- Module 01: Introduction to Certified Ethical Hacking - CEH v13 AI
- Cover the basics of key issues within the information security world, as well as the fundamentals of ethical hacking, data security controls, relevant laws, and standard procedures.
- Module 02: Foot printing and reconnaissance
- Learn how to use the newest techniques and tools to perform foot printing and reconnaissance, a important pre-attack part of the ethical hacking method.
- Module 03: Scanning Networks
- Learn completely different network scanning techniques and countermeasures.
- Module 04: Enumeration
- Learn various enumeration techniques, like Border gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.
- Module 05: Vulnerability Analysis
- Learn how to spot security loopholes in a target organization’s network, communication infrastructure, and finish systems.
- Module 06: System Hacking
- Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to find system and network vulnerabilities.
- Module 07: Malware Threats
- Get an introduction to the various forms of malware, like Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.
- Module 08: Sniffing
- Learn about packet-sniffing techniques and the way to use them to find network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
- Module 09: Social Engineering
- Learn social engineering concepts and techniques, as well as a way to determine theft makes an attempt, audit human-level vulnerabilities, and recommend social engineering countermeasures.
- Module 10: Denial-of-Service
- Learn about completely different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well because the tools wont to audit a target and devise DoS and DDoS countermeasures and protections.
- Module 11: Session Hijacking
- Understand the various session hijacking techniques wont to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
- Module 12: Evading IDS, Firewalls, and Honeypots
- Get introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools wont to audit a network perimeter for weaknesses; and countermeasures.
- Module 13: Hacking net Servers
- Learn about web server attacks, as well as a comprehensive attack methodology wont to audit vulnerabilities in web server infrastructures and countermeasures.
- Module 14: Hacking web Applications
- Learn about web application attacks, as well as a comprehensive web application hacking methodology wont to audit vulnerabilities in web applications and countermeasures.
- Module 15: SQL Injection
- Learn about SQL injection attack techniques, injection detection tools, and countermeasures to find and defend against SQL injection makes an attempt.
- Module 16: Hacking Wireless Networks
- Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools.
- Module 17: Hacking Mobile Platforms
- Learn about mobile platform attack vectors, android vulnerability exploits, and mobile security pointers and tools.
- Module 18: IoT Hacking
- Learn how to secure and defend net of Things (IoT) and operational technology (OT) devices and possible threats to IoT and OT platforms.
- Module 19: Cloud Computing
- Learn completely different cloud computing ideas, like container technologies and server less computing, numerous cloud-based threats and attacks, and cloud security techniques and tools.
- Module 20: Cryptography
- In the final module, study cryptography and ciphers, public-key infrastructure, cryptography attacks, and cryptanalysis tools.
Note: **The topics said above are only the short blueprint of the syllabus. On the off chance that you feel that we have missed any subject, you can simply come to us and learn it, or simply call us to affirm
Call at 8010911256 | 8485846227 WebAsha Provides Best Online [Live Interactive Class] / Calssroom with practical based hands-on CEH v13 AI Master (Ethical Hacking Exam + CEH Practical Exam) Training and Certification in Pune and near by area. Get Course Details, Certification Cost, Fees, Syllabus, Duration, Batch Timings, Exam Preparation, workshops in Pune, Mumbai, Delhi NCR, Noida, Gurugram (Gurgaon), Hyderabad, Bengaluru (Bangalore), India, UK, USA, UAE, Dubai, Singapore, and Australia