Certified Ethical Hacker (CEH) V12
Duration
5 Days
Exam Details
- Number of Questions: 125
- Test Duration: 4 Hours
- Test Format: Multiple Choice Questions
- Test Delivery: ECC EXAM, VUE
- Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
Price
The C|EH® v12 training program covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.”
Key Outcomes:
After this course you will:
- Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
- Learn different network scanning techniques and countermeasures.
- Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
- Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
- Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
- etc
Objectives
- Module 1 Introduction to Ethical Hacking
- Module 2 Foot Printing and Reconnaissance
- Module 3 Scanning Networks
- Module 4 Enumeration
- Module 5 Vulnerability Analysis
- Module 6 System Hacking
- Module 7 Malware Threats
- Module 8 Sniffing
- Module 9 Social Engineering
- Module 10 Denial-of-Service
- Module 11 Session Hijacking
- Module 12 Evading IDS, Firewalls, and Honeypots
- Module 13 Hacking Web Servers
- Module 14 Hacking Web Applications
- Module 15 SQL Injection
- Module 16 Hacking Wireless Networks
- Module 17 Hacking Mobile Platforms
- Module 18 IoT and OT Hacking
- Module 19 Cloud Computing
- Module 20 Cryptography
Contact
- Nurman (+62 857-2375-3840)
- Irna (+62 822-1664-7749)
- Puji (+62 813-2424-2115)