CEHv11 Training provided by gicseh training institute in noida
CEHv11 free videos and free material uploaded by gicseh training institute staff .
Module 1: - Ethical hacking concepts, cyber kill chain
concepts, an overview of information security, security controls, and various
laws and regulations related to information security.
Module 2: - Footprinting concepts and methodologies and utilizing
footprinting tools along with the countermeasures
Module 3: - Performing network scans, host and port discovery by
utilizing different scanning tools
Module 4: - Enumeration techniques that now includes NFS enumeration and
related tools, DNS cache snooping, and DNSSEC Zone walking along with the
countermeasures
Module 5: - Concepts of vulnerability assessment, its types, and
solutions along with a hands-on experience of industrial tools used
Module 6: - Phases of system hacking, attacking techniques to obtain,
escalate, and maintain access on victim along with covering tracks.
Module 7: - Malware threats, analysis of various viruses, worms and
trojans like Emotet and battling them to prevent data. APT and Fileless Malware
concepts have been introduced to this domain.
Module 8: - Packet sniffing concepts, techniques, and protection against
the same.
Module 9: - Social engineering concepts and related terminologies like
identity theft, impersonation, insider threats, social engineering techniques,
and countermeasures
Module 10: - Denial of Service (DoS) and Distributed Denial of Service
(DDoS) attacks, use cases, and attack and defence tools
Module 11: - Security solutions like firewall, IPS, honeypots, their
evasion, and protection
Module 12: - Web server and web application-based attacks, methodologies
Module 13: - SQL injection, hijacking, and evasion techniques
Module 14: - Wireless encryption, wireless hacking, and Bluetooth
hacking-related concepts
Module 15: - Mobile device management, mobile platform attack
vectors, and vulnerabilities related to Android and iOS systems
Module 16: - Operational Technology (OT) essentials and threats
Module 17: - attack methodologies and attack prevention. The concept
of OT is a new addition.
Module 18: - Recognizing the vulnerabilities in IoT and ensuring the
safety of IoT devices
Module 19: - Encryption algorithms, Public Key Infrastructure (PKI),
cryptographic attacks, and cryptanalysis
Module 20: - Cloud computing, threats and security, essentials of
container technology and serverless computing
Write a public review