WHY IEVISION?
IEVISION IT Services Private limited is the best IT Training and Certification provider accredited by AXELOS - PEOPLECERT, EXIN, IGC, APMG International, ISTQB & PECB (Professional Evaluation and Certification Board).
CONTACT INFO
IEVISION IT services Pvt Ltd,
7, Bilvakunja Apartment,
Bhandarkar Road, Pune - 411004
+9196046441000, +919604664000 info@ievision.org



CEH – Cyber Security Course

  • EC-Council Accredited Organization
  • Trained over 3000+ Students
  • Cyber Security Expert Trainers
  • Industry Standard Tools
  • CEH Certification
  • CEH Training Certificate
  • Career Mentoring
  • Interview Prepration
CLASSROOM TRAINING VIEW DATES

LIVE VIRTUAL VIEW DATES

GROUP/CORPORATE BOOK SESSION

UPCOMING BATCHE(S) IN "PUNE" (change city)

Date Time Course Type Price Option
02nd Dec 23 - 31st Dec 23 10:00 - 14:00 VIRTUAL CLASSROOM ₹ 46500

C|EH v12 Certification Training has 20 modules:

Module 1: Introduction to Ethical Hacking

Key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Key topics covered:

Elements of Information Security

Cyber Kill Chain Methodology

MITRE ATT&CK Framework

Hacker Classes

Ethical Hacking

Information Assurance (IA)

Risk Management

Incident Management

PCI DSS

HIPPA

SOX

GDPR

Module 2: Foot Printing and Reconnaissance

Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.

Hands-On Lab Exercises:

Over 30 hands-on exercises with real-life simulated targets to build skills on how to:

Perform foot printing on the target network using search engines, web services, and social networking sites

Perform website, email, whois, DNS, and network foot printing on the target network

Module 3: Scanning Networks

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Hands-On Lab Exercises:

Over 10 hands-on exercises with real-life simulated targets to build skills on how to:

Perform host, port, service, and OS discovery on the target network

Perform scanning on the target network beyond IDS and firewall

Module 4: Enumeration

Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, plus associated countermeasures.

Hands-On Lab Exercises:

Over 20 hands-on exercises with real-life simulated targets to build skills on how to:

Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration

Module 5: Vulnerability Analysis

Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Perform vulnerability research using vulnerability scoring systems and databases

Perform vulnerability assessment using various vulnerability assessment tools

Module 6: System Hacking

Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks.

Hands-On Lab Exercises:

Over 25 hands-on exercises with real-life simulated targets to build skills on how to:

Perform an active online attack to crack the system’s password

Escalate privileges using privilege escalation tools

Escalate privileges in Linux machine

Hide data using steganography

Clear Windows and Linux machine logs using various utilities

Hiding artifacts in Windows and Linux machines

Module 7: Malware Threats

Get an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.

Hands-On Lab Exercises:

Over 20 hands-on exercises with real-life simulated targets to build skills on how to:

Gain control over a victim machine using malware

Infect the target system using a virus

Perform static and dynamic malware analysis

Key topics covered:

Malware, Components of Malware

APT

Trojan

Types of Trojans

Exploit Kits

Virus

Virus Lifecycle

Types of Viruses

Ransomware

Computer Worms

Fileless Malware

Malware Analysis

Static Malware Analysis

Dynamic Malware Analysis

Virus Detection Methods

Trojan Analysis

Virus Analysis

Fileless Malware Analysis

Anti-Trojan Software

Antivirus Software

Fileless Malware Detection Tools

Module 8: Sniffing

Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Hands-On Lab Exercises:

Over 10 hands-on exercises with real-life simulated targets to build skills on how to:

Perform MAC flooding, ARP poisoning, MITM and DHCP starvation attack

Spoof a MAC address of Linux machine

Perform network sniffing using various sniffing tools

Detect ARP poisoning in a switch-based network

Key topics covered:

Network Sniffing

Wiretapping

MAC Flooding

DHCP Starvation Attack

ARP Spoofing Attack

ARP Poisoning

ARP Poisoning Tools

MAC Spoofing

STP Attack

DNS Poisoning

DNS Poisoning Tools

Sniffing Tools

Sniffer Detection Techniques

Promiscuous Detection Tools

Module 9: Social Engineering


Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Hands-On Lab Exercises:

Over 4 hands-on exercises with real-life simulated targets to build skills on how to:

Perform social engineering using Various Techniques

Spoof a MAC address of a Linux machine

Detect a phishing attack

Audit an organization’s security for phishing attacks

Key topics covered:


Social Engineering

Types of Social Engineering

Phishing

Phishing Tools

Insider Threats/Insider Attacks

Identity Theft

Module 10: Denial-of-Service

Learn about different Denial-of-Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Perform a DoS and DDoS attack on a target host

Detect and protect against DoS and DDoS attacks

Key topics covered:

DoS Attack, DDoS Attack

Botnets

DoS/DDoS Attack Techniques

DoS/DDoS Attack Tools

DoS/DDoS Attack Detection Techniques

DoS/DDoS Protection Tools

Module 11: Session Hijacking

Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Hands-On Lab Exercises:

Over 4 hands-on exercises with real-life simulated targets to build skills on how to:

Perform session hijacking using various tools

Detect session hijacking

Key topics covered:

Session Hijacking

Types of Session Hijacking

Spoofing

Application-Level Session Hijacking

Man-in-the-Browser Attack

Client-side Attacks

Session Replay Attacks

Session Fixation Attack

CRIME Attack

Network Level Session Hijacking

TCP/IP Hijacking

Session Hijacking Tools

Session Hijacking Detection Methods

Session Hijacking Prevention Tools

Module 12: Evading IDS, Firewalls, and Honeypots

Get introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Hands-On Lab Exercises:

Over 7 hands-on exercises with real-life simulated targets to build skills on how to:

Bypass Windows Firewall

Bypass firewall rules using tunneling

Bypass antivirus

Module 13: Hacking Web Servers

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Hands-On Lab Exercises:

Over 8 hands-on exercises with real-life simulated targets to build skills on how to:

Perform web server reconnaissance using various tools

Enumerate web server information

Crack FTP credentials using a dictionary attack

Key topics covered:

Web Server Operations

Web Server Attacks

DNS Server Hijacking

Website Defacement

Web Cache Poisoning Attack

Web Server Attack Methodology

Web Server Attack Tools

Web Server Security Tools

Patch Management

Patch Management Tools

Module 14: Hacking Web Applications

Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

Hands-On Lab Exercises:

Over 15 hands-on exercises with real-life simulated targets to build skills on how to:

Perform web application reconnaissance using various tools

Perform web spidering

Perform web application vulnerability scanning

Perform a brute-force attack

Perform Cross-Site Request Forgery (CSRF) Attack

Identify XSS vulnerabilities in web applications

Detect web application vulnerabilities using various web application security tools

Key topics covered:

Web Application Architecture

Web Application Threats

OWASP Top 10 Application Security Risks – 2021

Web Application Hacking Methodology

Web API

Webhooks and Web Shell

Web API Hacking Methodology

Web Application Security

Module 15: SQL Injections

Learn about SQL injection attack techniques, injection detection tools, and countermeasures to detect and defend against SQL injection attempts.

Hands-On Lab Exercises:

Over 4 hands-on exercises with real-life simulated targets to build skills on how to:

Perform an SQL injection attack to extract database information

Detect SQL injection vulnerabilities using various SQL injection detection tools

Key topics covered:

SQL Injection

Types of SQL injection

Blind SQL Injection

SQL Injection Methodology

SQL Injection Tools

Signature Evasion Techniques

SQL Injection Detection Tools

Module 16: Hacking Wireless Networks

Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools

Hands-On Lab Exercises:

Over 3 hands-on exercises with real-life simulated targets to build skills on how to:

Foot Print a wireless network

Perform wireless traffic analysis

Crack WEP, WPA, and WPA2 networks

Create a rogue access point to capture data packets

Key topics covered:

Wireless Terminology

Wireless Networks

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wi-Fi Encryption Cracking

WEP/WPA/WPA2 Cracking Tools

Bluetooth Hacking

Bluetooth Threats

Wi-Fi Security Auditing Tools

Bluetooth Security Tools

Module 17: Hacking Mobile Platforms

Learn about mobile platform attack vectors, Android vulnerability exploits, and mobile security guidelines and tools.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Hack an Android device by creating binary payloads

Exploit the Android platform through ADB

Hack an Android device by creating APK file

Secure Android devices using various Android security tools

Key topics covered:

Mobile Platform Attack Vectors

OWASP Top 10 Mobile Risks

App Sandboxing

SMS Phishing Attack (SMiShing)

Android Rooting

Hacking Android Devices

Android Security Tools

Jailbreaking iOS

Hacking iOS Devices

iOS Device Security Tools

Mobile Device Management (MDM)

OWASP Top 10 Mobile Controls

Mobile Security Tools

Module 18: IoT Hacking & OT Hacking

Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Hands-On Lab Exercises:

Over 2 hands-on exercises with real-life simulated targets to build skills on how to:

Gather information using Online foot printing tools

Capture and analyze IoT device traffic

Key topics covered:

IoT Architecture

IoT Communication Models

OWASP Top 10 IoT Threats

IoT Vulnerabilities

IoT Hacking Methodology

IoT Hacking Tools

IoT Security Tools

IT/OT Convergence (IIOT)

ICS/SCADA

OT Vulnerabilities

OT Attacks

OT Hacking Methodology

OT Hacking Tools

OT Security Tools

Module 19: Cloud Computing

Learn different cloud computing concepts, such as container technologies and server less computing, various cloud-based threats and attacks, and cloud security techniques and tools.

Hands-On Lab Exercises:

Over 5 hands-on exercises with real-life simulated targets to build skills on how to:

Perform S3 Bucket enumeration using various S3 bucket enumeration tools

Exploit open S3 buckets

Escalate IAM user privileges by exploiting misconfigured user policy

Key topics covered:

Cloud Computing

Types of Cloud Computing Services

Cloud Deployment Models

Fog and Edge Computing

Cloud Service Providers

Container

Docker

Kubernetes

Serverless Computing

OWASP Top 10 Cloud Security Risks

Container and Kubernetes Vulnerabilities

Cloud Attacks

Cloud Hacking

Cloud Network Security

Cloud Security Controls

Cloud Security Tools

Module 20: Cryptography

Learn about cryptography and ciphers, public-key infrastructure, cryptography attacks, and cryptanalysis tools.

Hands-On Lab Exercises:

Over 10 hands-on exercises with real-life simulated targets to build skills on how to:

Calculate MD5 hashes

Perform file and text message encryption

Create and use self-signed certificates

Perform email and disk encryption

Perform cryptanalysis using various cryptanalysis tools

Key topics covered:

Cryptography

Encryption Algorithms

MD5 and MD6 Hash Calculators

Cryptography Tools

Public Key Infrastructure (PKI)

Email Encryption

Disk Encryption

Cryptanalysis

Cryptography Attacks

Key Stretching


The Certified Ethical Hacker (C|EH v12) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The C|EH exam is ANSI 17024 compliant adding credibility and value to credential members.

This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.
  • Increased job opportunities: Having a CEH certification significantly enhances your job possibilities in the cybersecurity field. Employers often prefer candidates with specialized certifications like CEH.
  • Competitive advantage: With so many professionals competing for cybersecurity positions, having a CEH certification gives you a competitive edge over others.
  • Industry recognition: CEH is a globally recognized certification, which means that it is valued by employers worldwide. It demonstrates your expertise and credibility in the field.
  • Enhanced skillset: The CEH certification equips you with in-depth knowledge and skills in various areas of cybersecurity, such as ethical hacking techniques, network security, penetration testing, and vulnerability assessment. This enhances your overall skillset in the field.
  • Staying updated: CEH certification requires you to continuously update your knowledge and skills to keep up with the evolving cybersecurity landscape. This ensures that you stay current and relevant in the field.
  • Increased earning potential: Certified professionals generally earn higher salaries compared to their non-certified counterparts. Having a CEH certification can lead to better job opportunities and higher remuneration.
  • Industry connections: The CEH certification provides you with opportunities to network with other certified professionals, industry experts, and employers through forums, conferences, and online communities.
  • Validation of ethical hacking skills: CEH certification validates your ethical hacking skills, demonstrating your ability to identify and fix vulnerabilities in computer systems and networks. This can give you more credibility and trust among employers and clients.
  • Career advancement: With a CEH certification, you have the potential for rapid career growth within the cybersecurity field. It opens doors to positions such as penetration tester, ethical hacker, security consultant, or security analyst.
  • Personal development: Pursuing and obtaining a CEH certification requires dedication, perseverance, and continuous learning. This not only enhances your technical skills but also develops your discipline and professional work ethic.
  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice 
  • Test Delivery: IEVISION Exam Centre or VUE Testing Centre
  • Exam Prefix: 312-50 (ECC-Exam & VUE)
  • Key issues plaguing the information security world, incident management process, and penetration testing.
  • Various types of foot printing, foot printing tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Session hijacking techniques and countermeasures.
  • Different types of webserver attacks, attack methodology, and countermeasures.
  • Different types of web application attacks, web application hacking methodology, and countermeasures.
  • SQL injection attacks and injection detection tools.
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely.

REVIEWS



Pradeesh Kumar at

A Big Thank You to IEVISION for transforming my career with ethical hacking certification. It was a great learning experience, IEVISION has highly knowledgeable and skilled professional trainer when it comes to training. Thank you.

M.MOHAMMED NAHSHAL at

I recently completed the CEH certification at IEVISION, and I am thrilled to recommend it. The course provided excellent guidance, comprehensive study material, and interactive sessions that enhanced my understanding of information security management systems. My mentor, demonstrated remarkable expertise and support throughout the training. I would also like to extend my gratitude to the center manager, for their invaluable assistance and support throughout the entire learning journey. The combined efforts of Mahesh Pande, Jayant, and the entire IEVISION team made this a truly exceptional experience. Thank you all for your dedication and commitment to delivering a top-notch certification course.

kiran kumar koniki at

I have attended Cyber Security Training course.
Mahesh is an excellent trainer and the way how is explaining the concepts are really amazing 👏.
Thank you IEVISON team for facilitating this wonderful training session.

Rasmeet Kaur at

I highly recommend IEVISION and VJ Cyber Guru as a trainer as he is not only highly informative and educated but also carries a fun-filled attitude which makes the session more interactive. My journey in IT security has just started with CEH course and I am grateful to have met him and into the right mentorship of my career :)

Ankita Acharekar at

It was great learning experience. VJ Cyber Guru Sir will ensure that you will understand each and every concept. Most important thing is that they conduct some exercises related to the topic so it will help to understand the topic in a better way. Mahesh Pande Sir has a lot of knowledge and experience. I will do more trainings and certification from IEVISION. Also, I would definitely recommend IEVISION to friends and colleagues.

FREQUENTLY ASKED QUESTIONS

IEVISION trainer for CEH is a Cyber Security Expert having experience of managing Information and Cyber security practices for $50 Billion company.

IEVISION offer 5 weekends for Public courses and 5 days for corporate or group of 5+ customers.

You will be prepared with proven approach with hands on tools experience to clear your examination.


You need to attend IEVISION organized CEH training near me or CEH online course to purchase CEH exam voucher.

The CEH (ANSI) program require the candidate to have two years of work experience in the Information Security domain and should be able to provide a proof of the same as validated through the application process unless the candidate attends official training.

If a candidate has completed an official EC-Council training either at an Accredited Training Center like IEVISION, the candidate is eligible to attempt the relevant EC-Council exam.

The candidate needs to test within 1 year from date of voucher release.

No, IEVISION is accredited by EC-Council and formalities shall be taken care by IEVISION Team

The approved application is valid for 3 months from the date of approval; the candidate needs to test within 1 year from date of voucher release.
Note: An extension request will require the Approval of the Director of Certification

Exam vouchers can be extended for 3 months before the expiration date for a fee of USD $35. Kindly contact feedback@eccouncil.org to purchase your extension, and include the voucher number you would like to extend.
Note: Expired vouchers cannot be extended. Please write to feedback@eccouncil.org at least five (5) business days prior to voucher expiration 

  • 3-5 Member 5%
  • 6-8 Member 10%
  • 9+ Member 15%

INQUIRY


11000 +

Professionals Trained