
Hacking

Certified Ethical Hacker v12 (C|EH)

Course Overview

The extensive curriculum of the Certified Ethical Hacker v12 (CEHv12) course provides students with cutting-edge hacking tools and methods utilized by hackers and information security experts. From comprehending security principles by learning “Introduction to Ethical Hacking” to mastering intricate security layers by learning “Cryptography”, the course covers the methodical process of ethical hacking. Students will investigate System Hacking as a means of obtaining access, Foot printing and Reconnaissance as a means of learning about targets, Network Scanning for vulnerabilities, and Social Engineering as a means of taking advantage of human psychology. In addition, they will study the most recent defenses against malware threats, sniffing, denial-of-service attacks, and session hijacking. The modules on mobile platforms, wireless networks, web servers, and web applications offer a thorough examination of particular technologies and the risks that come with them. The course reinforces knowledge with a solid foundation in cryptography and goes on to address the challenges of cloud computing, IoT, and OT hacking. After completing CEHv12, students will have the knowledge and abilities to recognize, stop, and prevent security threats. This will ensure that they are ready to defend companies in a constantly changing cyber environment.

Modules

Module 1

Introduction to Ethical Hacking

Module 2

Foot Printing and Reconnaissance

Module 3

Scanning Networks

Module 4

Enumeration

Module 5

Vulnerability Analysis

Module 6

System hacking

Module 7

Malware Threats

Module 8

Sniffing

Module 9

Social Engineering

Module 10

Denial-of-Service

Module 11

Session Hijacking

Module 12

Evading IDS, Firewalls, Honeypots

Module 13

Hacking Web Servers

Module 14

Hacking Web Applications

Module 15

SQL Injection

Module 16

Hacking Wireless Networks

Module 17

Hacking Mobile Platforms

Module 18

IOT Hacking

Module 19

Cloud Hacking

Module 20

Cryptography

Who can enroll ?

Engineers
Security Professionals
Ethical Hackers
System Administrators
Network Administrators
Web Managers
IT Auditors


Pre-requisites

Good understanding on basic concepts of networking protocols (TCP/IP, UDP), OSI Model, networking components, basic linux shell commands, firewall, antivirus, etc.




What you will get

- Training Material (Recorded Videos, e-Book)
- Exam Voucher
- Access to training material for 6 months
- Practice questions for exam




Contact Us

Contact us for a quote, help, or to join the team.

For Individuals and Enterprises both

Pune

India

Email:

info@techverseuel.com

Phone:

+91 80 555 444 14

VISIT US

B-903, Sai Mystique,
Ambegaon BK, Pune.

WE’D LOVE TO CONNECT WITH YOU
+91 80 555 444 14
info@techverseuel.com
FOLLOW US

© 2024 Techverse Upskill e Learning LLP