Professional Documents
Culture Documents
Orientation Slides
Orientation Slides
Orientation slides
Introduction
• The course provides a hands-on learning experience with over 220 challenge-based labs and the CyberQ platform,
which is a cloud-based cyber range that simulates real-world scenarios 31.
• The course also engages you with real-world ethical hacking assignments and global challenges with C|EH Engage,
which is a program that allows you to hack a real organization with their consent and get feedback from experts 31.
• The course will show you some examples of how to perform common attacks such as:
• Footprinting: gathering information about a target using passive or active methods31.
• Scanning: discovering open ports, services, and vulnerabilities on a target using tools like Nmap or Nessus31.
• Enumeration: extracting more information about a target’s network resources, users, groups, etc., using tools like SNMP or
NetBIOS31.
• Vulnerability analysis: identifying and prioritizing the weaknesses and risks on a target using tools like OpenVAS or Nikto31.
• System hacking: exploiting the vulnerabilities on a target to gain access, escalate privileges, execute commands, etc., using tools li
ke Metasploit or Hydra
31
.
• Malware threats: creating and deploying malicious software such as viruses, worms, trojans, ransomware, etc., using tools like Vei
l-Evasion or Shellter
31.
• Sniffing: capturing and analyzing network traffic using tools like Wireshark or Ettercap31.
• Social engineering: manipulating human behavior to obtain information or access using techniques like phishing, baiting,
pretexting, etc., using tools like SET or Gophish