Bluescripts IT Institute | Web Development | Python | Programming | Coding School | 3D | IELTS | Graphics | Digital Marketing| Biogas | Solar Energy | Gate Automation Training

info@bluescript.org

08156774029

 

EC-Council’s Certified Ethical Hacker (CEH) exam tests students on their knowledge of five ethical hacking stategs (Reconnaissance, Gaining Access, Enumeration, Maintaining Access, Covering Your Tracks), various attack vectors and preventative countermeasures.

CEH course helps scholars learn to cover their associations and strengthen their security controls in order to minimize the threat of a vicious attack.
As EC- Council countries, “ to catch a hacker, you need to suppose as one; ” also, the CEH credential is designed to give professionals the capability to apply the same knowledge and methodologies as vicious hackers, but lawfully legitimately. Bluescripts IT Institute offer you the best training in all information security training of which CEH is one

Course Content

  • 1,Introduction to Ethical Hacking
  • 2.Footprinting and Reconnaissance
  • 3.Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • .Hacking Web Applications
  • SQL Injection
  • .Hacking Wireless Networks
  • .Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography

Learning Objectives

  1. Introduction to Ethical Hacking
  2. Hacking Laws
  3. Foot printing
  4. Google Hacking
  5. Scanning
  6. Enumeration
  7. System Hacking
  8. Trojans and Backdoors
  9. Viruses and Worms
  10. Sniffers
  11. Social Engineering
  12. Phishing
  13. Hacking Email Accounts
  14. Denial of Service
  15. Session Hijacking
  16. Hacking Webservers
  17. Web Application Vulnerabilities
  18. Web Based Password Cracking Techniques
  19. SQL Injection
  20. Hacking Wireless Networks
  21. Physical Security
  22. Linux Hacking
  23. Evading IDS, Honeypots and Firewalls
  24. Buffer Overflows
  25. Cryptography
  26. Penetration Testing Methodologies