icon
+91 8800955639, +91 8800956562
IAF iso
icon
+91-8800955639, +91-8800956562

Need Help? call us free

IAF
iso

CEHv11 Syllabus or Outline

CEHv11 Syllabus or Outline

Course Summary

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

Getting Started

Module 1: - Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.

Module 2: - Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures

Module 3: - Performing network scans, host and port discovery by utilizing different scanning tools

Module 4: - Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures

Module 5: - Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used

Module 6: - Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.

Module 7: - Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.

Module 8: - Packet sniffing concepts, techniques, and protection against the same.

Module 9: - Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures

Module 10: - Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools

Module 11: - Security solutions like firewall, IPS, honeypots, their evasion, and protection

Module 12: - Web server and web application-based attacks, methodologies

Module 13: - SQL injection, hijacking, and evasion techniques

Module 14: - Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts

Module 15: - Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems

Module 16: - Operational Technology (OT) essentials and threats

Module 17: - attack methodologies and attack prevention. The concept of OT is a new addition.

Module 18: - Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices

Module 19: - Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis

Module 20: - Cloud computing, threats and security, essentials of container technology and serverless computing

Course Features

  • Duration : 60 Hours
  • Lectures : 30
  • Quiz : 20
  • Students : 15

You may like