Certified Ethical Hacking Training Course
Learn from the Best, Learn from TopD
Features of This Course
Why Choose Certified Ethical Hacking Course?
TopD Learning’s Certified Ethical Hacker certification course provides the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it.
This ethical hacking course is aligned with the latest CEH v11 by EC-Council and will adequately prepare you to increase your blue team skills, allowing you to defend against malicious hackers and prevent breaches in security that could expose your company’s privileged information.
Course Curriculum
In this course module, you will learn the following topics:
Topics:
- Information Security Overview
- Information Security Threats & Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Penetration Testing Concepts
- Information Security Laws and Standards
In this course module, you will learn the following topics:
Topics:
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Competitive Intelligence
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Countermeasures
Footprinting Pen Testing
In this course module, you will learn the following topics:
Topics:
- Network Scanning Concepts
- Scanning Tools
- Scanning Techniques
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Draw Network Diagrams
- Scanning Pen Testing
In this course module, you will learn the following topics:
Topics:
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
- Enumeration Pen Testing
In this course module, you will learn the following topics:
Topics:
- Vulnerability Assessment Concepts
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
In this course module, you will learn the following topics:
Topics:
- System Hacking Concepts
- Cracking Passwords
- Escalating Privileges
- Executing Applications
- Hiding Files
- Covering Tracks
- Penetration Testing
In this course module, you will learn the following topics:
Topics:
- Malware Concepts
- Trojan Concepts
- Virus and Worm Concepts
- Malware Analysis
- Countermeasures
- Anti-Malware Software
- Malware Penetration Testing
In this course module, you will learn the following topics:
Topics:
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Countermeasures
- Sniffing Detection Techniques
- Sniffing Pen Testing
In this course module, you will learn the following topics:
Topics:
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Countermeasures
- Social Engineering Pen Testing
In this course module, you will learn the following topics:
Topics:
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing
In this course module, you will learn the following topics:
Topics:
- Session Hijacking Concepts
- Application Level Session Hijacking
- Network Level Session Hijacking
- Session Hijacking Tools
- Countermeasures
- Penetration Testing
In this course module, you will learn the following topics:
Topics:
- IDS, Firewall and Honeypot Concepts
- IDS, Firewall and Honeypot Solutions
- Evading IDS
- Evading Firewalls
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion
- Countermeasures
- Penetration Testing
In this course module, you will learn the following topics:
Topics:
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Tools
- Countermeasures
- Patch Management
- Web Server Security Tools
- Web Server Pen Testing
In this course module, you will learn the following topics:
Topics:
- Web App Concepts
- Web App Threats
- Hacking Methodology
- Web App Hacking Tools
- Countermeasures
- Web App Security Testing Tools
- Web App Pen Testing
In this course module, you will learn the following topics:
Topics:
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Countermeasures
In this course module, you will learn the following topics:
Topics:
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Wireless Security Tools
Wireless Pen Testing
In this course module, you will learn the following topics:
Topics:
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Spyware
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
In this course module, you will learn the following topics:
Topics:
- IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- IoT Hacking Tools
- Countermeasures
- IoT Pen Testing
In this course module, you will learn the following topics:
Topics:
- Cloud Computing Concepts
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
In this course module, you will learn the following topics:
Topics:
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Countermeasures
CEH Training Course Features
Instructor-led Live Sessions
We use only the finest instructors in the IT industry with good experience. Learn from our instructor and interact live at your desired place via virtual learning programs scheduled to run at specific times.
E-Learning Self-Paced Training
We offer self-paced training programs, which are structured in modules so as to offer maximum flexibility to those who wish to work around their already hectic schedules.
One to One Training
We offer is one to one training as a mode of educational training where you can Interact one to one with the instructor to get a fully focused training experience. It is preferred by students who prefer a personalized approach.
24 x 7 Expert Support
We have a lifetime 24x7 online support team to resolve all your technical queries, through a ticket based tracking system.
Certification
After successfully completing your course & projects, TopD Learning will provide a professional certification for you.
Lifetime Access
You will get lifetime access to our LMS where quizzes, presentations & class recordings are available.
Course Completion Certification
Give your resume a BOOST, and join Top Companies with a good package.
You will receive a course completion certificate post completing all assignments & tasks certifying that you have learned the skills and completed the course successfully.
Frequently Asked Questions
FAQs
CEH certification helps to prove the theoretical background, practical skills, and experience needed by a professional to tightly secure the IT framework of a company.
The CEH exam lasts for four hours and includes 125 multiple-choice questions that a candidate has to answer. The percentage of questions that must be answered correctly is subject to variation and may be more or less than 70 percent.
Here are some updates made to the CEH v11:
- Incorporating Parrot Security OS
- Re-Mapped to NIST/NICE framework
- Enhanced cloud security, IoT, and OT Modules C
- Cloud−based threats