Certified Ethical Hacking Course - CEH v12

Enroll Now
⭐ 4.7 Ratings
960 Learners

What Will You Get To Learn In This Certified Ethical Hacking Course by NVidya?

  • Firewalls, IDS, & Honeypot
  • Advanced concepts of Hacking
  • Advanced-level log management
  • Backdoors and Trojans
  • Analysis of network packets
  • System hacking

Key Features

  • 40 hours of Instructor-led training
  • 24 hours of self-paced training
  • One year access
  • Mentor support
  • Training completion certificate

Career Benefits of Certified Ethical Hacking Course - CEH v12

The Certified Ethical Hacking Course by NVidya helps you understand the advanced processes. In this training course, you'll master advanced network packet analysis & system penetration testing techniques to build your network security skill-set and prevent hackers effectively. You'll also access certified expert professionals who guide you throughout your training journey.

Self Paced / Live Virtual

$2299

Eligibility for CEH Certification - Certified Ethical Hacking Course

This ethical hacking course is ideal for professionals involved in IT and cybersecurity roles, including network security officers, system administrators, IS/IT analysts, auditors, IT operations managers, security officers, application developers, cybersecurity consultants, and other related roles within IT support and infrastructure.

Prerequisites

To enroll, learners should hold a high school diploma or undergraduate degree and have at least two years of experience in IT security. All participants must agree to EC-Council’s exam policies and code of ethics to proceed with certification.

Course Content: CEH Certification - Certified Ethical Hacking Course

Module 01 – Introduction to Ethical Hacking
Lesson 01 – Information Security Overview
  • 1.01 Demo of Aspen and iLabs
  • 1.02 Internet is an Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
  • 1.03 Essential Terminology
  • 1.04 Elements of Information Security
  • 1.05 The Security, Functionality, and Usability Triangle
  • 2.01 Motives, Goals, and Objectives of Information Security Attacks
  • 2.02 Top Information Security Attack Vectors
  • 2.03 Information Security Threat Categories
  • 2.04 Types of Attacks on a System
  • 2.05 Information Warfare
  • 3.01 What is Hacking?
  • 3.02 Who is a Hacker?
  • 3.03 Hacker Classes
  • 3.04 Hacking Phases
  • 4.01 What is Ethical Hacking?
  • 4.02 Why Ethical Hacking is Necessary
  • 4.03 Scope and Limitations of Ethical Hacking
  • 4.04 Skills of an Ethical Hacker
  • 5.01 Information Assurance (IA)
  • 5.02 Information Security Management Program
  • 5.03 Enterprise Information Security Architecture (EISA)
  • 5.04 Network Security Zoning
  • 5.05 Defense in Depth
  • 5.06 Information Security Policies
  • 5.07 Physical Security
  • 5.08 What is Risk?
  • 5.09 Threat Modeling
  • 5.10 Incident Management
  • 5.11 Security Incident and Event Management (SIEM)
  • 5.12 User Behavior Analytics (UBA)
  • 5.13 Network Security Controls
  • 5.14 Identity and Access Management (IAM)
  • 5.15 Data Leakage
  • 5.16 Data Backup
  • 5.17 Data Recovery
  • 5.18 Role of AI/ML in Cybersecurity
  • 6.01 Penetration Testing
  • 6.02 Why Penetration Testing
  • 6.03 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • 6.04 Blue Teaming/Red Teaming
  • 6.05 Types of Penetration Testing
  • 6.06 Phases of Penetration Testing
  • 6.07 Security Testing Methodology
  • 7.01 Payment Card Industry Data Security Standard (PCI-DSS)
  • 7.02 ISO/IEC 27001:2013
  • 7.03 Health Insurance Portability and Accountability Act (HIPAA)
  • 7.04 Sarbanes-Oxley Act (SOX)
  • 7.05 The Digital Millennium Copyright Act (DMCA)
  • 7.06 Federal Information Security Management Act (FISMA)
  • 7.07 Cyber Law in Different Countries
  • 1.01 What is Footprinting?
  • 1.02 Objectives of Footprinting
  • 2.01 Footprinting through Search Engines
  • 2.02 Footprinting using Advanced Google Hacking Techniques
  • 2.03 Information Gathering Using Google Advanced Search and Image Search
  • 2.04 Google Hacking Database
  • 2.05 VoIP and VPN Footprinting through Google Hacking Database
  • 3.01 Finding Company’s Top-level Domains (TLDs) and Sub-domains
  • 3.02 Finding the Geographical Location of the Target
  • 3.03 People Search on Social Networking Sites and People Search Services
  • 3.04 Gathering Information from LinkedIn
  • 3.05 Gather Information from Financial Services
  • 3.06 Footprinting through Job Sites
  • 3.07 Monitoring Target Using Alerts
  • 3.08 Information Gathering Using Groups, Forums, and Blogs
  • 3.09 Determining the Operating System
  • 3.10 VoIP and VPN Footprinting through SHODAN

4.01 Collecting Information through Social Engineering on Social Networking Sites

  • 5.01 Website Footprinting
  • 5.02 Website Footprinting using Web Spiders
  • 5.03 Mirroring Entire Website
  • 5.04 Extracting Website Information from archive.org
  • 5.05 Extracting Metadata of Public Documents
  • 5.06 Monitoring Web Pages for Updates and Changes
  • 6.01 Tracking Email Communications
  • 6.02 Collecting Information from Email Header
  • 6.03 Email Tracking Tools
  • 7.01 Competitive Intelligence Gathering
  • 7.02 Competitive Intelligence – When Did This Company Begin? How Did It Develop?
  • 7.03 Competitive Intelligence – What Are the Company's Plans?
  • 7.04 Competitive Intelligence – What Expert Opinions Say About the Company
  • 7.05 Monitoring Website Traffic of Target Company
  • 7.06 Tracking Online Reputation of the Target
  • 8.01 Whois Lookup
  • 8.02 Whois Lookup Result Analysis
  • 8.03 Whois Lookup Tools
  • 8.04 Finding IP Geolocation Information
  • 9.01 Extracting DNS Information
  • 9.02 DNS Interrogation Tools
  • 10.01 Locate the Network Range
  • 10.02 Traceroute
  • 10.03 Traceroute
  • 10.04 Traceroute Tools

Certified Ethical Hacking Course - CEH v12 Projects

Testing Purpose Project

Testing Purpose Project

Improvement of Auditing in the Restaurant1

Improvement of Auditing in the Restaurant

Exam & Certification FAQs

What are the various job roles available after finishing the certification?
  • Penetration tester
  • Network security specialist
  • Ethical hacker
  • Site Administrator
  • Security consultant
  • Auditor
  • Network Engineer
  • Security analyst

This CEH certification training course will ensure you acquire all the skills to become an ethical hacker and create a fruitful career in the IT industry. Most IT organizations have made CEH an essential qualification to apply for security-related openings. CEH-certified professionals earn much higher than non-certified professionals.

 

You do not need to meet any explicit criteria to sign up for this Ethical Hacking Course at NVidya, but having prior knowledge in any programming language and networking will be beneficial.

You can take the CEH exam not more than five times in 12 months.

Yes, It is ethical to learn Ethical Hacking.

  • Self-paced training
  • Online Classroom
  • Corporate training
  • Instructor-led training

Yes, you can.

With NVidya, you'll never miss a class. You'llYou'll have a recording even if you have missed a live class. Furthermore, you can also attend the same lecture in the next batch.

All the instructors at NVidya are practitioners from the Industry with a minimum of 10-12 yrs of relevant IT experience. They are subject matter experts trained by NVidya to provide an incredible learning experience to the participants.

CERTIFICATE FOR Certified Ethical Hacking Course - CEH v12
THIS CERTIFICATE IS AWARDED TO
Your Name
FOR SUCCESSFUL PARTICIPATION IN
Certified Ethical Hacking Course - CEH v12
Issued By NVidya
Certificate ID __________
Date __________

Success Stories

Success Stories 2
Success Stories 2
Success Stories 2
Industry: Success Stories 2

“Success Stories 2”

Success Stories 2

Success Stories 3
Success Stories 3
Success Stories 3
Industry: Success Stories 3

“Success Stories 3”

Success Stories 3

Why Choose This Program?

Enhance your knowledge about risks and vulnerabilities and essential for penetration testers

Attract a high-paying job and improve your security career

Learn to use hacking tools