Certified Ethical Hacking (CEH)

Ethical Hacker is the world’s most advanced hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.

Instructor: Awais Hassan
Last updated Thu, 09-Jun-2022
+ View more
Course overview

Course Description

Ethical Hacker is the world’s most advanced hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.

The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.

Certificate

On successful completion of the course participants will be awarded participation certificate from DigiPAKISTAN. Also prepare for International Exam.

Duration & Frequency

Total Duration of the course is 3 months                

What will i learn?

  • Ethical hacking and cybersecurity
  • Penetration testing
Requirements
  • Basic computer knowledge
  • The candidates opting for this course are recommended to have a little experience in the field of information technology especially networking.
Curriculum for this course
Introduction
  • Introduction
Introduction to CEH
  • CEH Introduction-2
Foot printing and Reconnaissance
  • What is Footprinting, Objective of Footprinting, Footprinting through search engine.
  • Information gathering through Google Hacking Database, Sublister
  • Information gathering through IP geo Location,Social Media, Job websites, Shodan, Broswer plugings
  • Information gathering through Web siders, Web mirroring,wayback machine
  • Information gathering through Whois, Tracert, DNS Lookup, Social Engineering
Scanning Networks
  • Scanning Networks Concepts, Scanning Tools
  • Scanning Techniques, Scanning Beyond IDS and Firewall
  • LAB Session on Nmap
  • Banner Grabbing, Draw Network Diagram
Enumeration
  • What is enumeration,Different Techniques for Netbios enumeration, Different Techniques for SNMP enumeration,LDAP,NTP and SMTP enumeration
  • Lab Session on Enumeration
Vulnerability Analysis
  • Vulnerability classification, Vulnerability assessment tools, vulnerability assessment phases
  • Vulnerability assessment tools selection, Working of vulnerability assessment tools, CVSS, CVE, Some tools review
  • Vulnerability Assessment Open Source tools
  • Vulnerability Scanning tools
System Hacking
  • System Hacking Concepts
  • Window Passwords
  • Hiding Files , Covering Tracks
CEH zoom class
  • CEH 26 JUNE zoom class PART 1
  • CEH 27 JUNE zoom class PART 2
  • CEH 3 JULY zoom class PART 3
  • CEH zoom class 9 JULY Part 4
Malwares
  • Malwares, Trojans, Virus, Worms
Sniffing
  • Sniffing concepts, techniques and tools
Social Engineering
  • Social Engineering Concept, Techniques and Methods
  • Social Engineering Concept, Techniques and Methods
  • Lab of Social Engineering
Denial of Service
  • DoS Concept, techniques, botnets, case study
  • DoS Concept, techniques, botnets, case study
+ View more
Other related courses
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
About instructor

Awais Hassan

Show full biography
Includes:
  • Verified Certificate
  • Internship Opportunity
  • Career Development