User Avatar

Certified Ethical Hacker (CEH)

10 Weeks
All levels
0 lessons
0 quizzes
0 students

CEH Version 11 is a cybersecurity certification that trains individuals in ethical hacking techniques to identify and mitigate cyber threats. It covers penetration testing, network attacks, and hacking tools, emphasizing hands-on experience through lab training. Designed for security professionals, CEH v11 aims to enhance skills in network defense.

There are no items in the curriculum yet.
  • Introduction to Ethical Hacking: Basics of ethical hacking, ethics, and legal implications.
  • Footprinting and Reconnaissance: Techniques for gathering information on potential targets.
  • Scanning Networks: Identifying live hosts, ports, and services in a network.
  • Enumeration: Extracting detailed information about network resources and potential vulnerabilities.
  • Vulnerability Analysis: Identifying security loopholes in the target environment.
  • System Hacking: Gaining access to systems and exploiting vulnerabilities.
  • Malware Threats: Understanding, creating, and deploying malware, including viruses, worms, and trojans.
  • Sniffing: Techniques for intercepting and analyzing network traffic.
  • Social Engineering: Manipulation techniques to gain confidential information.
  • Denial of Service: Tactics for disrupting services and availability of resources.
  • Session Hijacking: Techniques for taking over ongoing sessions.
  • Evading IDS, Firewalls, and Honeypots: Strategies to bypass security measures and detection.
  • Hacking Web Servers and Web Applications: Exploiting vulnerabilities in web servers and applications.
  • SQL Injection: Techniques for exploiting SQL injection flaws.
  • Hacking Wireless Networks: Vulnerabilities associated with wireless networks and how to exploit them.
  • Hacking Mobile Platforms: Exploiting vulnerabilities in mobile platforms.
  • IoT and OT Hacking: Understanding vulnerabilities in IoT and Operational Technology devices.
  • Cloud Computing: Security challenges and vulnerabilities in cloud computing.
  • Cryptography: Principles of cryptography and how they are applied in security practices.

Before pursuing the Certified Ethical Hacker (CEH) Version 11 certification, you should have:­

  • A basic understanding of networking concepts and protocols.
  • Familiarity with operating systems, especially Windows and Linux.
  • Knowledge of web and internet technologies.
  • An understanding of information security principles.­­