Curriculum

18 Topics
Elements of Information Security
Classification of Attacks
Hacker Classes
Ethical Hacking
Al-Driven Ethical Hacking
ChatGPT-Powered Al Tools for Ethical Hackers
CEH Ethical Hacking Framework
Cyber Kill Chain Methodology
MITRE ATT&CK Framework
Information Assurance (IA)
Risk Management
Threat Intelligence Lifecycle
Incident Management
PCI DSS
HIPPA
SOX
GDPR
DPA

12 Topics
Reconnaissance
Footprinting Using Advanced Google Hacking Techniques
Footprinting through People Search Services
Dark Web Footprinting
Competitive Intelligence Gathering
Footprinting through Social Networking Sites
Whois Footprinting
DNS Footprinting
Traceroute Analysis
Email Footprinting
Footprinting through Social Engineering
Al-Powered OSINT Tools

9 Topics
Network Scanning
Scanning Tools
Host Discovery Techniques
Port Scanning Techniques
Host Discovery and Port Scanning with Al
Service Version Discovery OS
Discovery/Banner Grabbing
Scanning Beyond IDS and Firewall
Scanning Detection and Prevention

16 Topics
Enumeration
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
NFS Enumeration
SMTP Enumeration
DNS Cache Snooping
DNSSEC Zone Walking
IPsec Enumeration
VoIP Enumeration
RPC Enumeration
Unix/Linux User Enumeration
SMB Enumeration
Enumeration using Al
Enumeration Countermeasures

7 Topics
Vulnerability Classification
Vulnerability Scoring Systems and Databases
Vulnerability-Management Life Cycle
Vulnerability Research Vulnerability Scanning and Analysis
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Al-Powered Vulnerability Assessment Tools

23 Topics
Password Cracking
Password Attacks
Password-Cracking Tools
Vulnerability Exploitation
Metasploit Framework
Al-Powered Vulnerability Exploitation Tools
Buffer Overflow
Buffer Overflow Detection Tools
Active Directory (AD) enumeration
Privilege Escalation
Privilege Escalation Tools
Executing Applications
Keylogger
Spyware
Rootkits
Steganography
Steganalysis
Steganography Detection Tools
Maintaining Persistence
Linux and Windows Post Exploitation
Covering Tracks
Clearing Logs
Track-Covering Tools

15 Topics
Malware
Advanced Persistent Threat Lifecycle
Trojan
Virus
Ransomware
Computer Worms
Fileless Malware
Al-based Malware
Malware Analysis
Static Malware Analysis
Dynamic Malware Analysis
Virus Detection Methods
Malware Countermeasures
Anti-Trojan Software
Al-Powered Malware Detection and Analysis Tools

13 Topics
Network Sniffing
MAC Flooding
DHCP Starvation Attack
ARP Spoofing
ARP Spoofing/Poisoning Tools
MAC Spoofing
VLAN Hopping
STP Attack
DNS Poisoning Techniques
DNS Poisoning Tools
Sniffing Tools
Sniffer Detection Techniques
Promiscuous Detection Tools

11 Topics
Social Engineering
Types of Social Engineering
Human-based Social Engineering Techniques
Impersonation
Computer-based Social Engineering Techniques
Phishing & its Tools
Perform Impersonation using Al
Identity Theft
Mobile-based Social Engineering Techniques
Social Engineering Countermeasures
Anti-Phishing Toolbar

8 Topics
DoS Attack
DDoS Attack
Botnets
DoS/DDoS Attack Techniques
DoS/DDoS Attack Toolkits
DoS/DDoS Attack Detection Techniques
DoS/DDoS Protection Tools
DoS/DDoS Protection Services

12 Topics
Session Hijacking
Application-Level Session Hijacking
Compromising Session IDs
Session Hijacking
Network-Level Session Hijacking
TCP/IP Hijacking
RST Hijacking
Blind Hijacking
Session Hijacking Tools
Session Hijacking Detection Methods
Session Hijacking Detection Tools
Approaches to Prevent Session Hijacking

13 Topics
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Firewall
Types of Firewalls
Intrusion Detection Tools
Intrusion Prevention Tools
IDS/Firewall Evasion Techniques
NAC and Endpoint Security Evasion Techniques
IDS/Firewall Evading Tools
Honeypot
Types of Honeypots
Honeypot Tools
IDS/Firewall Evasion Countermeasures

13 Topics
Web Server Architecture
Web Server Vulnerabilities
Web Server Attack
DNS Server Hijacking
Web Cache Poisoning Attack
Web Server Footprinting/Banner Grabbing
Directory Brute Forcing
Vulnerability Scanning
Web Server Password Hacking
Web Server Attack Tools
Web Server Attack Countermeasures
Detecting Web Server Hacking Attempts
Web Server Security Tools

17 Topics
Web Application
OWASP Top 10 Application Security Risks - 2021
Web Application Attacks
Footprint Web Infrastructure
Analyze Web Applications
Bypass Client-side Controls
Attack Access Controls
Attack Web Services
Web API
Webhooks
Web API Hacking Methodology
API Security Risks and Solutions
Web Application Security Testing
Web Application Fuzz Testing
Encoding Schemes
Web Application Attack Countermeasures
Web Application Security Testing Tools

14 Topics
SQL Injection
Types of SQL Injection
Error Based SQL Injection
Union SQL Injection
Blind/Inferential SQL Injection
SQL Injection Methodology
Information Gathering and SQL Injection Vulnerability Detection
Launch SQL Injection Attacks
Advanced SQL Injection
SQL Injection Tools
SQL Injection with Al
Evasion Techniques
SQL Injection Countermeasures
SQL Injection Detection Tools

11 Topics
Wireless Networks
Wireless Standards
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wi-Fi Discovery
Wireless Traffic Analysis
Launch of Wireless Attacks
Wi-Fi Encryption Cracking
Wireless Attack Countermeasures
Wi-Fi Security Auditing Tools

18 Topics
OWASP Top 10 Mobile Risks - 2024
Anatomy of a Mobile Attack
App Sandboxing Issues
SMS Phishing Attack (SMiShing)
Call Spoofing
OTP Hijacking/Two-Factor Authentication Hijacking
Camera/Microphone Capture Attacks
Android Rooting
Hacking Android Devices
Android Hacking Tools
Android Security Tools
Jailbreaking iOS
Hacking iOS Devices
iOS Device Security Tools
Mobile Device Management (MDM)
OWASP Top 10 Mobile Risks and Solutions
Mobile Security Guidelines
Mobile Security Tools

17 Topics
IoT Architecture
IoT Technologies and Protocols
OWASP Top 10 IoT Threats
loT Vulnerabilities
lot Threats
loT Attacks
IoT Hacking Methodology
loT Hacking Tools
IoT Security Tools
IT/OT Convergence (IIOT)
OT Technologies and Protocols
OT Vulnerabilities
OT Threats
OT Attacks
OT Hacking Methodology
OT Hacking Tools
OT Security Tools

20 Topics
Cloud Computing
Fog Computing
Edge Computing
Container
Docker
Kubernetes
Serverless Computing
OWASP Top 10 Cloud Security Risks
Cloud Computing Threats
Container Vulnerabilities
Kubernetes Vulnerabilities
Cloud Attacks
Cloud Hacking Methodology
AWS Hacking
Microsoft Azure Hacking
Google Cloud Hacking
Container Hacking
Cloud Network Security
Cloud Security Controls
Cloud Security Tools

17 Topics
Cryptography
Ciphers
Symmetric Encryption Algorithms
Asymmetric Encryption Algorithms
Quantum Cryptography
Cryptography Tools
Public Key Infrastructure (PKI)
Signed Certificate
Digital Signature
Email Encryption
Disk Encryption
Blockchain
Cryptanalysis Methods
Cryptography Attacks
Attacks on Blockchain
Quantum Computing Attacks
Cryptanalysis Tools

  Write a Review

CEH Certification - Certified Ethical Hacking Course

Go to Paid Course