Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)
Brochure
  • Description
  • Course Learning Objectives

Course Description

CEH | Certified Ethical Hacker

CEH is the leading ethical hacking training and certification program in cybersecurity. Students audit a system for weaknesses and vulnerabilities using the same tools and exploits as malicious hackers, but under proper legal circumstances and in the best interest of assessing the security posture of a target system and organization. It teaches how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.

Last year, businesses experienced a 2,000% increase in OT based incidents. You can gain expertise in OT, IT, and IIoT (industrial IoT) to secure a critical enterprise OT/IoT deployments. To learn the advanced skills of OT, CEH covers concepts of OT, such as ICS, SCADA, and PLC, various challenges of OT, OT hacking methodology, tools, communication protocols of an OT network like Modbus, Profinet, HART-IP, SOAP, CANopen, DeviceNet, Zigbee, Profibus, etc., and gaining Remote Access using DNP3 protocol.

Key Outcomes

- Thorough introduction to ethical hacking

- Exposure to threat vectors and countermeasures

- Addresses emerging areas of IoT, cloud and mobile hacking

- Prepares you to combat Trojans, malware, backdoors, and more

- Enables you to hack using mobile

Exam Information

Exam Title: Certified Ethical Hacker (ANSI)

Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)

Number of Questions: 125

Duration: 4 hours

Availability: ECC Exam Portal, VUE

Test Format: Multiple Choice

Passing Score: Please refer to https://cert.eccouncil.org/faq.html

Course Learning Objectives

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  11. Session Hijacking
  12. Evading IDS, Firewalls, and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT Hacking
  19. Cloud Computing
  20. Cryptography