Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
Module 1: -
Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
Module 2: - Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
Module 3: - Performing network scans, host and port discovery by utilizing different scanning tools
Module 4: - Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
Module 5: - Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
Module 6: - Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
Module 7: - Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
Module 8: - Packet sniffing concepts, techniques, and protection against the same.
Module 9: - Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
Module 10: - Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
Module 11: - Security solutions like firewall, IPS, honeypots, their evasion, and protection
Module 12: - Web server and web application-based attacks, methodologies
Module 13: - SQL injection, hijacking, and evasion techniques
Module 14: - Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
Module 15: - Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
Module 16: - Operational Technology (OT) essentials and threats
Module 17: - attack methodologies and attack prevention. The concept of OT is a new addition.
Module 18: - Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
Module 19: - Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
Module 20: - Cloud computing, threats and security, essentials of container technology and serverless computing