Certified Ethical Hacker v12 (CEH v12)

The Certified Ethical Hacker (CEH) course is a professional certification program designed to provide individuals with a comprehensive understanding of ethical hacking techniques and tools. The CEH course covers a broad range of topics related to information security, including footprinting and reconnaissance, network scanning, enumeration, system hacking, web application hacking, cryptography, and more.
 

Information Of Course
Category
Duration Time
4 Days 8 Hours or 8 Days 4 Hours
Level
Beginner
Price
$1250
Enquire
Book

The Certified Ethical Hacker (CEH) course is a professional certification program designed to provide individuals with a comprehensive understanding of ethical hacking techniques and tools. The CEH course covers a broad range of topics related to information security, including footprinting and reconnaissance, network scanning, enumeration, system hacking, web application hacking, cryptography, and more.

The CEH certification is recognized globally and is often a requirement for many information security and cybersecurity job roles. The course is offered by the EC-Council, a leading organization in the field of information security, and consists of a combination of online self-study materials, instructor-led training, and practical lab exercises. To obtain the certification, individuals must pass a comprehensive exam that assesses their knowledge and practical skills in ethical hacking.
 

The course is designed for individuals who wish to enhance their knowledge of ethical hacking and penetration testing.

The following are the few professional profiles that are ideal students for this course:

  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Information Security Analyst 1
  • Security Analyst L1
  • Infosec Security Administrator
  • Cybersecurity Analyst level 1, level 2, & level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
     
  • Outline of Information Security
  • Frameworks & Methodologies
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards
     
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website & Email  Footprinting
  • Whois Footprinting
  • DNS & Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools & Countermeasures
     
  • Network Scanning Concepts
  • Scanning Tools and Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
     
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Enumeration Countermeasures
     
  • Introduction to Vulnerability
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
     
  • Planning & Managing Quality
  • Planning & Managing Scope
  • Integration of Project Planning Activities
  • Dealing With Project Changes
  • Planning & Managing Procurement 
  • Managing Project Artifacts
     
  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Worm Makers
  • Fileless Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
     
  • Introduction to Sniffing
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Tools Required For Sniffing
     
  • Introduction to Social Engineering
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
     
  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures
     
  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
     
  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
     
  • Introduction to Web Servers
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
     
  • Introduction to Web Applications
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security
     
  • Introduction to SQL
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • SQL Injection Countermeasures
     
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools
     
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
     
  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
     
  • Cloud Computing Concepts
  • Container Technology
  • Manipulating CloudTrial Service
  • Cloud Security
     
  • Introduction to Cryptography
  • Encryption Algorithms
  • Cryptography Tools
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attack Countermeasures
     

Some of the common designations for PMP Certification acquired Project Managers in the industry are: –

  • Penetration Tester
  • Security Consultant
  • Information Security Analyst
  • Cybersecurity Analyst
  • Security Engineer
  • Forensic Computer Analyst

The average annual salary for a certified ethical hacker in the United States varies based on factors such as experience, location, industry, and specific job role.

Certified Ethical Hacker Average Salary Across the U.S.

 

 

Range

Annual Salary

Monthly Salary

Weekly Wage

Hourly Wage

25th Percentile

$112,000

$9,333.33

$2,155.50

$53.89

75th Percentile

$156,335

$13,028

$3,008.76

$75.22

Average

$122,500

$10,208

$2,356

$58.89

 Source: https://www.talent.com/salary?job=ethical+hacker