Govur University Logo
...

Certified Ethical Hacker (CEH)

Sponsored Ad

Apple Watch | Quit Quitting | Apple

Course Fee

FREE

daily
Instructor: Dr. Breanna Crane

About this Course

Certified Ethical Hacker (CEH) Course Description

The Certified Ethical Hacker (CEH) course provides a comprehensive understanding of ethical hacking methodologies and techniques. This intensive program equips participants with the knowledge and skills needed to identify vulnerabilities in systems, networks, and applications. Unlike other courses, the CEH program is designed to immerse participants in the practical aspects of penetration testing, allowing them to think and act like a security professional. The course doesn't just focus on theory; it emphasizes hands-on labs, simulations, and real-world scenarios to prepare individuals for the dynamic cybersecurity landscape.

Course Objectives

  • Understand the core principles of ethical hacking and its significance in information security.
  • Identify and evaluate vulnerabilities using various scanning and enumeration techniques.
  • Learn to perform penetration testing using advanced hacking tools and methodologies.
  • Develop a practical understanding of how hackers exploit system and application weaknesses.
  • Acquire knowledge about various security threats such as malware, social engineering, and denial-of-service attacks.
  • Understand cryptography concepts and its role in information security.
  • Learn how to protect systems, networks, and applications against potential security breaches.
  • Develop incident response skills for effective handling of security incidents.
  • Understand legal and ethical considerations related to ethical hacking and penetration testing.
  • Gain insights into current security trends and emerging threats.

Course Outline

Introduction to Ethical Hacking

  • Defining ethical hacking and its role in cybersecurity.
  • Understanding the various types of hackers: black hat, white hat, and grey hat.
  • Exploring the phases of hacking methodologies and the legal landscape.
  • The importance of information security policies and standards.

Footprinting and Reconnaissance

  • Using Google hacking techniques to gather information.
  • Exploring website footprinting techniques.
  • Network scanning using Nmap, Shodan, and other tools.
  • Identifying network infrastructure and target systems.
  • Gathering information on DNS, routing, and system configurations.

Scanning Networks

  • Performing port scanning to detect open ports.
  • Identifying live hosts and operating systems.
  • Vulnerability scanning using tools like Nessus and OpenVAS.
  • Performing network mapping and topology discovery.
  • Analyzing scan results and identifying potential weaknesses.

Enumeration

  • Enumerating user accounts and groups.
  • Gathering network resource information.
  • Enumerating Windows and Linux based systems
  • Using SNMP, SMTP, and other protocols for enumeration.
  • Identifying shared folders and services.

Vulnerability Analysis

  • Understanding common vulnerabilities and weaknesses.
  • Categorizing vulnerabilities according to their severity.
  • Analyzing vulnerabilities for impact and exploitability.
  • Understanding the CVE database and exploiting security gaps.
  • Performing static and dynamic analysis.

System Hacking

  • Understanding password cracking techniques.
  • Exploring privilege escalation on windows and linux systems
  • Understanding rootkits, backdoors and other malware.
  • Covering tracks after gaining access to a system.
  • Understanding and applying various system exploitation techniques

Malware Threats

  • Understanding various types of malware: viruses, worms, trojans, and ransomware.
  • Analyzing malware behavior and characteristics.
  • Detecting malware using security tools and techniques.
  • Understanding malware propagation and infection vectors.
  • Malware prevention and protection strategies.

Sniffing

  • Understanding network sniffing techniques.
  • Using tools like Wireshark for network traffic analysis.
  • Capturing and analyzing network packets.
  • Identifying sensitive data transmitted over the network.
  • Protecting networks against sniffing attacks.

Social Engineering

  • Understanding the principles of social engineering.
  • Exploring different types of social engineering attacks.
  • Performing social engineering penetration testing.
  • Creating social engineering awareness programs.
  • Protecting yourself and others against social engineering attacks.

Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)

  • Understanding the concept of DoS and DDoS attacks.
  • Exploring various DoS and DDoS attack techniques.
  • Protecting systems and networks against DoS/DDoS attacks.
  • Using tools to analyze DoS/DDoS attacks
  • Implementing prevention strategies.

Session Hijacking

  • Understanding session hijacking mechanisms.
  • Exploring different session hijacking techniques.
  • Protecting systems against session hijacking attacks.
  • Implementing secure session management practices.
  • Using tools for session hijacking analysis

Hacking Web Servers

  • Understanding web server vulnerabilities.
  • Identifying web server configuration issues.
  • Performing web server exploitation techniques.
  • Protecting web servers from attacks.
  • Webserver hardening and security controls.

Hacking Web Applications

  • Understanding web application vulnerabilities like SQL injection and Cross-Site Scripting (XSS).
  • Exploring different web application attack techniques.
  • Performing web application penetration testing.
  • Identifying security issues with web application frameworks.
  • Implementing secure coding practices.

SQL Injection

  • Understanding the mechanics of SQL injection attacks.
  • Exploring different SQL injection techniques.
  • Preventing SQL injection vulnerabilities.
  • Using SQL injection tools for testing.
  • Testing for vulnerabilities related to SQL injection

Wireless Network Hacking

  • Understanding various wireless standards and protocols.
  • Identifying wireless network vulnerabilities.
  • Exploring wireless hacking techniques.
  • Protecting wireless networks from unauthorized access
  • Using tools to perform wireless network assessment

Hacking Mobile Platforms

  • Understanding mobile platform vulnerabilities.
  • Exploring mobile application attack techniques.
  • Performing mobile penetration testing.
  • Protecting mobile devices and data from unauthorized access.
  • Understanding permissions and authorization

Cryptography

  • Understanding cryptographic concepts.
  • Exploring different encryption algorithms.
  • Implementing cryptographic solutions.
  • Exploring digital signatures and certificates.
  • Understanding Hash functions

Cloud Computing

  • Understanding cloud computing concepts.
  • Exploring cloud vulnerabilities and security best practices.
  • Identifying security issues with cloud service providers.
  • Protecting cloud environments.
  • Using security controls specific to cloud infrastructure

Penetration Testing

  • Performing practical penetration tests in real-world scenarios.
  • Understanding and applying different penetration testing methodologies.
  • Reporting and documenting penetration test results.
  • Analyzing penetration testing tools.
  • Post-penetration remediation processes.

Incident Response

  • Understanding the incident response process.
  • Developing incident response plans and procedures.
  • Identifying and analyzing security incidents.
  • Implementing containment and eradication strategies.
  • Post-incident recovery and analysis

Course Values and Benefits

The CEH certification is a highly recognized credential in the cybersecurity industry. The practical experience gained in this course gives students a significant advantage over others in the field. Participants will not only learn how to identify and exploit vulnerabilities, but also understand the legal and ethical implications of such actions. This training enhances the ability to proactively safeguard organizations from a variety of cyber threats and build robust security programs. With the demand for security professionals consistently increasing, individuals holding the CEH certification are highly sought-after and often qualify for lucrative careers in this rapidly evolving sector. The skills acquired in this course are invaluable for those seeking a career in cybersecurity, as they provide a comprehensive view of offensive security practices and strategies.

Course Features

Honorary Certification

Receive a recognized certificate before completing the course.

Expert Coaching

Have an expert instructor guide you through your learning journey.

Featured Video

Skip ads and enjoy hand-picked videos relevant to the course.

Pricing Plans

Currency

Sign in to change your currency
Starter Bundle Image

Starter

$0.0/day

Start with the basics and earn your certification.

Enroll Now
Instant Cert Bundle Image

Instant Cert

$100.0/day

Grants temporary certification upon enrollment.

Enroll Now
Skill Growth Bundle Image

Skill Growth

$225.0/day

Expand your knowledge and advance your skills.

Enroll Now
Masterclass Bundle Image

Masterclass

$325.0/day

Achieve mastery with exclusive learning and top connections.

Enroll Now

I'm not ready to enroll?

Help us understand what’s holding you back, so we can serve you better.

Sign in to enroll and start your certification.

Discussion Forum


Join the discussion!

No comments yet. Sign in to share your thoughts and connect with fellow learners.

Frequently Asked Questions

For detailed information about our Certified Ethical Hacker (CEH) course, including what you’ll learn and course objectives, please visit the "About This Course" section on this page.

The course is online, but you can select Networking Events at enrollment to meet people in person. This feature may not always be available.

The course doesn't have a fixed duration. It has 20 questions, and each question takes about 5 to 30 minutes to answer. You’ll receive your certificate once you’ve answered most of the questions. Learn more here.

The course is always available, so you can start at any time that works for you!

We partner with various organizations to curate and select the best networking events, webinars, and instructor Q&A sessions throughout the year. You’ll receive more information about these opportunities when you enroll. This feature may not always be available.

You will receive a Certificate of Excellence when you score 75% or higher in the course, showing that you have learned about the course.

An Honorary Certificate allows you to receive a Certificate of Commitment right after enrolling, even if you haven’t finished the course. It’s ideal for busy professionals who need certification quickly but plan to complete the course later.

The price is based on your enrollment duration and selected features. Discounts increase with more days and features. You can also choose from plans for bundled options.

Choose a duration that fits your schedule. You can enroll for up to 7 days at a time.

No, you won't. Once you earn your certificate, you retain access to it and the completed exercises for life, even after your subscription expires. However, to take new exercises, you'll need to re-enroll if your subscription has run out.

To verify a certificate, visit the Verify Certificate page on our website and enter the 12-digit certificate ID. You can then confirm the authenticity of the certificate and review details such as the enrollment date, completed exercises, and their corresponding levels and scores.



Can't find answers to your questions?

How to Get Certified

Enroll in the Course


Click the Enroll button to view the pricing plans.
There, you can choose a plan or customize your enrollment by selecting your preferred features, duration, and applying any coupon codes.
Once selected, complete your payment to access the course.

Complete the Course


Answer the certification questions by selecting a difficulty level:
Beginner: Master the material with interactive questions and more time.
Intermediate: Get certified faster with hints and balanced questions.
Advanced: Challenge yourself with more questions and less time

Earn Your Certificate


To download and share your certificate, you must achieve a combined score of at least 75% on all questions answered.