About Course
What Will You Learn?
- 1. **Introduction to Ethical Hacking**: Understand the principles, ethics, and legal considerations of ethical hacking.
- 2. **Footprinting and Reconnaissance**: Gather information about target systems and networks using passive and active reconnaissance techniques.
- 3. **Scanning and Enumeration**: Identify open ports, services, and vulnerabilities on target systems and enumerate system resources and users.
- 4. **Vulnerability Assessment**: Assess vulnerabilities in systems and applications, prioritize them based on severity and impact.
- 5. **Exploitation Techniques**: Exploit common security vulnerabilities to gain unauthorized access to target systems.
- 6. **Password Cracking and Brute Forcing**: Crack passwords and bypass authentication mechanisms to gain access to systems and accounts.
- 7. **Privilege Escalation**: Escalate privileges on target systems to gain higher levels of access.
- 8. **Post-Exploitation Techniques**: Perform post-exploitation activities to maintain access and evade detection.
- 9. **Wireless Hacking**: Exploit vulnerabilities in wireless networks to gain unauthorized access.
- 10. **Web Application Hacking**: Identify and exploit vulnerabilities in web applications to gain access or extract sensitive information.
- 11. **Social Engineering Attacks**: Conduct social engineering attacks to manipulate human behavior and bypass security controls.
- 12. **Reporting and Documentation**: Document findings, vulnerabilities, and recommendations in comprehensive penetration test reports.
Course Modules
Introduction
-
Understanding the elements of Information Security.
00:00 -
Understanding Information Security Attacks and Information warfare.
00:00 -
Overview of Cyber Kill Chain Methodology, TTP’s and IoC’s.
00:00 -
Overview Of Hacking Concepts, Types and Phases.
00:00 -
Understanding Ethical Hacking Concepts and its Scope
00:00 -
Overview of Information Security Control
00:00 -
Overview of Information Security Acts and Laws
00:00
Foot Printing
-
Understanding Footprinting Concept
00:00 -
Understanding Footprinting Through Search Engines and Advanced Google Hacking Techniques
00:00 -
Understanding Footprinting Through web services and social networking sites
00:00 -
Understanding Website Foot printing and Email Footprinting
00:00 -
Understanding WHOIS, DNS and Network Footprinting
00:00 -
Undedrstanding Footprinting through Social Engineering
00:00 -
Understanding Different Footprinting tools and countermeasures
00:00
Scanning
-
Understanding Network Scanning Concept
00:00 -
Understanding Various Scanning tools
00:00 -
Understanding Various Host Discovery and Port Scanning techniques
00:00 -
Understanding OS Discovery
00:00 -
Understanding various techniques to scan beyond IDS and Firewall
00:00 -
Drawing Network Diagram
00:00
Enumeration
-
Understanding Enumeration Concepts
00:00 -
Understanding Different Techniques for NetBIOS Enumeration
00:00 -
Understanding Different Techniques for SNMP and LDAP Enumeration
00:00 -
Understanding Different Techniques for NTP and NFS Enumeration
00:00 -
Understanding Different Techniques for SMTP and DNS Enumeration
00:00 -
Understanding Other Enumerations such as IPsec, VoIP, RPC, Linux/Unix, Telnet, FTP, TFTP, SMB, IPv6, and BGP enumeration
00:00 -
Understanding Different Enumeration Countermeasures
00:00
Vulnerability Analysis
-
Overview of Vulnerability Research, Vulnerability Assessment, and Vulnerability Scoring Systems
00:00 -
Overview of Vulnerability Management Life Cycle (Vulnerability Assessment Phases)
00:00 -
Understanding Various Types of Vulnerabilities and Vulnerability Assessment Techniques
00:00 -
Understanding Different Approaches of Vulnerability Assessment Solutions
00:00 -
Understanding Different Types of Vulnerability Assessment Tools and Criteria for Choosing Them
00:00 -
Vulnerability Assessment Tools
00:00 -
Generating and Analyzing Vulnerability Assessment Reports
00:00
DCEH Quiz-1
-
Day-1 Quiz
System Hacking
-
Overview of CEH Hacking Methodology
00:00 -
Understanding Techniques to Gain Access to the System
00:00 -
Understanding Privilege Escalation Techniques
00:00 -
Understanding Techniques to Create and Maintain Remote Access to the System
00:00 -
Overview of Different Types of Rootkits
00:00 -
Overview of Steganography and Steganalysis Techniques
00:00 -
Understanding Techniques to Hide the Evidence of Compromise
00:00 -
Understanding Different System Hacking Countermeasures
00:00
Malware Threats
-
Understanding Malware and Malware Propagation Techniques
00:00 -
Understanding Advanced Persistent Threats (APTS) and their Lifecycle
00:00 -
Overview of Trojans, Their Types, and How they Infect Systems
00:00 -
Overview of Viruses, Their Types, and How They Infect Files
00:00 -
Overview of Computer Worms and Fileless Malware
00:00 -
Understanding the Malware Analysis Process
00:00 -
Understanding Different Techniques to Detect Malware
00:00 -
Understanding Different Malware Countermeasures
00:00
Sniffing
-
Overview of Sniffing Concepts
00:00 -
Understanding How to Defend Against Various Sniffing Techniques
00:00 -
Overview of Various Sniffing Tools
00:00 -
Understanding Different Sniffing Countermeasures
00:00 -
Understanding Different Techniques and Tools to Detect Sniffing
00:00
Social Engineering
-
Understanding Social Engineering Concepts
00:00 -
Understanding Various Social Engineering Techniques
00:00 -
Understanding Insider Threats
00:00 -
Understanding Impersonation on Social Networking Sites
00:00 -
Understanding Identity Theft
00:00 -
Understanding Different Social Engineering Countermeasures
00:00 -
Understanding Different Insider Threats and Identity Theft Countermeasures
00:00
DCEH Quiz-2
-
Day-2 Quiz
Denial Of Service
-
Overview of Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
00:00 -
Understanding Different DOS/DDoS Attack Techniques
00:00 -
Understanding the Botnet Network
00:00 -
Understanding Various DoS and DDoS Attack Tools
00:00 -
Understanding Different Techniques to Detect DoS and DDoS Attacks
00:00 -
Understanding Different DOS/DDoS Countermeasures
00:00
Session Hijacking
-
Understanding Session Hijacking Concepts
00:00 -
Understanding Application Level Session Hijacking
00:00 -
Understanding Network Level Session Hijacking
00:00 -
Overview of Session Hijacking Tools
00:00 -
Understanding Different Session Hijacking Countermeasures
00:00
Evading IDS, Firewalls, and Honeypots
-
Understanding IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions
00:00 -
Understanding different Techniques to Bypass IDS
00:00 -
Understanding different Techniques to Bypass Firewalls IDS/Firewall Evading Tools
00:00 -
Understanding different Techniques to Detect Honeypots IDS/Firewall Evasion Countermeasures
00:00
Hacking Web Server
-
Understanding Web Server Concepts
00:00 -
Understanding Web Server Attacks
00:00 -
Understanding Web Server Attack Methodology
00:00 -
Overview of Web Server Attack Tools
00:00 -
Understanding Different Web Server Attack Countermeasures
00:00 -
Understanding Patch Management Concepts
00:00 -
Overview of Web Server Security Tools
00:00
DCEH Quiz-3
-
Day-3 Quiz
Hacking Web Application
-
Understanding Web Application Concepts
00:00 -
Understanding Web Application Threats
00:00 -
Understanding Web Application Hacking Methodology
00:00 -
Overview of Web Application Hacking Tools
00:00 -
Overview of Web APIs, Webhooks, and Web Shell Concepts
00:00 -
Understanding Hacking Web Applications via Web APIs, Webhooks, and Web Shells
00:00 -
Understanding Countermeasures for Different Web Application Attacks
00:00 -
Overview of Web Application Security Testing Tools
00:00
SQL Injection
-
Understanding SQL Injection Concepts
00:00 -
Understanding Various Types of SQL Injection Attacks
00:00 -
Understanding SQL Injection Methodology
00:00 -
Understanding Various SQL Injection Tools
00:00 -
Understanding Different IDS Evasion Techniques
00:00 -
Overview of SQL Injection Countermeasures
00:00 -
Overview of Various SQL Injection Detection Tools
00:00
Hacking Wireless Network
-
Overview of Wireless Concepts
00:00 -
Overview of Wireless Encryption Algorithms
00:00 -
Understanding Wireless Threats
00:00 -
Understanding Wireless Hacking Methodology
00:00 -
Overview of Different Wireless Hacking Tools
00:00 -
Understanding Bluetooth Hacking Techniques
00:00 -
Overview of Wireless Hacking Countermeasures and Security Tools
00:00
Hacking Mobile Platforms
-
Understanding Mobile Platform Attack Vectors
00:00 -
Understanding Hacking Android OS
00:00 -
Understanding Hacking iOS
00:00 -
Understanding Mobile Device Management
00:00 -
Overview of Mobile Security Guidelines and Security Tools
00:00
DCEH Quiz-4
-
Day-4 Quiz
IoT and OT Hacking
-
Understanding IoT Concepts, IoT Threats, and Attacks
00:00 -
Understanding IoT Hacking Methodology and IoT Hacking Tools
00:00 -
Overview of lot Hacking Countermeasures and Security Tools
00:00 -
Understanding OT Concepts, OT Threats, and Attacks
00:00 -
Understanding OT Hacking Methodology and OT Hacking ToolsUnderstanding OT Hacking Methodology and OT Hacking Tools
00:00 -
Overview of OT Hacking Countermeasures and Security Tools
00:00
Cloud Computing
-
Understanding Cloud Computing Concepts
00:00 -
Overview of Container Technology and Serverless Computing
00:00 -
Understanding Cloud Computing Threats
00:00 -
Understanding Cloud Hacking
00:00 -
Understanding Cloud Computing Security
00:00 -
Overview of Various Cloud Computing Security Tools
00:00
Cryptography
-
Understanding Cryptography Concepts
00:00 -
Overview of Encryption Algorithms
00:00 -
Cryptography Tools
00:00 -
Understanding Public Key Infrastructure (PKI)
00:00 -
Understanding Email Encryption
00:00 -
Understanding Disk Encryption
00:00 -
Understanding Cryptography Attacks
00:00 -
Cryptanalysis Tools
00:00
DCEH Quiz-5
-
Day-5 Quiz
Final Quiz DCEH
-
Final Quiz DCEH
Student Ratings & Reviews
No Review Yet