
EC-Council’s Certified Ethical Hacker (CEH) exam tests students on their knowledge of five ethical hacking stategs (Reconnaissance, Gaining Access, Enumeration, Maintaining Access, Covering Your Tracks), various attack vectors and preventative countermeasures.
CEH course helps scholars learn to cover their associations and strengthen their security controls in order to minimize the threat of a vicious attack.
As EC- Council countries, “ to catch a hacker, you need to suppose as one; ” also, the CEH credential is designed to give professionals the capability to apply the same knowledge and methodologies as vicious hackers, but lawfully legitimately. Bluescripts IT Institute offer you the best training in all information security training of which CEH is one

Course Content
- 1,Introduction to Ethical Hacking
- 2.Footprinting and Reconnaissance
- 3.Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- .Hacking Web Applications
- SQL Injection
- .Hacking Wireless Networks
- .Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
Learning Objectives
- Introduction to Ethical Hacking
- Hacking Laws
- Foot printing
- Google Hacking
- Scanning
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
- Social Engineering
- Phishing
- Hacking Email Accounts
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Web Application Vulnerabilities
- Web Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks
- Physical Security
- Linux Hacking
- Evading IDS, Honeypots and Firewalls
- Buffer Overflows
- Cryptography
- Penetration Testing Methodologies