Skip to main content

info@rekhindo.com +62-22-87318234 +62-851-0599-8123

Certified Ethical Hacker (CEH) V12

CEH

Duration

5 Days

Exam Details

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice Questions
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Price

--- Call Us ---

The C|EH® v12 training program covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.”

Key Outcomes:
After this course you will:

  • Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
  • Learn different network scanning techniques and countermeasures.
  • Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
  • Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
  • Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
  • etc

Objectives

  • Module 1 Introduction to Ethical Hacking
  • Module 2 Foot Printing and Reconnaissance
  • Module 3 Scanning Networks
  • Module 4 Enumeration
  • Module 5 Vulnerability Analysis
  • Module 6 System Hacking
  • Module 7 Malware Threats
  • Module 8 Sniffing
  • Module 9 Social Engineering
  • Module 10 Denial-of-Service
  • Module 11 Session Hijacking
  • Module 12 Evading IDS, Firewalls, and Honeypots
  • Module 13 Hacking Web Servers
  • Module 14 Hacking Web Applications
  • Module 15 SQL Injection
  • Module 16 Hacking Wireless Networks
  • Module 17 Hacking Mobile Platforms
  • Module 18 IoT and OT Hacking
  • Module 19 Cloud Computing
  • Module 20 Cryptography

Contact

  • Nurman (+62 857-2375-3840)
  • Irna (+62 822-1664-7749)
  • Puji (+62 813-2424-2115)