Certified Ethical Hacker (CEH) v12 eBook (Volumes 1 through 4) + ECC Exam Voucher (Onsite)
Important Discount Information:
___
This purchase includes Automatic Exam Eligibility and an Official EC-Council exam voucher!
As an academic student, when purchasing this bundle you completely bypass the standard exam eligibility process. You are no longer required to apply to attempt an EC-Council exam, submit an application, pay an application fee, list references, or prove work experience. This is all waived once you purchase EC-Council's official and authorized content!
Platforms
eBook:
- Vital Source Bookshelf (https://bookshelf.vitalsource.com/)
- ASPEN (aspen.eccouncil.org)
Exam Voucher:
- ECC Exam Voucher (https://www.eccexam.com/)
Course Outline
- Module 01: Introduction to Ethical Hacking
- Module 02: Footprinting and Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
- Module 06: System Hacking
- Module 07: Malware Threats
- Module 08: Sniffing
- Module 09: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Course Description
The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.
This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
About the Exam
Exam Title: CEHExam Code: 312-50
Number of Questions: 125
Duration: 4 Hours
Availability: ECC Exam
Test Format: Multiple Choice Questions