About the Course
The C|EH® training programme consists of 20 modules that cover a variety of technologies, tactics, and procedures, giving aspiring ethical hackers the fundamental skills they need to succeed in the cybersecurity industry. The 12th version of the C|EH® is still being updated to reflect the most recent operating systems, exploits, tools, and techniques. It is delivered through a carefully designed training schedule that typically lasts five days. The training program’s concepts are split equally between knowledge-based instruction and practical application using our cyber range. Step-by-step labs carried out in a virtualized environment with live targets, live tools, and vulnerable systems support every tactic discussed in training. Every participant will receive extensive hands-on practise learning and applying their knowledge thanks to our lab technology.
Eligibility for Certification
This ethical hacking course is for network security officers, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, and other personnel in associated computer support and information technology departments.
Pre-requisites:
Learners need to possess an undergraduate degree or a high school diploma.
Learning Outcomes
- Reconnaissance and Footprinting
- Malware Analysis
- Wireless Network Security
- IDS, Firewalls and honeypots Mobile,
- IoT and Web Security
- Vulnerability Assessment
Outcome
This CEH course at Tsaaro Academy will make you an expert in the following skills, among many others:
- Advanced concepts of hacking
- Firewalls, IDS, and Honeypot
- Advanced-level log management
- Analysis of network packets
- Backdoors and Trojans
- System hacking and more.
-
Who should take this course?
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- Information Security Analyst 1
- Security Analyst L1
- Infosec Security Administrator
- Cybersecurity Analyst level 1, level 2, & level 3
- Network Security Engineer
- SOC Security Analyst
- Cyber Defense Analyst
- Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
Module 01 – Introduction to Ethical Hacking
Lesson 01 – Information Security Overview
Lesson 02 – Information Security Threats and Attack Vectors
Lesson 06 – Penetration Testing Concepts
Lesson 03 – Hacking Concepts
Lesson 04 – Ethical Hacking Concepts
Lesson 05 – Information Security Controls
Lesson 07 – Information Security Laws and Standards
Module 02 – Footprinting and Reconnaissance
Lesson 01 – Footprinting Concepts
Lesson 02 – Footprinting through Search Engines
Lesson 03 – Footprinting through Web Services
Lesson 04 – Footprinting through Social Networking Sites
Lesson 05 – Website Footprinting
Lesson 06 – Email Footprinting
Lesson 07 – Competitive Intelligence
Lesson 08 – Whois Footprinting
Lesson 09 – DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11- Footprinting through Social Engineering
Lesson 12 – Footprinting Tools
Lesson 13 – Countermeasures
Lesson 14 – Footprinting Pen Testing
Module 03 – Scanning Networks
Lesson 01 – Network Scanning Concepts
Lesson 02 – Scanning Tools
Lesson 03 – Scanning Techniques
Lesson 04 – Scanning Beyond IDS and Firewall
Lesson 05 – Banner Grabbing
Lesson 06 – Draw Network Diagrams
Lesson 07 – Scanning Pen Testing.
Module 04 – Enumeration
Lesson 01 – Enumeration Concepts
Lesson 02 – NetBIOS Enumeration
Lesson 03 – SNMP Enumeration
Lesson 04 – LDAP Enumeration
Lesson 05 – NTP Enumeration
Lesson 06 – SMTP Enumeration and DNS Enumeration
Lesson 07 – Enumeration Countermeasures
Lesson 08 – Other Enumeration Techniques
Lesson 09 – Enumeration Pen Testing
Module 05 – Vulnerability Analysis
Lesson 01 – Vulnerability Assessment Concepts
Lesson 02 – Vulnerability Assessment Solutions
Lesson 03 – Vulnerability Scoring Systems
Lesson 04 – Vulnerability Assessment Tools
Lesson 05 – Vulnerability Assessment Reports
Module 06 – System Hacking
Lesson 01 – System Hacking Concepts
Lesson 02 – Cracking Passwords
Lesson 03 – Escalating Privileges
Lesson 04 – Executing Applications
Lesson 05 – Hiding Files
Lesson 06 – Covering Tracks
Lesson 07 – Penetration Testing.
Module 07 – Malware Threats
Lesson 01 – Malware Concepts
Lesson 02 – Trojan Concepts
Lesson 03 – Virus and Worm Concepts
Lesson 04 – Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware Software
Lesson 07- Malware Penetration Testing
Module 08 – Sniffing
Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing
Module 09- Social Engineering
Lesson 01 – Social Engineering Concepts
Lesson 02 – Social Engineering Techniques
Lesson 03- Insider Threats
Lesson 04 – Impersonation on Social Networking Sites
Lesson 05 – Identity Theft
Lesson 06 – Countermeasures
Lesson 07 – Social Engineering Penetration Testing
Module 10- Denial-of-Service
Lesson 01 – DoS/DDoS Concepts
Lesson 02 – DoS/DDoS Attack Techniques
Lesson 03 – Botnets
Lesson 04 – DDoS Case Study
Lesson 05 – DoS/DDoS Attack Tools
Lesson 06 – Countermeasures
Lesson 07 – DoS/DDoS Protection Tools
Lesson 08 – DoS/DDoS Attack Penetration Testing
Module 11- Session Hijacking
Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing
Module 12 – Evading IDS, Firewalls, and Honeypots
Lesson 01- IDS, Firewall, and Honeypot Concepts
Lesson 02- IDS, Firewall, and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots
Lesson 07- IDS/Firewall Evasion Countermeasures
Lesson 08- Penetration Testing
Module 13- Hacking Web Servers
Lesson 01- Web Server Concepts
Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing
Module 14- Hacking Web Applications
Lesson 01 – Web App Concepts
Lesson 02 – Web App Threats
Lesson 03 – Hacking Methodology
Lesson 04 – Web Application Hacking Tools
Lesson 05 – Countermeasures
Lesson 06 – Web App Security Testing Tools
Lesson 07 – Web App Pen Testing
Module 15- SQL Injection
Lesson 01 – SQL Injection Concepts
Lesson 02 – Types of SQL Injection
Lesson 03 – SQL Injection Methodology
Lesson 04 – SQL Injection Tools
Lesson 05 – Evasion Techniques
Lesson 06 – Countermeasures
Module 16- Hacking Wireless Networks
Lesson 01 – Wireless Concepts
Lesson 02 – Wireless Encryption
Lesson 03 – Wireless Threats
Lesson 04 – Wireless Hacking Methodology
Lesson 05 – Wireless Hacking Tools
Lesson 06 – Bluetooth Hacking
Lesson 07 – Countermeasures
Lesson 08 – Wireless Security Tools
Lesson 09 – Wi-Fi Pen Testing
Module 17- Hacking Mobile Platforms
Lesson 01- Mobile Platform Attack Vectors
Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools
Lesson 07- Mobile Pen Testing
Module 18- IoT Hacking
Lesson 01- IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing
Module 19- Cloud Computing
Lesson 01 – Cloud Computing Concepts
Lesson 02 – Cloud Computing Threats
Lesson 03 – Cloud Computing Attacks
Lesson 04 – Cloud Security
Lesson 05 – Cloud Security Tools
Lesson 06 – Cloud Penetration Testing
Module 20- Cryptography
Lesson 01- Cryptography Concepts
Lesson 02- Encryption Algorithms
Lesson 03- Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)
Lesson 05- Email Encryption
Lesson 06- Disk Encryption
Lesson 07- Cryptanalysis
Lesson 08- Countermeasures
Course Delivery Format
- 4 Live practical sessions with case studies
- 2 Recorded lectures
- Instructor-led online training
Refund and Cancellation Policy
Our refund policy is quite simple. You can write your refund request at info@tsaaroacademy.com. You are eligible for a full refund if you cancel the course 2 weeks before the course commencement date. You are eligible for a 50% refund if you cancel the course within 2 weeks prior to the course commencement date. There shall not be any refund provided on or after the course commencement date.
Confirmation & Reservation
When registration is confirmed, participants will receive our email confirmation along with information of the course programme.If no seats are available for the applied date, you will be notified immediately and given an alternative date.
Tsaaro Academy reserves the right to change the course schedules, programmes and content without prior notice. We also reserve the right to cancel course due to unforeseen circumstances.
Trainers & Consultants
Renowned Industry Experts providing best hands-on training