What is the Certified Ethical Hacker (CEH) Certification Exam?
The Certified Ethical Hacker (CEH) certification exam supports and verifies the knowledge of auditors, security officers, site admins, security professionals, as well as anyone who wants to ensure a network is safe against cybercriminals.
Official Website Link https://www.itpro.tv/courses/security-skills/certified-ethical-hacker-v12/
Intro to Ethical Hacking
- Course Overview
- Basic Cybersecurity Concepts
- The Attacker Motives and Objectives
- Attack Categories
- Information Warfare
- Cyber Kill Chain
- Tactics Techniques And Procedures
- Common Adversarial Behaviors
- Threat Hunting Concepts
- Risk And Risk Management
- Cyber Threat Intelligence
- Threat Modeling
- Incident Management Handling And Response
- ML And AI
- Standards And Regulations
- CEH Hacking Methodology
- MITRE ATT&CK Framework
- Diamond Model Of Intrusion Analysis
RECON TECHNIQUES - FOOTPRINTING AND RECON
- Footprinting Concepts
- Google Dorks
- Shodan And Censys
- Sub-Domain Enumeration
- Social Networking Recon
- Job Board Recon
- Deep-Dark Web Recon
- Email Tracking
- WHOIS And DNS Recon
- Social Engineering Recon
- Other Footprinting Tools
- Footprinting And Recon Countermeasures
RECON TECHNIQUES - SCANNING
- Network Scanning Types
- Network Scanning Tools
- Host Discovery
- Port And Service Scanning
- TCP Connect Scan
- Stealth Scan
- Inverse TCP XMAS And Maimon Scans
- ACK Scan
- IDLE IPID Scan
- UDP Scan
- SCTP INIT And COOKIE ECHO Scans
- Scan Optimizations
- Target OS Identification Techniques
- IDS And Firewall Evasion
RECON TECHNIQUES - ENUMERATION
- NetBIOS And SMB Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- NFS Enumeration
- SMTP Enumeration
SYSTEM HACKING PHASES AND ATTACK TECHNIQUES - VULNERABILITY ANALYSIS
- Vulnerability Assessment Concepts And Resources
- Vulnerability Management Life-Cycle
- Vulnerability Classification
- Vulnerability Assessment Types
- Vulnerability Assessment Models And Tools
- Vulnerability Assessment Reports
SYSTEM HACKING PHASES AND ATTACK TECHNIQUES - SYSTEM HACKING
- CEH Hacking Methodology And Goals
- Windows Authentication
- Password Attacks - Basic Concepts
- Password Extraction And Cracking
- Password Attacks Cracking Enhancement Techniques
- Buffer Overflows
- Privilege Escalation
- Maintaining Access
- Steganography
- Covering Tracks
- AD Enumeration
- Mimikatz
- Pivoting
SYSTEM HACKING PHASES AND ATTACK TECHNIQUES - MALWARE THREATS
- Malware Concepts And Components
- APT
- Trojans
- Viruses And Worms
- Fileless Malware
- Malware Analysis
- Malware Countermeasures
NETWORK AND PERIMETER HACKING - SNIFFING
- Network Sniffing Basics
- DHCP Sniffing Attacks
- ARP Poisoning
- DNS Poisoning
- Sniffing Defenses
NETWORK AND PERIMETER HACKING - SOCIAL ENGINEERING
- Social Engineering Concepts And Attacks
- Insider Threats
- Identity Theft
NETWORK AND PERIMETER HACKING - DENIAL OF SERVICE
- DoS And DDoS Attacks
- Volumetric Attacks
- Protocol Attacks
- Application Layer Attacks
- Botnets
- DoS And DDoS Countermeasures
NETWORK AND PERIMETER HACKING - SESSION HIJACKING
- Session Hijacking Concepts
- Network Level Session Hijacking
- Application Level Session Hijacking
- Session Hijacking Countermeasures
NETWORK AND PERIMETER HACKING - EVADING FIREWALLS, IDS, AND HONEYPOTS
- IDS And IPS
- Firewalls
- Honeypots
WEB APPLICATION HACKING - HACKING WEB SERVERS
- Web Server Basics
- Web Server Attacks
- Web Server Hacking Methodology
WEB APPLICATION HACKING - HACKING WEB APPLICATIONS
- Web App Basics
- OWASP Top 10 Web Application Attacks 2021
- Web App Hacking Methodology
- Unvalidated Redirects And Forwards
- XSS And CSRF
- Input Filtering Evasion
- IDOR
- LFI RFI
- APIs And Webhooks
WEB APPLICATION HACKING - SQL INJECTION
- SQLi Concepts
- Error-Based SQLi Attacks
- Blind-Based SQLi Attacks
- SQLi To System Access
- SQLMap
WIRELESS NETWORK HACKING - HACKING WIRELESS NETWORKS
- Wireless Basics
- Wireless Threats
- Wireless Hacking Tools
- Wireless Hacking
- Wireless Hacking Countermeasures
MOBILE PLATFORM, IOT, AND OT HACKING - HACKING MOBILE PLATFORMS
- Mobile Hacking Basics
- Android Security
- IOS Security
- Mobile Device Management
MOBILE PLATFORM, IOT, AND OT HACKING - IOT AND OT HACKING
- Basics of Iot
- IoT Threats And Vulnerabilities
- IoT Attacks Tools And Countermeasures
- Basics of OT
- Attacks Tools And Countermeasures of OT
CLOUD COMPUTING - CLOUD COMPUTING
- Basics of Cloud Computing
- Basics of Container
- Hacking Cloud Services
- Cloud Security Controls
CRYPTOGRAPHY - CRYPTOGRAPHY
- Basics of Cryptography
- Algorithms And Implementations of Crypto
- Tools of Cryptography
- Public Key Infrastructure
- Cryptanalysis
- Crypto-Attack Countermeasures