CEH V12 Course

CEH V12 Course Description

The Certified Ethical Hacker (CEH v12 Training) program by EC-Council upgrades your understanding of core security fundamentals. Certified Ethical Hacker (CEH V12 Certification Course) is one of the most sought-after security certifications globally that is considered in high regard. This internationally valued security training validates your abilities to identify the vulnerabilities in the organization’s network infrastructure and helps to combat cyber-attacks effectively.

Image
Target Audience
  1. Ethical hackers
  2. System Administrators
  3. Network Administrators
  4. Engineers
  5. Web managers
  6. Auditors
  7. Security Professionals

CEH v12 certification Course Needs:

  1. Basic understanding of network essentials, core concepts including server and network components
Exam Information
For EC-Council Certified Ethical Hacker (CEH) certification

Certification Name:  312-50 (ECC EXAM), 312-50 (VUE)
  1. Test Format: Multiple Choice
  2. Number of Questions: 125
  3. Test Duration: 4 Hours
  4. Test Delivery: ECC EXAM, VUE
  5. EC council provides exam in the form of different question banks with varying difficulty levels. Cut scores can range from 60% to 85%, depending on which Exam information of CEH v12 form is challenged.

CEH V12 Course Objectives
Successful completion of the CEH v12 certification training empowers you with across the board understanding of:

  1. Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
  2. Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
  3. Performing network scans, host and port discovery by utilizing different scanning tools
  4. Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
  5. Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
  6. Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
  7. Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
  8. Packet sniffing concepts, techniques, and protection against the same.
  9. Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
  10. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
  11. Security solutions like firewall, IPS, honeypots, their evasion, and protection
  12. Web server and web application-based attacks, methodologies
  13. SQL injection, hijacking, and evasion techniques
  14. Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
  15.  Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
  16. Operational Technology (OT) essentials, threats, attack methodologies and attack prevention. The concept of OT is a new addition.
  17. Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
  18. Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
  19. Cloud computing, threats and security, essentials of container technology and serverless computing

Copyright 2022 Seqty. Designed By Senselearner