Course information

Certified Ethical Hacker Certification Course Outline

Module 1: Introduction to Ethical Hacking

  • Elements of Information Security
  • Cyber Kill Chain Methodology
  • MITRE ATT&CK Framework
  • Hacker Classes
  • Ethical Hacking
  • Information Assurance (IA)
  • Risk Management
  • Incident Management
  • PCI DSS
  • HIPPA
  • SOX
  • GDPR

Module 2: Foot Printing and Reconnaissance

  • Foot printing
  • Advanced Google Hacking Techniques
  • Deep and Dark Web Foot printing
  • Competitive Intelligence Gathering
  • Website Foot printing
  • Website Mirroring
  • Email Foot printing
  • Whose Lookup
  • DNS Foot printing
  • Traceroute Analysis
  • Foot printing Tools

Module 3: Scanning Networks

  • Network Scanning
  • Host Discovery Techniques
  • Port Scanning Techniques
  • Service Version Discovery
  • OS Discovery
  • Banner Grabbing
  • OS Fingerprinting
  • Packet Fragmentation
  • Source Routing
  • IP Address Spoofing
  • Scanning Tools

Module 4: Enumeration

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • Enumeration Tools

Module 5: Vulnerability Analysis

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • Enumeration Tools

Module 6: System Hacking

  • Password Cracking
  • Password Attacks
  • Wire Sniffing
  • Password-Cracking Tools
  • Vulnerability Exploitation
  • Buffer Overflow
  • Privilege Escalation
  • Privilege Escalation Tools
  • Keylogger
  • Spyware
  • Anti-Keyloggers
  • Anti-Spyware
  • Rootkits
  • Anti-Rootkits
  • Steganography
  • Steganography Tools
  • Steganalysis
  • Steganography Detection Tools
  • Maintaining Persistence
  • Post Exploitation
  • Clearing Logs
  • Covering Tracks
  • Track-Covering Tools

Module 7: Malware Threats

  • Malware
  • Components of Malware
  • APT
  • Trojan
  • Types of Trojans
  • Exploit Kits
  • Virus
  • Virus Lifecycle
  • Types of Viruses
  • Ransomware
  • Computer Worms
  • File less Malware
  • Malware Analysis
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Virus Detection Methods
  • Trojan Analysis
  • Virus Analysis
  • File less Malware Analysis
  • Anti-Trojan Software
  • Antivirus Software
  • File less Malware Detection Tools

Module 8: Sniffing

  • Network Sniffing
  • Wiretapping
  • MAC Flooding
  • DHCP Starvation Attack
  • ARP Spoofing Attack
  • ARP Poisoning
  • ARP Poisoning Tools
  • MAC Spoofing
  • STP Attack
  • DNS Poisoning
  • DNS Poisoning Tools
  • Sniffing Tools
  • Sniffer Detection Techniques
  • Promiscuous Detection Tools

Module 9: Social Engineering

  • Social Engineering
  • Types of Social Engineering
  • Phishing
  • Phishing Tools
  • Insider Threats/Insider Attacks
  • Identity Theft

Module 10: Denial-of-Service

  • DoS Attack
  • DDoS Attack
  • Botnets
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Tools
  • DoS/DDoS Attack Detection Techniques
  • DoS/DDoS Protection Tools

Module 11: Session High jacking

  • Session Hijacking
  • Types of Session Hijacking
  • Spoofing
  • Application-Level Session Hijacking
  • Man-in-the-Browser Attack
  • Client-side Attacks
  • Session Replay Attacks
  • Session Fixation Attack
  • CRIME Attack
  • Network Level Session Hijacking
  • TCP/IP Hijacking
  • Session Hijacking Tools
  • Session Hijacking Detection Methods
  • Session Hijacking Prevention Tools

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection System (IDS)
  • Intrusion Prevention System (IPS)
  • Firewall
  • Types of Firewalls
  • Honeypot
  • Intrusion Detection Tools
  • Intrusion Prevention Tools
  • IDS Evasion Techniques
  • Firewall Evasion Techniques
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Detection Tools

Module 13: Hacking Web Servers

  • Web Server Operations
  • Web Server Attacks
  • DNS Server Hijacking
  • Website Defacement
  • Web Cache Poisoning Attack
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Web Server Security Tools
  • Patch Management
  • Patch Management Tools

Module 14: Hacking Web Applications

  • Web Application Architecture
  • Web Application Threats
  • OWASP Top 10 Application Security Risks – 2021
  • Web Application Hacking Methodology
  • Web API
  • Webhooks
  • Web Shell
  • Web API Hacking Methodology
  • Web Application Security

Module 15: SQL Injection

  • SQL Injection
  • Types of SQL injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Signature Evasion Techniques
  • SQL Injection Detection Tools

Module 16: Hacking Wireless Networks

  • Wireless Terminology
  • Wireless Networks
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Encryption Cracking
  • WEP/WPA/WPA2 Cracking Tools
  • Bluetooth Hacking
  • Bluetooth Threats
  • Wi-Fi Security Auditing Tools
  • Bluetooth Security Tools

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • OWASP Top 10 Mobile Risks
  • App Sandboxing
  • SMS Phishing Attack (SMiShing)
  • Android Rooting
  • Hacking Android Devices
  • Android Security Tools
  • Jailbreaking iOS
  • Hacking iOS Devices
  • iOS Device Security Tools
  • Mobile Device Management (MDM)
  • OWASP Top 10 Mobile Controls
  • Mobile Security Tools

Module 18: IoT and OT Hacking

  • IoT Architecture
  • IoT Communication Models
  • OWASP Top 10 IoT Threats
  • IoT Vulnerabilities
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Security Tools
  • IT/OT Convergence (IIOT)
  • ICS/SCADA
  • OT Vulnerabilities
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • OT Security Tools

Module 19: Cloud Computing

  • Cloud Computing
  • Types of Cloud Computing Services
  • Cloud Deployment Models
  • Fog and Edge Computing
  • Cloud Service Providers
  • Container
  • Docker
  • Kubernetes
  • Serverless Computing
  • OWASP Top 10 Cloud Security Risks
  • Container and Kubernetes Vulnerabilities
  • Cloud Attacks
  • Cloud Hacking
  • Cloud Network Security
  • Cloud Security Controls
  • Cloud Security Tools

Module 20: Cryptography

  • Cryptography
  • Encryption Algorithms
  • MD5 and MD6 Hash Calculators
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attacks
  • Key Stretching

Show moredowndown

Who should attend this Certified Ethical Hacker Certification Course?

This CEH Course is ideal for individuals aiming to deepen their understanding and practical skills in the art of ethical hacking. It is particularly beneficial for the following professionals:

  • Cyber Red Team Operator
  • System Administrators
  • Cybersecurity Analysts
  • IT Managers and Directors
  • Information Security Engineer
  • Network Architects
  • CND Cyber Analyst

Prerequisites of the Certified Ethical Hacker Certification Course

There are no formal prerequisites to attend this CEH Course. 

Certified Ethical Hacker Certification Course Overview

An Ethical Hacker is a skilled professional who understands how to look for weaknesses in target systems and use that knowledge to assess the security posture of a target system. The importance of Ethical Hackers continue to grow as they provide an essential service in securing systems from nefarious activities.

IT professionals such as Network Administrators, Cybersecurity Analysts, and Security Consultants can greatly benefit from attending this C|EH Training. By gaining advanced Ethical Hacking skills, these professionals can better identify and mitigate security vulnerabilities within their organisations.

The Knowledge Academy’s 5-day Certified Ethical Hacker Certification Course will help delegates learn the skills required to perform effective Ethical Hacking operations. This training will be conducted by our highly professional and skilled trainer, who has years of experience in teaching.

Course Objectives

  • To understand the latest hacking tools, techniques, and methodologies used by cybercriminals
  • To conduct comprehensive network scanning and enumeration
  • To analyse vulnerabilities and perform effective Ethical Hacking
  • To identify and mitigate malware and other malicious software
  • To understand and apply ethical hacking to mobile and IoT devices
  • To develop skills in evading IDS, firewalls, and honeypots

After attending this training, delegates will be equipped with the knowledge to identify vulnerabilities across a variety of operating systems and effectively exploit these vulnerabilities to test system defences.

Show moredowndown

What’s included in this Certified Ethical Hacker Certification Course?

  • Certified Ethical Hacker Certification Examination [312-50 (ECC EXAM), 312-50 (VUE)]
  • World-Class Training Sessions from Experienced Instructors
  • Certified Ethical Hacker (CEH) Certificate
  • Digital Delegate Pack

Why choose us

Our New Delhi venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

New Delhi is one of the districts within Delhi, as well as it being the capital city of India, it is also the home to the Government of the National Capital Territory of Delhi and some of the branches of the Government of India, these being the judiciary, executive and legislative branches and is also home to around 249,998 people. The capital of India - New Delhi was initiated within 1931 by Viceroy Lord Irwin however formed during 1911 by George V, who was the King of the United Kingdom as well as the Emperor of India and his British architects Sir Herbert Baker and Sir Edwin Lutyens formed the foundation stone and announced the capital city of India would be changed. The primary schools and secondary schools within New Delhi are either run privately or by the government and as of 2004 to 2005 there was around 1.5 million students going through the educational system within 2416 primary schools, 822,00 students in 715 middle schools and 669,000 students in 1576 secondary schools and around 500,000 students within 165 universities and colleges. All universities are either state, deemed or central universities, The top universities within New Delhi are the Jamia Millia Islamia, the University of Delhi, Indian Statistical Institute, National Law University, Jawaharlal Nehru University, Guru Gobind Singh Indraprastha University, Ambedkar University Delhi, Jamia Hamdard, Delhi Technological University – which is the first Engineering college within Delhi and one of the oldest in India, the Indira Gandhi National Open University is the largest national university in the world with over 4 million students, New Delhi is also home to the Indian Agricultural Research Institute, Pusa, New Delhi, Premier institute for agricultural research and education in India. The university courses and programs can offer different types of degrees such an undergraduate and post graduate courses, Bachelor courses and Scholarships, New Delhi prides itself on its premier institutions as the teaching and researching they do means that within 2011 the census recorded the literacy rate for females as 80.9% and for males it was slightly higher at 91.0% with an overall literacy rate of 86.3%. Subjects within the different universities can include, social sciences, engineering, humanities, technology, sports, law, social work, arts, management, education, computer information technology, foreign languages, mathematical science, dentistry and medical. 

Show moredown

Address

Pioneer Institute of Education and Computer Studies
F322/A, 3rd Floor
Adarsh House (Above PNB Bank)
Old MB Road
Lado Sarai
New Delhi
110030

T: +91 8037244591

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Ethical Hacker Certification Course in New Delhi. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Certified Ethical Hacker Certification Course in New Delhi, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Experience the most sought-after learning style with The Knowledge Academy's Certified Ethical Hacker Certification Course in New Delhi. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Certified Ethical Hacker Certification Course in New Delhi sessions.

best_trainers

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

value_for_money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy's In-house/Onsite at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Certified Ethical Hacker Certification Course in New Delhi FAQs

Please arrive at the venue at 8:45am.
We are able to provide support via phone & email prior to attending, during and after the course.
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
This course is [ ] day(s)
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
The training fees for Certified Ethical Hacker Certification certification in New Delhi starts from INR549995
The Knowledge Academy is the Leading global training provider for Certified Ethical Hacker Certification.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on EC – Council Certification Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +91 8037244591 and speak to our training experts, we should be able to help you with your requirements.

cross

OUR BIGGEST SPRING SALE!

Special Discounts

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.