Become a Certified Ethical Hacker Today!

Deep Dive in Ethical Hacking CEHv12

Learn now pay later

Training from highly experienced instructors.

data science course in kolkata

100% Live Online Learning with 1:1
Mentorship

Learn now pay later

Get Certified by SkillEnable and Globally Recognised EC
Council

online data science course

280+ hours of live exhaustive training sessions split over 24 weeks with Lifetime assess of the course materials.

Learn now pay later

Active job referrals from 500+
Fortune Companies.

data science course

40 hours of exhaustive holistic development training and 20 hours of
SoftSkill Training

data science course in kolkata

Learn over 10 industry-relevant tools.

data science course online

100% Placement Guarantee & Lifetime Placement Assistance

Why should you join SkillEnable

Course Details

Gain Skills

• 5 days of training

• 20 modules

• Over 220 hands-on-labs with competition flags

• Over 3,500 hacking tools

• Learn how to hack multiple operating systems

(Windows 11, Windows Servers, Linux, Ubuntu, Android)

Gain Experience C|EH Knowledge Exam

• 125 multiple-choice questions

• 4 hours

C|EH Practical Exam

• 6 hours practical exam

• 20 scenario based questions

• Prove your skills and abilities

• ANSI 17024 accredited

Gain Recognition

• Conduct a real-world ethical hacking assignment

• Apply the 5 phases

   o Reconnaissance

   o Scanning

   o Gaining Access

   o Maintaining Access

   o Covering Your Tracks

Gain Respect

• New challenges every month
• 4-hour competition
• Compete with your peers all over the world
• Hack your way to the top of the Leaderboard
• Gain recognition
• Challenges

What's New in the C|EH v12?

What's New in the C|EH v12?

What is C|EH v12? The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

Our Media Presence

TESTIMONIALS

PAYMENT PLANS AND SELECTION PROCESS

About the Course!

What is C|EH v12? The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

data science with python

1

Reconnaisance

2

Scanning

3

Gaining Access

4

Maintaining access

5

Covering Tracks

5 Phases of Ethical Hacking

How Will You Get Certified!

Prove your Skills and Abilities with online, Practical Examinations

● Information Security Overview
● Information Security Threats and Attack Vectors
● Hacking Concepts Ethical Hacking Concepts
● Information Security Controls
● Penetration Testing Concepts
● Information Security Laws and Standards

Module01

● Footprinting Concepts
● Footprinting through Search Engines
● Footprinting through Web Services
● Footprinting through Social Networking Sites
● Website Footprinting
● Email Footprinting
● Competitive Intelligence
● Who is Footprinting
● DNS Footprinting
● Network Footprinting
● Footprinting Through Social Engineering
● Footprinting Tools
● Footprinting Countermeasures
● Footprinting Penetration Testing

Module02

● Network Scanning Concepts
● Scanning Tools
● Scanning Techniques
● Scanning Beyond IDS and Firewall
● Banner Grabbing
● Draw Network Diagrams
● Scanning Pen Testing

Module03

● Enumeration Concepts
● NetBIOS Enumeration
● SANP Enumeration
● LDP Enumeration
● SMTP and DNS Enumeration
● Other Enumeration Techniques

● Enumeration Countermeasures

● Enumeration Pen Testing

Module04

● Vulnerability Assessment Concepts
● Vulnerability Assessment Solutions
● Vulnerability Scoring
● Systems Vulnerability Assessment Tools
● Vulnerability Assessment Reports

Module05

● System Hacking Concepts
● Cracking Passwords
● Escalating Privileges
● Executing Applications
● Hiding Files
● Covering Tracks
● Penetration Testing

Module06

● Malware Concepts
● Trojan Concepts
● Virus and Worm Concepts
● Malware Analysis
● Countermeasures
● Anti-Malware Software
● Malware Penetration testing

Module07

● Sniffing Concepts
● Sniffing Technique: MAC Attacks
● Sniffing Technique: DHCP Attacks
● Sniffing Technique: ARP Poisoning
● Sniffing Technique: Spoofing Attacks
● Sniffing Technique: DNS Poisoning
● Sniffing Tools
● Countermeasures
● Sniffing Detection
● Techniques Sniffing Pen Testing

 

Module08

● Social Engineering Concepts
● Social Engineering Techniques
● Insider Threats
● Impersonation on Social Networking Sites
● Identity Theft
● Countermeasures
● Social Engineering Pen Testing

Module09

● DoS/DDos Concepts
● DoS/DDos Attack Techniques
● Botnets DDoS Case Study
● DoS/DDos Attack Tools
● Countermeasures
● DoS/DDos Protection Tools
● DoS/DDos Penetration Testing

Module10

● Session Hijacking Concepts
● Application Level Session Hijacking
● Network Level Session Hijacking
● Session Hijacking Tools
● Countermeasures Penetration Testing

Module11

● IDS,
● Firewall and Honeypot Concepts
● IDS, Firewall and Honeypot Solutions
● Evading IDS Evading Firewalls
● IDS/Firewall Evading Tools
● Detecting Honeypots
● IDS/Firewall Evasion Countermeasures
● Penetration Testing

Module12

● Web Server Concepts
● Web Server Attacks
● Web Server Attacks Methodology
● Web Server Attack Tools

● Countermeasures
● Patch Management
● Web Server Security Tools
● Web Server Pen Testing

Module13

● Web App Concepts
● Web App Threats
● Hacking Methodology
● Web App Hacking Tools
● Countermeasures
● Web App Security Testing Tools
● Web App Pen Testing

Module14

● SQL Injection Concepts
● Types of SQL Injection
● SQL Injection Methodology
● SQL Injection Tools
● Evasion Techniques
● Countermeasures

Module15

● Wireless Concepts
● Wireless Encryption
● Wireless Threats
● Wireless Hacking Methodology
● Wireless Hacking Tools
● Bluetooth Hacking Countermeasures
● Wireless Security Tools
● Wireless Pen Testing

Module16

● Mobile Platform Attack
● Vectors Hacking
● Android OS
● Hacking iOS
● Mobile Spyware
● Mobile Device Management
● Mobile Security Guidelines and Tools

● Mobile Pen Testing

Module17

● IoT Concepts
● IoT Attacks
● IoT Hacking Methodology
● IoT Hacking Tools
● Countermeasures
● IoT Pen Testing

Module18

● Cloud Computing Concepts
● Cloud Computing Threats
● Cloud Computing Attacks
● Cloud Security Tools
● Cloud Penetration Testing

Module19

● Cryptography Concepts
● Encryption Algorithms
● Cryptography Tools
● Public Key Infrastructure (PKI)
● Email Encryption
● Disk Encryption
● Cryptanalysis
● Countermeasures

Module20