User Tools

Site Tools


products:ict:security:ceh:ceh_course_outline

The Certified Ethical Hacker (CEH) certification is designed to validate individuals' skills in understanding and identifying vulnerabilities in computer systems and networks, using the same tools and techniques as a malicious hacker, but with the intention of securing the systems rather than exploiting them. The course outline for the CEH typically covers the following topics:

Introduction to Ethical Hacking: This section provides an overview of ethical hacking, including its principles, methodologies, and the legal and ethical considerations involved.

Footprinting and Reconnaissance: It covers gathering information about the target system or network, such as finding domain names, network ranges, and employee information, to better understand the potential attack surface.

Scanning Networks: This section focuses on scanning networks to identify live hosts, open ports, and services running on those ports. It also includes techniques for network mapping and fingerprinting.

Enumeration: Enumeration involves extracting more detailed information about the target systems, such as user accounts, shares, and resources available on the network.

Vulnerability Analysis: It covers identifying and assessing vulnerabilities in systems and networks, including using automated tools and manual techniques to exploit them.

System Hacking: This section delves into techniques for gaining unauthorized access to systems, including password cracking, privilege escalation, and backdoors.

Malware Threats: It covers different types of malware, including viruses, worms, Trojans, and rootkits, as well as techniques for analyzing and combating malware.

Sniffing: This section focuses on intercepting and analyzing network traffic to capture sensitive information, such as passwords and account credentials.

Social Engineering: It covers psychological manipulation techniques used to trick people into divulging confidential information or performing actions that compromise security.

Denial of Service (DoS): This section explores techniques for disrupting or disabling the normal functioning of systems or networks, making them unavailable to legitimate users.

Session Hijacking: It covers hijacking active sessions to gain unauthorized access to systems or networks, including techniques such as session fixation and session replay attacks.

Evading IDS, Firewalls, and Honeypots: This section focuses on techniques for bypassing intrusion detection systems (IDS), firewalls, and honeypots to avoid detection during attacks.

Web Application Hacking: It covers vulnerabilities commonly found in web applications, such as SQL injection, cross-site scripting (XSS), and command injection.

Wireless Network Hacking: This section explores vulnerabilities in wireless networks, including techniques for cracking Wi-Fi passwords and exploiting misconfigurations.

Cryptography: It covers cryptographic concepts and techniques, including encryption algorithms, digital signatures, and cryptographic attacks.

The CEH course typically includes hands-on labs and exercises to provide practical experience with the tools and techniques covered in the curriculum. Upon completing the course and passing the CEH exam, individuals demonstrate their proficiency in ethical hacking and become certified ethical hackers.

products/ict/security/ceh/ceh_course_outline.txt · Last modified: 2024/03/09 19:00 by wikiadmin