CEHv11

CEHv11 Training provided by gicseh training institute in noida

Beginner 0(0 Ratings) 0 Students enrolled
Created by gicseh training institute staff Last updated Tue, 17-May-2022 English


CEHv11 free videos and free material uploaded by gicseh training institute staff .

Syllabus / What will i learn?

Module 1: - Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
Module 2: - Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
Module 3: - Performing network scans, host and port discovery by utilizing different scanning tools
Module 4: - Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
Module 5: - Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
Module 6: - Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
Module 7: - Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
Module 8: - Packet sniffing concepts, techniques, and protection against the same.
Module 9: - Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
Module 10: - Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
Module 11: - Security solutions like firewall, IPS, honeypots, their evasion, and protection
Module 12: - Web server and web application-based attacks, methodologies
Module 13: - SQL injection, hijacking, and evasion techniques
Module 14: - Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
Module 15: - Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
Module 16: - Operational Technology (OT) essentials and threats
Module 17: - attack methodologies and attack prevention. The concept of OT is a new addition.
Module 18: - Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
Module 19: - Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
Module 20: - Cloud computing, threats and security, essentials of container technology and serverless computing



Curriculum for this course
0 Lessons 00:00:00 Hours
+ View more
Description
You need online training / explanation for this course?

1 to 1 Online Training contact instructor for demo :


+ View more

Other related courses
About the instructor
  • 0 Reviews
  • 0 Students
  • 52 Courses
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews

Material price :

Free

1:1 Online Training Fee: 10000 /-
Contact instructor for demo :