Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
Module 1: -
Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
Module 2: -
Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
Module 3: -
Performing network scans, host and port discovery by utilizing different scanning tools
Module 4: -
Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
Module 5: -
Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
Module 6: -
Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
Module 7: -
Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
Module 8: -
Packet sniffing concepts, techniques, and protection against the same.
Module 9: -
Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
Module 10: -
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
Module 11: -
Security solutions like firewall, IPS, honeypots, their evasion, and protection
Module 12: -
Web server and web application-based attacks, methodologies
Module 13: -
SQL injection, hijacking, and evasion techniques
Module 14: -
Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
Module 15: -
Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
Module 16: -
Operational Technology (OT) essentials and threats
Module 17: -
attack methodologies and attack prevention. The concept of OT is a new addition.
Module 18: -
Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
Module 19: -
Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
Module 20: -
Cloud computing, threats and security, essentials of container technology and serverless computing