CEH Course Syllabus
-
Introduction to Ethical Hacking
Overview of ethical hacking concepts and legal aspects.
-
Footprinting and Reconnaissance
Information gathering techniques including OSINT and social engineering.
-
Scanning Networks
Network scanning techniques and tools for identifying IPs, ports, and vulnerabilities.
-
Enumeration
Extracting usernames, groups, and shared resources from networks.
-
Vulnerability Analysis
Identifying and assessing vulnerabilities in systems and applications.
-
System Hacking
Exploiting system vulnerabilities and escalating privileges.
-
Malware Threats
Understanding malware types including viruses, worms, and ransomware.
-
Sniffing
Capturing and analyzing network traffic and data packets.
-
Social Engineering
Manipulating individuals to divulge confidential information.
-
Denial-of-Service (DoS)
Conducting DoS and DDoS attacks, impacts, and defenses.
-
Session Hijacking
Hijacking web sessions and mitigating such attacks.
-
Evading IDS, Firewalls, and Honeypots
Bypassing security systems and analyzing their vulnerabilities.
-
Hacking Web Servers
Attacking and securing web server environments.
-
Hacking Web Applications
Exploiting web app vulnerabilities and understanding security controls.
-
SQL Injection
Exploiting SQL vulnerabilities and preventing SQL injection attacks.
-
Hacking Wireless Networks
Compromising Wi-Fi networks and securing wireless infrastructures.
-
Hacking Mobile Platforms
Mobile OS vulnerabilities, security policies, and defense mechanisms.
-
IoT Hacking
Securing IoT devices and exploring related threats and vulnerabilities.
-
Cloud Computing
Cloud security, risks, and hacking techniques specific to cloud environments.
-
Cryptography
Encryption algorithms, digital signatures, and cryptographic attacks.