+91 9830881440



Certified Ethical Hacking- CEH 9.0

Exam Description
This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.

Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Exam Topics

  • Module 01: Key issues plaguing the information security world, incident management process, and penetration testing
  • Module 02: Various types of footprinting, footprinting tools, and countermeasures
  • Module 03: Network scanning techniques and scanning countermeasures
  • Module 04: Enumeration techniques and enumeration countermeasures
  • Module 05: System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Module 06: Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Module 07: Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Module 08: Packet sniffing techniques and how to defend against sniffing
  • Module 09: Social Engineering techniques, identify theft, and social engineering countermeasures
  • Module 10: DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Module 11: Session hijacking techniques and countermeasures
  • Module 12: Different types of webserver attacks, attack methodology, and countermeasures
  • Module 13: Different types of web application attacks, web application hacking methodology, and countermeasures
  • Module 14: SQL injection attacks and injection detection tools
  • Module 15: Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  • Module 16: Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Module 17: Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Module 18: Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Module 19: Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis too
  • Module 20: Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap