Professional Documents
Culture Documents
Certified Ethical Hacker v12
Certified Ethical Hacker v12
The C|EH v12 also equips aspiring cybersecurity professionals with the tactics,
techniques, and procedures (TTPs) to build ethical hackers who can uncover weaknesses
in nearly any type of target system before cybercriminals do.
• Security Analyst L1
•
• Cybersecurity Consultant
1300 TO TRAIN • Infosec Security Administrator
Outcomes
With over 220 hands-on labs conducted in our cyber range environment, you will have
the opportunity to practice every learning objective on live machines and vulnerable
targets in the course. Pre-loaded with over 3,500 hacking tools and various operating
ttttttt
For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Course Outline CEH-12 Visit us on the web at www.advancedtraining.com.au
Version 1.0 September 2022
Course Outline
systems, you will gain unprecedented exposure and hands-on experience with the most
common security tools, latest vulnerabilities, and widely used operating systems in the
industry. Our range is web accessible, making it easier for you to learn and practice from
anywhere.Perform footprinting and reconnaissance using the latest footprinting
techniques and tools as a critical pre-attack phase required in ethical hacking.
What’s Covered:
• 100% virtualization for a complete learning experience
• After login, you will have full access to preconfigured targets, networks, and the
attack tools necessary to exploit them:
o Pre-configured vulnerable websites
o Vulnerable, unpatched operating systems
o Fully networked environments
o 3,500+ hacking tools
o And much more
• Wide range of target platforms to hone your skills
• 519 attack techniques
• Objective-oriented flags for critical thinking and applied knowledge assessment
• Cloud-based cyber range
Course Details
Code: CEH-12
Duration: 5 days
Starting time: 9.00am
Finishing time: 5.00pm
Booking guidelines
Contact our learning consultants on 1300 86 87246 and we will assist you with your
booking.
1300 86 87246
1300 TO TRAIN
ttttttt
For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Course Outline CEH-12 Visit us on the web at www.advancedtraining.com.au
Version 1.0 September 2022
Course Outline
➢ Module 01 Introduction to Ethical • Escalating Privileges
• Maintaining Access
Hacking • Clearing Logs
• Information Security Overview
• Hacking Methodologies and Frameworks
• Hacking Concepts ➢ Module 07 Malware Threats
• Ethical Hacking Concepts • Malware Concepts
• Information Security Controls • APT Concepts
• Information Security Laws and Standards • Trojan Concepts
• Virus and Worm Concepts
• Fileless Malware Concepts
➢ Module 02 Footprinting and • Malware Analysis
Reconnaissance • Malware Countermeasures
• Footprinting Concepts • Anti-Malware Software
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites ➢ Module 08 Sniffing
• Website Footprinting • Sniffing Concepts
• Email Footprinting • Sniffing Technique: MAC Attacks
• Whois Footprinting • Sniffing Technique: DHCP Attacks
• DNS Footprinting • Sniffing Technique: ARP Poisoning
• Network Footprinting • Sniffing Technique: Spoofing Attacks
• Footprinting through Social Engineering • Sniffing Technique: DNS Poisoning
• Footprinting Tools • Sniffing Tools
• Footprinting Countermeasures • Sniffing Countermeasures
For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Visit us on the web at www.advancedtraining.com.au
Course Outline
• IDS/Firewall Evading Tools • OT Attack Countermeasures
• Detecting Honeypots
• IDS/Firewall Evasion Countermeasures ➢ Module 19 Cloud Computing
• Cloud Computing Concepts
➢ Module 13 Hacking Web Servers • Container Technology
• Web Server Concepts • Serverless Computing
• Web Server Attacks • Cloud Computing Threats
• Web Server Attack Methodology • Cloud Hacking
• Web Server Attack Countermeasures • Cloud Security
• Patch Management
➢ Module 20 Cryptography
➢ Module 14 Hacking Web Applications • Cryptography Concepts
• Web Application Concepts • Encryption Algorithms
• Web Application Threats • Cryptography Tools
• Web Application Hacking Methodology • Public Key Infrastructure (PKI)
• Web API, Webhooks, and Web Shell • Email Encryption
• Web Application Security • Disk Encryption
• Cryptanalysis
• Cryptography Attack Countermeasures
➢ Module 15 SQL Injection
• SQL Injection Concepts
• Types of SQL Injection ➢ Appendix A: Ethical Hacking Essential
• SQL Injection Methodology Concepts – I
• SQL Injection Tools • Operating System Concepts
• Evasion Techniques • File Systems
• SQL Injection Countermeasures • Computer Network Fundamentals
• Basic Network Troubleshooting
➢ Module 16 Hacking Wireless Networks • Virtualization
• Wireless Concepts • Network File System (NFS)
• Wireless Encryption • Web Markup and Programming Languages
• Wireless Threats • Application Development Frameworks and Their
• Wireless Hacking Methodology Vulnerabilities
• Wireless Hacking Tools • Web Subcomponents
• Bluetooth Hacking • Database Connectivity
• Wireless Attack Countermeasures
• Wireless Security Tools ➢ Appendix B: Ethical Hacking Essential
Concepts – II
➢ Module 17 Hacking Mobile Platforms • Information Security Controls
• Mobile Platform Attack Vectors • Network Segmentation
• Hacking Android OS • Network Security Solutions
• Hacking iOS • Data Leakage
• Mobile Device Management • Data Backup
• Mobile Security Guidelines and Tools • Risk Management Concepts
• Business Continuity and Disaster Recovery
➢ Module 18 IoT and OT Hacking • Cyber Threat Intelligence
• IoT Hacking • Threat Modeling
• IoT Concepts • Penetration Testing Concepts
• IoT Attacks • Security Operations
• IoT Hacking Methodology • Forensic Investigation
• IoT Attack Countermeasures • Software Development Security
• OT Hacking • Security Governance Principles
• OT Concepts • Asset Management and Security
• OT Attacks
• OT Hacking Methodology
For more information about any of our training courses, contact our Learning Consultants
on 1300 86 87246 or email us on info@advancedtraining.com.au
Visit us on the web at www.advancedtraining.com.au