User Avatar

Certified Ethical Hacker (CEH)

10 Weeks
All levels
0 درس
0 quizzes
0 الطالب
النسخة 11 من شهادة CEH هي شهادة في مجال الأمن السيبراني تدرب الأفراد على تقنيات القرصنة الأخلاقية لتحديد ومواجهة التهديدات السيبرانية. تغطي الشهادة اختبار الاختراق، هجمات الشبكات، وأدوات القرصنة، مع التركيز على الخبرة العملية من خلال التدريب في المختبرات. صممت للمحترفين في مجال الأمان، تهدف CEH v11 إلى تعزيز المهارات في دفاع الشبكات.
There are no items in the curriculum yet.
  • Introduction to Ethical Hacking: Basics of ethical hacking, ethics, and legal implications.
  • Footprinting and Reconnaissance: Techniques for gathering information on potential targets.
  • Scanning Networks: Identifying live hosts, ports, and services in a network.
  • Enumeration: Extracting detailed information about network resources and potential vulnerabilities.
  • Vulnerability Analysis: Identifying security loopholes in the target environment.
  • System Hacking: Gaining access to systems and exploiting vulnerabilities.
  • Malware Threats: Understanding, creating, and deploying malware, including viruses, worms, and trojans.
  • Sniffing: Techniques for intercepting and analyzing network traffic.
  • Social Engineering: Manipulation techniques to gain confidential information.
  • Denial of Service: Tactics for disrupting services and availability of resources.
  • Session Hijacking: Techniques for taking over ongoing sessions.
  • Evading IDS, Firewalls, and Honeypots: Strategies to bypass security measures and detection.
  • Hacking Web Servers and Web Applications: Exploiting vulnerabilities in web servers and applications.
  • SQL Injection: Techniques for exploiting SQL injection flaws.
  • Hacking Wireless Networks: Vulnerabilities associated with wireless networks and how to exploit them.
  • Hacking Mobile Platforms: Exploiting vulnerabilities in mobile platforms.
  • IoT and OT Hacking: Understanding vulnerabilities in IoT and Operational Technology devices.
  • Cloud Computing: Security challenges and vulnerabilities in cloud computing.
  • Cryptography: Principles of cryptography and how they are applied in security practices.

Before pursuing the Certified Ethical Hacker (CEH) Version 11 certification, you should have:­

  • A basic understanding of networking concepts and protocols.
  • Familiarity with operating systems, especially Windows and Linux.
  • Knowledge of web and internet technologies.
  • An understanding of information security principles.­­