- Home
- Companies
- InfosecTrain
- Training
- Certified Ethical Hacker (CEH v12) ...
Certified Ethical Hacker (CEH v12) Online Training & Certification
The Certified Ethical Hacker (C|EH v12) program is one of the most respected certifications in the cybersecurity field. It has been the world’s number one ethical hacking certification for 20 years and is continuously ranked number one in ethical hacking certification by different firms. Infosectrain’s CEH Online Training and Certification program follows the latest version of CEH that is v12. The updated learning framework covers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands-on lab and practice range experience.
The EC-Council’s Certified Ethical Hacker (CEH v12) Training program will enhance your knowledge of essential security fundamentals. Certified Ethical Hacker (CEH V12) certification course is one of the most sought-after security qualifications in the world. This internationally recognized security course validates your ability to discover weaknesses in the organization’s network infrastructure and aids in the effective combat of cyber-attacks.
The C|EH v12 program is a specialized, one-of-a-kind training program to teach everything about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and a global hacking competition.
Target Audience
- Ethical Hackers
- System Administrators
- Network Administrators
- Engineers
- Web Managers
- Auditors
- Security Professionals
Pre-requisites
- Basic understanding of network essentials and core concepts, including server and network components
Since the threat in the cyber world is increasing continuously, the industry needs cyber security professionals who prevent threats and attacks in organizations worldwide. The Certified Ethical Hacker (C|EH v12) program is one of the most respected certifications in the cybersecurity field.
The EC-Council has introduced new updated technologies in C|EH v12 program, including the MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, Techniques for Establishing Persistence, Evading NAC and Endpoint Security, Fog Computing, Edge Computing, and Grid Computing. These updated technologies will prepare you to think like a hacker, so you have the skills to protect your infrastructure.
Scanners/Frameworks Tools
- Nikto
- Metasploit
- Reconness
- Nmap
- Angry IP scanner
Miscellaneous Hacking Tools
- John the Ripper
- Wireshark
- THC Hydra
- Sqlmap
Vulnerability Assessment Tools
- Nessus
- Burp Suite
- OpenVAS
Wireless Networking Tools
- Aircrack-ng
Security Testing Tools
- Burp Suite
Other Tools
- NetScan
- Enum4linux
- Hping3
- Msfvenom
After completing the C|EH v12 certification program, you will have a thorough understanding of:
- Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security, security measures, and numerous information security laws and regulations.
- Footprinting concepts and methodologies, as well as using footprinting tools and countermeasures.
- Enumeration techniques include NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures.
- Concepts of vulnerability assessment, its categories and strategies, and first-hand exposure to the technologies used in industry.
- Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on the victim and covering tracks.
- Malware threats, analysis of various viruses, worms, and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
- Packet sniffing concepts, techniques, and protection against the same.
- Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures.
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defense tools.
- Security solutions like firewall, IPS, honeypots, evasion, and protection.
- Operational Technology (OT) essentials, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
- Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices.
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis.
- Cloud computing, threats and security, essentials of container technology, and serverless computing.
