Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Course Outline

Certified Ethical Hacker v12


General Description
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating
hundreds of thousands of Certified Ethical Hackers employed by top companies,
militaries, and governments worldwide.
In its 12th version, the Certified Ethical Hacker provides comprehensive training,
handson learning labs, practice cyber ranges for engagement, certification assessments,
cyber competitions, and opportunities for continuous learning into one comprehensive
program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4.
Compete.

Phases of Ethical Hacking


1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering tracks

The C|EH v12 also equips aspiring cybersecurity professionals with the tactics,
techniques, and procedures (TTPs) to build ethical hackers who can uncover weaknesses
in nearly any type of target system before cybercriminals do.

What is NEW in CEH V12?


The C|EH® v12 is a specialized and one-of-a-kind training program to teach you
everything you need to know about ethical hacking with hands-on training, labs,
assessment, a mock engagement (practice), and global hacking competition. Stay on top
of the game with the most in-demand skills required to succeed in the field of
cybersecurity.
The new learning framework covers not only a comprehensive training program to
prepare you for the certification exam but also the industry’s most robust, in-depth,
hands-on lab and practice range experience.
Audience
• Mid-Level Information Security • Cybersecurity Analyst level 1,
Auditor level 2, & level 3
• Cybersecurity Auditor • Network Security Engineer
• Security Administrator • SOC Security Analyst
• IT Security Administrator • Security Analyst
• Cyber Defense Analyst • Network Engineer
• Vulnerability Assessment • Senior Security Consultant
Analyst • Information Security Manager
• Warning Analyst • Senior SOC Analyst
Information Security Analyst 1 Solution Architect
 1300 86 87246 •

• Security Analyst L1

• Cybersecurity Consultant
1300 TO TRAIN • Infosec Security Administrator

Outcomes
With over 220 hands-on labs conducted in our cyber range environment, you will have
the opportunity to practice every learning objective on live machines and vulnerable
targets in the course. Pre-loaded with over 3,500 hacking tools and various operating

ttttttt

For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Course Outline CEH-12 Visit us on the web at www.advancedtraining.com.au
Version 1.0 September 2022
Course Outline
systems, you will gain unprecedented exposure and hands-on experience with the most
common security tools, latest vulnerabilities, and widely used operating systems in the
industry. Our range is web accessible, making it easier for you to learn and practice from
anywhere.Perform footprinting and reconnaissance using the latest footprinting
techniques and tools as a critical pre-attack phase required in ethical hacking.
What’s Covered:
• 100% virtualization for a complete learning experience
• After login, you will have full access to preconfigured targets, networks, and the
attack tools necessary to exploit them:
o Pre-configured vulnerable websites
o Vulnerable, unpatched operating systems
o Fully networked environments
o 3,500+ hacking tools
o And much more
• Wide range of target platforms to hone your skills
• 519 attack techniques
• Objective-oriented flags for critical thinking and applied knowledge assessment
• Cloud-based cyber range

Course Details
Code: CEH-12
Duration: 5 days
Starting time: 9.00am
Finishing time: 5.00pm
Booking guidelines
Contact our learning consultants on 1300 86 87246 and we will assist you with your
booking.

 1300 86 87246
1300 TO TRAIN

ttttttt

For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Course Outline CEH-12 Visit us on the web at www.advancedtraining.com.au
Version 1.0 September 2022
Course Outline
➢ Module 01 Introduction to Ethical • Escalating Privileges
• Maintaining Access
Hacking • Clearing Logs
• Information Security Overview
• Hacking Methodologies and Frameworks
• Hacking Concepts ➢ Module 07 Malware Threats
• Ethical Hacking Concepts • Malware Concepts
• Information Security Controls • APT Concepts
• Information Security Laws and Standards • Trojan Concepts
• Virus and Worm Concepts
• Fileless Malware Concepts
➢ Module 02 Footprinting and • Malware Analysis
Reconnaissance • Malware Countermeasures
• Footprinting Concepts • Anti-Malware Software
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites ➢ Module 08 Sniffing
• Website Footprinting • Sniffing Concepts
• Email Footprinting • Sniffing Technique: MAC Attacks
• Whois Footprinting • Sniffing Technique: DHCP Attacks
• DNS Footprinting • Sniffing Technique: ARP Poisoning
• Network Footprinting • Sniffing Technique: Spoofing Attacks
• Footprinting through Social Engineering • Sniffing Technique: DNS Poisoning
• Footprinting Tools • Sniffing Tools
• Footprinting Countermeasures • Sniffing Countermeasures

➢ Module 03 Scanning Networks ➢ Module 09 Social Engineering


• Network Scanning Concepts • Social Engineering Concepts
• Scanning Tools • Social Engineering Techniques
• Host Discovery • Insider Threats
• Port and Service Discovery • Impersonation on Social Networking Sites
• OS Discovery (Banner Grabbing/OS • Identity Theft
Fingerprinting) • Social Engineering Countermeasures
• Scanning Beyond IDS and Firewall
• Network Scanning Countermeasures ➢ Module 10 Denial-of-Service
• DoS/DDoS Concepts
➢ Module 04 Enumeration • Botnets
• Enumeration Concepts • DoS/DDoS Attack Techniques
• NetBIOS Enumeration • DDoS Case Study
• SNMP Enumeration • DoS/DDoS Attack Countermeasures
• LDAP Enumeration
• NTP and NFS Enumeration ➢ Module 11 Session Hijacking
• SMTP and DNS Enumeration • Session Hijacking Concepts
• Other Enumeration Techniques • Application-Level Session Hijacking
• Enumeration Countermeasures • Network-Level Session Hijacking
• Session Hijacking Tools
➢ Module 05 Vulnerability Analysis • Session Hijacking Countermeasures
• Vulnerability Assessment Concepts
• Vulnerability Classification and Assessment ➢ Module 12 Evading IDS, Firewalls, and
Types Honeypots
• Vulnerability Assessment Tools • IDS, IPS, Firewall, and Honeypot Concepts
• Vulnerability Assessment Reports • IDS, IPS, Firewall, and Honeypot Solutions
• Evading IDS
➢ Module 06 System Hacking • Evading Firewalls
• Gaining Access • Evading NAC and Endpoint Security

For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Visit us on the web at www.advancedtraining.com.au
Course Outline
• IDS/Firewall Evading Tools • OT Attack Countermeasures
• Detecting Honeypots
• IDS/Firewall Evasion Countermeasures ➢ Module 19 Cloud Computing
• Cloud Computing Concepts
➢ Module 13 Hacking Web Servers • Container Technology
• Web Server Concepts • Serverless Computing
• Web Server Attacks • Cloud Computing Threats
• Web Server Attack Methodology • Cloud Hacking
• Web Server Attack Countermeasures • Cloud Security
• Patch Management
➢ Module 20 Cryptography
➢ Module 14 Hacking Web Applications • Cryptography Concepts
• Web Application Concepts • Encryption Algorithms
• Web Application Threats • Cryptography Tools
• Web Application Hacking Methodology • Public Key Infrastructure (PKI)
• Web API, Webhooks, and Web Shell • Email Encryption
• Web Application Security • Disk Encryption
• Cryptanalysis
• Cryptography Attack Countermeasures
➢ Module 15 SQL Injection
• SQL Injection Concepts
• Types of SQL Injection ➢ Appendix A: Ethical Hacking Essential
• SQL Injection Methodology Concepts – I
• SQL Injection Tools • Operating System Concepts
• Evasion Techniques • File Systems
• SQL Injection Countermeasures • Computer Network Fundamentals
• Basic Network Troubleshooting
➢ Module 16 Hacking Wireless Networks • Virtualization
• Wireless Concepts • Network File System (NFS)
• Wireless Encryption • Web Markup and Programming Languages
• Wireless Threats • Application Development Frameworks and Their
• Wireless Hacking Methodology Vulnerabilities
• Wireless Hacking Tools • Web Subcomponents
• Bluetooth Hacking • Database Connectivity
• Wireless Attack Countermeasures
• Wireless Security Tools ➢ Appendix B: Ethical Hacking Essential
Concepts – II
➢ Module 17 Hacking Mobile Platforms • Information Security Controls
• Mobile Platform Attack Vectors • Network Segmentation
• Hacking Android OS • Network Security Solutions
• Hacking iOS • Data Leakage
• Mobile Device Management • Data Backup
• Mobile Security Guidelines and Tools • Risk Management Concepts
• Business Continuity and Disaster Recovery
➢ Module 18 IoT and OT Hacking • Cyber Threat Intelligence
• IoT Hacking • Threat Modeling
• IoT Concepts • Penetration Testing Concepts
• IoT Attacks • Security Operations
• IoT Hacking Methodology • Forensic Investigation
• IoT Attack Countermeasures • Software Development Security
• OT Hacking • Security Governance Principles
• OT Concepts • Asset Management and Security
• OT Attacks
• OT Hacking Methodology

For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Visit us on the web at www.advancedtraining.com.au

You might also like