CEH V12 Course
Description
The
Certified Ethical Hacker (CEH v12 Training) program by
EC-Council upgrades your understanding of core security
fundamentals. Certified Ethical Hacker (CEH V12
Certification Course) is one of the most sought-after
security certifications globally that is considered in high
regard. This internationally valued security training
validates your abilities to identify the vulnerabilities in
the organization’s network infrastructure and helps to
combat cyber-attacks effectively.
Target Audience
- Ethical hackers
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Auditors
- Security Professionals
CEH v12 certification Course Needs:
- Basic understanding of network essentials, core concepts
including server and network components
Exam Information
For EC-Council Certified Ethical
Hacker (CEH) certification
Certification Name: 312-50 (ECC EXAM), 312-50
(VUE)
- Test Format: Multiple Choice
- Number of Questions: 125
- Test Duration: 4 Hours
- Test Delivery: ECC EXAM, VUE
- EC council provides exam in the form of different question
banks with varying difficulty levels. Cut scores can range
from 60% to 85%, depending on which Exam information of CEH
v12 form is challenged.
CEH V12 Course Objectives
Successful completion of the CEH v12 certification training
empowers you with across the board understanding of:
- Ethical hacking concepts, cyber kill chain concepts, an
overview of information security, security controls, and
various laws and regulations related to information
security.
- Footprinting concepts and methodologies and utilizing
footprinting tools along with the countermeasures
- Performing network scans, host and port discovery by
utilizing different scanning tools
- Enumeration techniques that now includes NFS enumeration
and related tools, DNS cache snooping, and DNSSEC Zone
walking along with the countermeasures
- Concepts of vulnerability assessment, its types, and
solutions along with a hands-on experience of industrial
tools used
- Phases of system hacking, attacking techniques to obtain,
escalate, and maintain access on victim along with covering
tracks.
- Malware threats, analysis of various viruses, worms and
trojans like Emotet and battling them to prevent data. APT
and Fileless Malware concepts have been introduced to this
domain.
- Packet sniffing concepts, techniques, and protection
against the same.
- Social engineering concepts and related terminologies like
identity theft, impersonation, insider threats, social
engineering techniques, and countermeasures
- Denial of Service (DoS) and Distributed Denial of Service
(DDoS) attacks, use cases, and attack and defence tools
- Security solutions like firewall, IPS, honeypots, their
evasion, and protection
- Web server and web application-based attacks,
methodologies
- SQL injection, hijacking, and evasion techniques
- Wireless encryption, wireless hacking, and Bluetooth
hacking-related concepts
- Mobile device management, mobile platform attack
vectors, and vulnerabilities related to Android and iOS
systems
- Operational Technology (OT) essentials, threats, attack
methodologies and attack prevention. The concept of OT is a
new addition.
- Recognizing the vulnerabilities in IoT and ensuring the
safety of IoT devices
- Encryption algorithms, Public Key Infrastructure (PKI),
cryptographic attacks, and cryptanalysis
- Cloud computing, threats and security, essentials of
container technology and serverless computing