Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CEH V11 Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

CEH V11 Syllabus

Module 01 - Introduction to Ethical Hacking

Lesson 01 - Information Security Overview

Lesson 02 - Information Security Threats and Attack Vectors

Lesson 03 - Hacking Concepts

Lesson 04 - Ethical Hacking Concepts

Lesson 05 - Information Security Controls

Lesson 06 - Penetration Testing Concepts

Lesson 07 - Information Security Laws and Standards

Module 02 - Footprinting and Reconnaissance

Lesson 01 - Footprinting Concepts

Lesson 02 - Footprinting through Search Engines

Lesson 03 - Footprinting through Web Services

Lesson 04 - Footprinting through Social Networking Sites

Lesson 05 - Website Footprinting

Lesson 06 - Email Footprinting

Lesson 07 - Competitive Intelligence

Lesson 08 - Whois Footprinting

Lesson 09 - DNS Footprinting

Lesson 10 - Network Footprinting

Lesson 11- Footprinting through Social Engineering

Lesson 12 - Footprinting Tools

Lesson 13 - Countermeasures

Lesson 14 - Footprinting Pen Testing

Module 03 - Scanning Networks

Lesson 01 - Network Scanning Concepts

Lesson 02 - Scanning Tools

Lesson 03 - Scanning Techniques


Lesson 04 - Scanning Beyond IDS and Firewall

Lesson 05 - Banner Grabbing

Lesson 06 - Draw Network Diagrams

Lesson 07 - Scanning Pen Testing

Module 04 - Enumeration

Lesson 01 - Enumeration Concepts

Lesson 02 - NetBIOS Enumeration

Lesson 03 - SNMP Enumeration

Lesson 04 - LDAP Enumeration

Lesson 05 - NTP Enumeration

Lesson 06 - SMTP Enumeration and DNS Enumeration

Lesson 07 - Enumeration Countermeasures

Lesson 08 - Other Enumeration Techniques

Lesson 09 - Enumeration Pen Testing

Module 05 - Vulnerability Analysis

Lesson 01 - Vulnerability Assessment Concepts


Lesson 02 - Vulnerability Assessment Solutions
Lesson 03 - Vulnerability Scoring Systems
Lesson 04 - Vulnerability Assessment Tools
Lesson 05 - Vulnerability Assessment Reports

Module 06 - System Hacking

Lesson 01 - System Hacking Concepts


Lesson 02 - Cracking Passwords
Lesson 03 - Escalating Privileges
Lesson 04 - Executing Applications
Lesson 05 - Hiding Files
Lesson 06 - Covering Tracks
Lesson 07 - Penetration Testing

Module 07 - Malware Threats

Lesson 01 - Malware Concepts


Lesson 02 - Trojan Concepts
Lesson 03 - Virus and Worm Concepts
Lesson 04 - Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware Software
Lesson 07- Malware Penetration Testing

Module 08 - Sniffing
Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing

Module 09- Social Engineering

Lesson 01 - Social Engineering Concepts


Lesson 02 - Social Engineering Techniques
Lesson 03- Insider Threats
Lesson 04 - Impersonation on Social Networking Sites
Lesson 05 - Identity Theft
Lesson 06 - Countermeasures
Lesson 07 - Social Engineering Penetration Testing

Module 10- Denial-of-Service

Lesson 01 - DoS/DDoS Concepts


Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets
Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools
Lesson 06 - Countermeasures
Lesson 07 - DoS/DDoS Protection Tools
Lesson 08 - DoS/DDoS Attack Penetration Testing

Module 11- Session Hijacking


Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing

Module 12 - Evading IDS, Firewalls, and Honeypots


Lesson 01- IDS, Firewall, and Honeypot Concepts
Lesson 02- IDS, Firewall, and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots

Lesson 07- IDS/Firewall Evasion Countermeasures


Lesson 08- Penetration Testing

Module 13- Hacking Web Servers

Lesson 01- Web Server Concepts


Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing

Module 14- Hacking Web Applications

Lesson 01 - Web App Concepts


Lesson 02 - Web App Threats
Lesson 03 - Hacking Methodology
Lesson 04 - Web Application Hacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Web App Security Testing Tools
Lesson 07 - Web App Pen Testing

Module 15- SQL Injection


Lesson 01 - SQL Injection Concepts
Lesson 02 - Types of SQL Injection
Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools
Lesson 05 - Evasion Techniques
Lesson 06 – Countermeasures

Module 16- Hacking Wireless Networks


Lesson 01 - Wireless Concepts
Lesson 02 - Wireless Encryption
Lesson 03 - Wireless Threats
Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools
Lesson 06 - Bluetooth Hacking
Lesson 07 - Countermeasures
Lesson 08 - Wireless Security Tools
Lesson 09 - Wi-Fi Pen Testing

Module 17- Hacking Mobile Platforms

Lesson 01- Mobile Platform Attack Vectors


Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools
Lesson 07- Mobile Pen Testing

Module 18- IoT Hacking

Lesson 01- IoT Concepts


Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing

Module 19- Cloud Computing


Lesson 01 - Cloud Computing Concepts
Lesson 02 - Cloud Computing Threats
Lesson 03 - Cloud Computing Attacks
Lesson 04 - Cloud Security
Lesson 05 - Cloud Security Tools
Lesson 06 - Cloud Penetration Testing

Module 20- Cryptography


Lesson 01- Cryptography Concepts
Lesson 02- Encryption Algorithms
Lesson 03- Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)

You might also like