Certified Ethical Hacker
Certified Ethical Hacker
About Course
This Certified Ethical Hacker (CEH) course provides a thorough understanding of ethical hacking phasesDescription
Ethical Hacking – Learn Penetration Testing, Cybersecurity with Advanced
Ethical Hacking Techniques and Methods will introduce you to the concept
of hacking, and further, give you a deeper understanding of ethical hacking.
The book aims to teach you the process of the penetration testing lifecycle
using the most powerful tool available to an ethical hacker: Kali Linux. The
chapter will take you through the different types of hackers in the world, their
motive for hacking, and how a regular user can avoid being a target of
hackers
What Will I Learn?
- Basics of Ethical Hacking techniques
- Understanding computer networks and security
- Footprinting and reconnaissance methods
- System hacking and password cracking
- Web application security testing
- Wireless network hacking basics
- Malware and cryptography concepts
- Ethical hacking using Kali Linux tools
- Applications of Ethical Hacking in industries
- Real-world projects in penetration testing, vulnerability assessment, etc.
Topics for this course
5 Lessons250h
Unit-I Introduction to Ethical Hacking and Cyber Laws – 8 Hours
Introduction to InfoSec & Cybersecurity Basics (2 hrs): Understand the fundamentals of information security,
common terminologies, and objectives of cybersecurity.- Types of Hackers & Ethical Hacking Phases (2 hrs): Differentiate between white hat, black hat, and grey hat
hackers; learn the five key phases of hacking.- Key Concepts: Threats, Vulnerabilities, Risks (1 hr): Explore how vulnerabilities are exploited and how
threats can be mitigated.- Cyber Laws & IT Act (2 hrs): Learn about Indian cyber laws, the IT Act 2000, and compliance requirements.- Case Studies & Industry Examples (1 hr): Examine real-world ethical hacking scenarios and outcomes.
Introduction to Python and Computer Programming
Unit-II Footprinting, Reconnaissance & Scanning – 10 Hours
Reconnaissance Methods (2 hrs): Understand the concepts of active and passive information gathering.- WHOIS, Google Hacking, Social Engineering (2 hrs): Learn open-source intelligence (OSINT) techniques.- Network Scanning (2 hrs): Explore tools like Nmap and Netdiscover to scan live hosts.- Vulnerability and Port Scanning (2 hrs): Learn techniques to scan open ports and known vulnerabilities.- Identifying Open Ports & Services (2 hrs): Discover how attackers find exploitable services
Unit-III System Hacking and Malware Threats – 10 Hours
Password Cracking & Privilege Escalation (2 hrs): Learn tools and techniques for cracking passwords and
elevating privileges.- Keylogging & Spyware Tools (2 hrs): Study surveillance software and counter-detection measures.- Malware Types & Lifecycle (2 hrs): Explore viruses, worms, Trojans, and their behavior.- Buffer Overflow Concepts (2 hrs): Understand stack-based buffer overflows and exploitation strategies.- Countermeasures and System Hardening (2 hrs): Learn best practices to defend against system hacking
Unit-IV Network, Web, and Wireless Hacking – 12 Hours
Sniffing, DoS, Spoofing (3 hrs): Use tools like Wireshark to analyze traffic and simulate DoS attacks.- Session Hijacking, MITM (2 hrs): Learn how session data can be intercepted or altered.- Web App Vulnerabilities (3 hrs): Explore common web-based attacks including SQLi, XSS, and CSRF.- Wi-Fi Attacks & Protocol Cracking (3 hrs): Study wireless encryption protocols and how to crack them.- Rogue AP & Evil Twin Concepts (1 hr): Simulate rogue access points and phishing for cred
Unit-V Cryptography, Cloud Security & Countermeasures – 10 Hours
Basics of Cryptography (2 hrs): Understand symmetric/asymmetric encryption and use cases.- Hashing & Digital Signatures (2 hrs): Explore message integrity with MD5, SHA-256, and PKI.- Cryptanalysis Techniques (1 hr): Learn to break weak cryptographic systems.- Cloud Models & Security Challenges (2 hrs): Learn risks and security mechanisms in cloud services.- Firewalls, IDS/IPS & Security Policies (3 hrs): Explore enterprise-grade security mechanisms and policy
writing
About the instructor
3 Courses
0 students