CEH Course Syllabus

  1. Introduction to Ethical Hacking

    Overview of ethical hacking concepts and legal aspects.

  2. Footprinting and Reconnaissance

    Information gathering techniques including OSINT and social engineering.

  3. Scanning Networks

    Network scanning techniques and tools for identifying IPs, ports, and vulnerabilities.

  4. Enumeration

    Extracting usernames, groups, and shared resources from networks.

  5. Vulnerability Analysis

    Identifying and assessing vulnerabilities in systems and applications.

  6. System Hacking

    Exploiting system vulnerabilities and escalating privileges.

  7. Malware Threats

    Understanding malware types including viruses, worms, and ransomware.

  8. Sniffing

    Capturing and analyzing network traffic and data packets.

  9. Social Engineering

    Manipulating individuals to divulge confidential information.

  10. Denial-of-Service (DoS)

    Conducting DoS and DDoS attacks, impacts, and defenses.

  11. Session Hijacking

    Hijacking web sessions and mitigating such attacks.

  12. Evading IDS, Firewalls, and Honeypots

    Bypassing security systems and analyzing their vulnerabilities.

  13. Hacking Web Servers

    Attacking and securing web server environments.

  14. Hacking Web Applications

    Exploiting web app vulnerabilities and understanding security controls.

  15. SQL Injection

    Exploiting SQL vulnerabilities and preventing SQL injection attacks.

  16. Hacking Wireless Networks

    Compromising Wi-Fi networks and securing wireless infrastructures.

  17. Hacking Mobile Platforms

    Mobile OS vulnerabilities, security policies, and defense mechanisms.

  18. IoT Hacking

    Securing IoT devices and exploring related threats and vulnerabilities.

  19. Cloud Computing

    Cloud security, risks, and hacking techniques specific to cloud environments.

  20. Cryptography

    Encryption algorithms, digital signatures, and cryptographic attacks.