What you will learn in this certification course?


MODULE: INTRODUCTION TO ETHICAL HACKING
Unit 1: Information Security Overview
Unit 2: Information Security Threats and Attack Vectors
Unit 3: Hacking Concepts
Unit 4: Ethical Hacking Concepts
Unit 5: Information Security controls
Unit 6: Penetration Testing Concepts
Unit 7: Information Security Laws and Standards

MODULE: FOOTPRINTING AND RECONNAISSANCE
Unit 1: Footprinting Concepts
Unit 2: Footprinting through Search Engines
Unit 3: Footprinting through Web Services
Unit 4: Footprinting through Social Networking Sites
Unit 5: Website Footprinting
Unit 6: Email Footprinting
Unit 7: Competitive Intelligence
Unit 8: Whois Footprinting
Unit 9: DNS Footprinting
Unit 10: Network Footprinting
Unit 11: Footprinting through Social Engineering
Unit 12: Footprinting Tools
Unit 13: Countermeasures
Unit 14: Footprinting Pen Testing

MODULE: SCANNING NETWORKS
Unit 1: Network Scanning Concepts
Unit 2: Scanning Tools
Unit 3: Scanning Techniques
Unit 4: Scanning Beyond IDS and Firewall
Unit 5: Banner Grabbing
Unit 6: Draw Network Diagrams
Unit 7: Scanning Pen Testing

MODULE: ENUMERATION
Unit 1: Enumeration Concepts
Unit 2: NetBIOS Enumeration
Unit 3: SNMP Enumeration
Unit 4: LDAP Enumeration
Unit 5: NTP Enumeration
Unit 6: SMTP and DNS Enumeration
Unit 7: Other Enumeration Techniques
Unit 8: Enumeration Countermeasures
Unit 9: Enumeration Pen Testing

MODULE: VULNERABILITY ANALYSIS
Unit 1: Vulnerability Assessment Concepts
Unit 2: Vulnerability Assessment Solutions
Unit 3: Vulnerability Scoring Systems
Unit 4: Vulnerability Assessment Tools
Unit 5: Vulnerability Assessment Reports

MODULE: SYSTEM HACKING
Unit 1: System Hacking Concept
Unit 2: Cracking Passwords
Unit 3: Escalating Privileges
Unit 4: Executing Applications
Unit 5: Hiding Files
Unit 6: Covering Tracks
Unit 7: Penetration Testing

MODULE: MALWARE THREATS
Unit 1: Malware Concepts
Unit 2: Trojan Concepts
Unit 3: Virus and Worm Concepts
Unit 4: Malware Analysis
Unit 5: Countermeasures
Unit 6: Anti-Malware Software
Unit 7: Malware Penetration Testing

MODULE: SNIFFING
Unit 1: Sniffing Concepts
Unit 2: Sniffing Technique: MAC Attacks
Unit 3: Sniffing Technique: DHCP Attacks
Unit 4: Sniffing Technique: ARP Poisoning
Unit 5: Sniffing Technique: Spoofing Attacks
Unit 6: Sniffing Technique: DNS Poisoning
Unit 7: Sniffing Tools
Unit 8: Countermeasures
Unit 9: Sniffing Detection Techniques
Unit 10: Sniffing Pen Testing

MODULE: SOCIAL ENGINEERING
Unit 1: Social Engineering Concepts
Unit 2: Social Engineering Techniques
Unit 3: Insider Threats
Unit 4: Impersonation on Social Networking Sites
Unit 5: Identity Theft
Unit 6: Countermeasures
Unit 7: Social Engineering Pen Testing

MODULE: DENIAL OF SERVICE
Unit 1: DoS/DDoS Concepts
Unit 2: DoS/DDoS Attack Techniques
Unit 3: Botnets
Unit 4: DDoS Case Study
Unit 5: DoS/DDoS Attack Tools
Unit 6: Countermeasures
Unit 7: DoS/DDoS Protection Tools
Unit 8: DoS/DDoS Penetration Testing

MODULE: SESSION HIJACKING
Unit 1: Session Hijacking Concepts
Unit 2: Application Level Session Hijacking
Unit 3: Network Level Session Hijacking
Unit 4: Session Hijacking Tools
Unit 5: Countermeasures
Unit 6: Penetration Testing

MODULE: EVADING IDS, FIREWALLS AND HONEYPOTS
Unit 1: IDS, Firewall and Honeypot Concepts
Unit 2: IDS, Firewall and Honeypot Solutions
Unit 3: Evading IDS
Unit 4: Evading Firewalls
Unit 5: IDS/Firewall Evading Tools
Unit 6: Detecting Honeypots
Unit 7: IDS/Firewall Evasion Countermeasures
Unit 8: Penetration Testing

MODULE: HACKING WEBSERVERSUnit 1: WebServer Concept
Unit 2: WebServer Attacks
Unit 3: WebServer Attack Methodology
Unit 4: WebServer AttackTools
Unit 5: Countermeasures
Unit 6: Patch Management
Unit 7: WebServer Security Tools
Unit 8: WebServer Pen Testing

MODULE: HACKING WEB APPLICATIONS
Unit 1: Web App Concepts
Unit 2: Web App Threats
Unit 3: Hacking Methodology
Unit 4: Web App Hacking Tools
Unit 5: Countermeasures
Unit 6: Web App Security Testing Tools
Unit 7: Web App Pen Testing

MODULE: SQL INJECTION
Unit 1: SQL Injection Concepts
Unit 2: Types of SQL Injection
Unit 3: SQL Injection Methodology
Unit 4: SQL Injection Tools
Unit 5: Evasion Techniques
Unit 6: Countermeasures

MODULE: HACKING WIRELESS NETWORKS
Unit 1: Wireless Concepts
Unit 2: Wireless Encryption
Unit 3: Wireless Threats
Unit 4: Wireless Hacking Methodology
Unit 5: Wireless Hacking Tools
Unit 6: Bluetooth Hacking
Unit 7: Countermeasures
Unit 8: Wireless Security Tools
Unit 9: Wireless Pen Testing

MODULE: HACKING MOBILE PLATFORMS
Unit 1: Mobile Platform Attack Vectors
Unit 2: Hacking Android OS
Unit 3: Hacking iOS
Unit 4: Mobile Spyware
Unit 5: Mobile Device Management
Unit 6: Mobile Security Guidelines and Tools
Unit 7: Mobile Pen Testing

MODULE: IOT HACKING
Unit 1: IoT Concepts
Unit 2: IoT Attacks
Unit 3: IoT Hacking Methodology
Unit 4: IoT Hacking Tools
Unit 5: Countermeasures
Unit 6: IoT PenTesting

MODULE: CLOUD COMPUTING
Unit 1: Cloud Computing Concepts
Unit 2: Cloud Computing Threats
Unit 3: Cloud Computing Attacks
Unit 4: Cloud Security
Unit 5: Cloud Security Tools
Unit 6: Cloud Penetration Testing

MODULE: CRYPTOGRAPHY
Unit 1: Cryptography Concepts
Unit 2: Encryption Algorithms
Unit 3: Cryptography Tools
Unit 4: Public
Unit 5: Key Infrastructure (PKI)
Unit 6: Email Encryption
Unit 7: Disk Encryption
Unit 8: Cryptanalysis
Unit 9: Countermeasures

Certified Ethical Hacking Training Course (CEHT)

Certified Ethical Hacking Training Course (CEHT) has the most trustworthy propelled and perceived value in the field of certification courses in Information security and Ethical hacking area. This course is designed to deliver the functional comprehension of hacking methods and devices. During the course, the student is evolved as a professional white hat hacker. CEHT is a full-fledged ethical hacking certification course offered by Appin that will help you bag the most lucrative job opportunities. This certification course illuminates the latest hacking procedures, devices, traps, techniques, and efforts to fasten security around the IT infrastructure of any organization. Certified Ethical Hacking Training course at Appin is assayed as the most preferred course in Ethical hacking by those who have made fortunes in the world of Ethical Hacking.

As the propensity of individuals to conduct financial transactions online has increased, so has the plausible frauds. This susceptibility of fraud has increased the demand for certified ethical hackers in the IT ecosystem.

The skills of the ethical hacker are of great utilization for organizations which wish to assault their security framework for vulnerabilities that a baneful hacker might exploit to barge into the system and cause irrecoverable destructions.

This certification is beneficial for freshers as well as experienced professionals and will add a feather to your work-ex hat. For CEHT course, you only require a prior basic computer knowledge and a zeal to evolve every day as the IT threats multiply exponentially every day.

Learning objectives

This training program will provide an immersive knowledge of ethical hacking methods, techniques, and tools to the students in an interactive real-time environment. With this official CEHT certificate course, we impart in-depth knowledge on how to secure the client organization from all sorts of current and potential cyber threats.

The key learning aspects in this certificate course are:

  • - How to find vulnerabilities in an IT network
  • - How to execute real-world hacking techniques
  • - How to recognize and analyze the organization's IT risks
  • - How to penetrate computer systems and networks
  • - How to apply countermeasures
  • - How to investigate as well as mitigate security exposure
  • - How to develop an ongoing security strategy

Who can get benefitted from this certification course?

CEHT is specifically designed to extend benefits to people who fall in the following categories:

  • 1. Students looking to build a career in IT Security and ethical hacking
  • 2. IT Security Officers
  • 3. IT Auditors
  • 4. Network Security Administrators
  • 5. System Administrators

Careers in Information Security

With this certificate course, you can opt to become:

  • Network Security Systems Manager

  • Network Security Systems Administrator

  • Network Security Engineer

  • Systems/Applications Security Executive

  • Data Security Specialist

  • Web Security Administrator

  • Security Auditor

  • Web Security Manager

  • Chief Information Security Officer