SlideShare a Scribd company logo
1 of 14
Download to read offline
EC Council’s CEH Online Course is one of the most prominent courses in the cyber security
domain. This certification is from EC Council which is acknowledged all around the world. So, if
you are thinking of entering the world of the cyber security domain and pass out their CEHv11
Course then we, at Securium Solutions have covered everything for you. It helps you get a
good knowledge of hacking tools, practices, and techniques followed by hackers.
CERTIFIED ETHICAL HACKER
Table of Contents:
Course Highlights
Course Description
Exam Information
Training Objectives
Course Content
About Us
Contact Us
www.securiumsolutions.org
support@securiumsolutions.org
When it comes to the CEHv11 Course, it will help you get in-depth know-how of ethical hacking phases,
countermeasures, and different attack vectors, and more. It will help you learn more about the process
followed by hackers and act accordingly to protect any kind of security compromise. You will learn how
to defend yourself from attacks that can cause system vulnerabilities and weaknesses. The CEH v11
Online Training will help you keep your organization safe and also strengthen security to reduce any
kind of attack and threats.
If you are looking to pursue a CEH Online Course at your convenience then you can consider Securium
Solutions. We will cover all the aspects to help you learn how you will be able to create a systematic
process that takes care of all the ethical hacking domains and procedures. CEH Online Course will
help you avail an opportunity to learn the skills to accomplish CEHv11 credential and execute the work
of ethical hackers. A few of the benefits of the CEHv11 course are given below:
Course Description
Hand Made Session Notes from the Trainer
Training Cum Internship Offer after a Mock Test.
Exclusive Dedicated Trainer Support.
6 Months of Free Access to labs for Practice.
5 Various Sets of Mock Tests to Clear CEHv11 Course Exam.
Industry Insights Indulged Exclusive Approach (IIIEA)
Course designed for both professional s and beginners
The course has been created as per the latest updates and versions.
Course Highlights
www.securiumsolutions.org
support@securiumsolutions.org
Enhance Your Career:
With the assistance of the respective course, you get to have a great career in the field of Information
security. So, if you have an interest in the security domain, opt for CEH v11 certification.
IT Security:
Pursuing EC Council’s CEH v11 certification help you boost your IT career by enhancing your IT
security understanding. It helps you gain proper knowledge of different techniques followed by hackers
Better Package:
After your complete your CEH v11 certification the chances of gaining a better package and
opportunities are a lot higher.
Build Community:
With the assistance of CEH v11 certification, you can build a strongglobal community. You can also
enhance your networking opportunities and even get your start-up in place.
Assess Cyber Risks:
This course helps you enhance your understanding of assessing different cyber risks and
vulnerabilities that can exploit an IT infrastructure.
Exam Information
Below mentioned are the exam details for EC-Council CEH Online Course.
Number of Questions: 125
Test Format: Multiple Choice
Test Duration: 4 Hours
Certification Name: 312-50 (ECC EXAM), 312-50 (VUE)
Test Delivery: ECC EXAM, VUE
www.securiumsolutions.org
support@securiumsolutions.org
Training Objectives
Successful completion of the certification training empowers you with across the board understanding of:
Information security standards, laws, and controls,
System hacking procedures to assess system and network vulnerabilities.
Different types of malware
System auditing for malware analysis, malware attacks, and countermeasures.
Different forms of countermeasures, and footprinting tools
Network scanning countermeasures
Network scanning techniques,
Enumeration countermeasures and Enumeration techniques
Vulnerability analysis to acknowledge the loopholes in the security of an organization’s
communication infrastructure, network, and end systems.
Session hijacking techniques
Web Server attacks methodology to assess vulnerabilities and countermeasures.
Assessing network vulnerabilities and countermeasures with packet sniffing techniques
Social engineering techniques
Acknowledging theft attacks to social engineering countermeasures and audit human-level
vulnerabilities.
DoS/DDoS attack techniques
Tools to DoS/DDoS countermeasures.
Penetration testing, vulnerability know-how, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Web application attacks, vulnerabilities, and countermeasures.
SQL injection vulnerabilities, attacks, and countermeasures.
Wireless encryption, hacking tools, hacking methodology, and security tools.
Mobile platform vulnerability exploitations, security guidelines and tools.
Cloud computing concepts and security techniques and tools.
Cryptography ciphers, cryptography attacks, Public Key Infrastructure (PKI), and cryptanalysis tools.
www.securiumsolutions.org
support@securiumsolutions.org
Course Content
Pursuing the CEH Online Course by EC Council, helps you enhance your understanding of security
fundamentals quite significantly. With the help, of the respective course, you get to enhance your skills
when it comes to acknowledging vulnerabilities in the company’s network infrastructure. They also learn
to work on different solutions that can counter all kinds of cyberattacks. Take a look at the
CEH v11 Online Training outline below:
Module01 - Introduction to Ethical Hacking
Lesson 01 - Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 06 - Penetration Testing Concepts
Lesson 07 - Information Security Laws and Standards
Module02 - Footprinting and Reconnaissance
Lesson 01 - Footprinting Concepts
Lesson 02 - Footprinting through Search Engines
Lesson 03 - Footprinting through Web Services
Lesson 04 - Footprinting through Social Networking Sites
Lesson 05 - Website Footprinting
Lesson 06 - Email Footprinting
Lesson 07 - Competitive Intelligence
Lesson 08 - Whois Footprinting
Lesson 09 - DNS Footprinting
Lesson 10 - Network Footprinting
Lesson 11 - Footprinting through Social Engineering
Lesson 12 - Footprinting Tools
Lesson 13 - Countermeasures
Lesson 14 - Footprinting Pen Testing
www.securiumsolutions.org
support@securiumsolutions.org
Module03 - Scanning Networks
Lesson 01 - Network Scanning Concepts
Lesson 02 - Scanning Tools
Lesson 03 - Scanning Techniques
Lesson 04 - Scanning Beyond IDS and Firewall
Lesson 05 - Banner Grabbing
Lesson 06 - Draw Network Diagrams
Lesson 07 - Scanning Pen Testing
Module04 - Enumeration
Lesson 01 - Enumeration Concepts
Lesson 02 - NetBIOS Enumeration
Lesson 03 - SNMP Enumeration
Lesson 04 - LDAP Enumeration
Lesson 05 - NTP Enumeration
Lesson 06 - SMTP Enumeration and DNS Enumeration
Lesson 07 - Other Enumeration Techniques
Lesson 08 - Enumeration Countermeasures
Lesson 09 - Enumeration Pen Testing
Module05 - Vulnerability Analysis
Lesson 01 - Vulnerability Assessment Concepts
Lesson 02 - Vulnerability Assessment Solutions
Lesson 03 - Vulnerability Scoring Systems
Lesson 04 - Vulnerability Assessment Tools
Lesson 05 - Vulnerability Assessment Reports
www.securiumsolutions.org
support@securiumsolutions.org
Module06 - System Hacking
Lesson 01 - System Hacking Concepts
Lesson 02 - Cracking Passwords
Lesson 03 - Escalating Privileges
Lesson 04 - Executing Applications
Lesson 05 - Hiding Files
Lesson 06 - Covering Tracks
Lesson 07 - Penetration Testing
Module07 - Malware Threats
Lesson 01 - Malware Concepts
Lesson 02 - Trojan Concepts
Lesson 03 - Virus and Worm Concepts
Lesson 04 - Malware Analysis
Lesson 05 - Countermeasures
Lesson 06 - Anti-Malware Software
Lesson 07 - Malware Penetration Testing
Module08 - Sniffing
Lesson 01 - Sniffing Concepts
Lesson 02 - Sniffing Technique: MAC Attacks
Lesson 03 - Sniffing Technique: DHCP Attacks
Lesson 04 - Sniffing Technique: ARP Poisoning
Lesson 05 - Sniffing Technique: Spoofing Attacks
Lesson 06 - Sniffing Technique: DNS Poisoning
Lesson 07 - Sniffing Tools
Lesson 08 - Countermeasures
Lesson 09 - Sniffing Detection Techniques
Lesson 10 - Sniffing Pen Testing
www.securiumsolutions.org
support@securiumsolutions.org
Module09 - Social Engineering
Lesson 01 - Social Engineering Concepts
Lesson 02 - Social Engineering Techniques
Lesson 03 - Insider Threats
Lesson 04 - Impersonation on Social Networking Sites
Lesson 05 - Identity Theft
Lesson 06 - Countermeasures
Lesson 07 - Social Engineering Penetration Testing
Module10 - Denial-of-Service
Lesson 01 - DoS/DDoS Concepts
Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets
Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools
Lesson 06 - Countermeasures
Lesson 07 - DoS/DDoS Protection Tools
Lesson 08 - DoS/DDoS Attack Penetration Testing
Module11 - Session Hijacking
Lesson 01 - Session Hijacking Concepts
Lesson 02 - Application Level Session Hijacking
Lesson 03 - Network Level Session Hijacking
Lesson 04 - Session Hijacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Penetration Testing
www.securiumsolutions.org
support@securiumsolutions.org
Module12 - Evading IDS, Firewalls, and Honeypots
Lesson 01 - IDS, Firewall and Honeypot Concepts
Lesson 02 - IDS, Firewall and Honeypot Solutions
Lesson 03 - Evading IDS
Lesson 04 - Evading Firewalls
Lesson 05 - IDS/Firewall Evading Tools
Lesson 06 - Detecting Honeypots
Lesson 07 - IDS/Firewall Evasion Countermeasures
Lesson 08 - Penetration Testing
Module13 - Hacking Web Servers
Lesson 01 - Web Server Concepts
Lesson 02 - Web Server Attacks
Lesson 03 - Web Server Attack Methodology
Lesson 04 - Web Server Attack Tools
Lesson 05 - Countermeasures
Lesson 06 - Patch Management
Lesson 07 - Web Server Security Tools
Lesson 08 - Web Server Pen Testing
Module14 - Hacking Web Applications
Lesson 01 - Web App Concepts
Lesson 02 - Web App Threats
Lesson 03 - Hacking Methodology
Lesson 04 - Web Application Hacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Web App Security Testing Tools
Lesson 07 - Web App Pen Testing
www.securiumsolutions.org
support@securiumsolutions.org
Module15 - SQL Injection
Lesson 01 - SQL Injection Concepts
Lesson 02 - Types of SQL Injection
Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools
Lesson 05 - Evasion Techniques
Lesson 06 - Countermeasures
Module16 - Hacking Wireless Networks
Lesson 01 - Wireless Concepts
Lesson 02 - Wireless Encryption
Lesson 03 - Wireless Threats
Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools
Lesson 06 - Bluetooth Hacking
Lesson 07 - Countermeasures
Lesson 08 - Wireless Security Tools
Lesson 09 - Wi-Fi Pen Testing
Module17 - Hacking Mobile Platforms
Lesson 01 - Mobile Platform Attack Vectors
Lesson 02 - Hacking Android OS
Lesson 03 - Hacking iOS
Lesson 04 - Mobile Spyware
Lesson 05 - Mobile Device Management
Lesson 06 - Mobile Security Guidelines and Tools
Lesson 07 - Mobile Pen Testing
www.securiumsolutions.org
support@securiumsolutions.org
Module18 - IoT Hacking
Lesson 01- IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing
Module19 - Cloud Computing
Lesson 01 - Cloud Computing Concepts
Lesson 02 - Cloud Computing Threats
Lesson 03 - Cloud Computing Attacks
Lesson 04 - Cloud Security
Lesson 05 - Cloud Security Tools
Lesson 06 - Cloud Penetration Testing
Module20 - Cryptography
Lesson 01 - Cryptography Concepts
Lesson 02 - Encryption Algorithms
Lesson 03 - Cryptography Tools
Lesson 04 - Public Key Infrastructure (PKI)
Lesson 05 - Email Encryption
Lesson 06 - Disk Encryption
Lesson 07 - Cryptanalysis
Lesson 08 - Countermeasures
www.securiumsolutions.org
support@securiumsolutions.org
ABOUT US
Overview
Securium solutions is the eminent medium that provides cyber security online
training courses. Our courses run under the true mentorship of digitalization that
is circulated by pre-planned modules to not merely teach but educate by advanced
means.
Spot the difference in its approach to derive its value. Within a professional
frame, our cyber security certifications online are not just for a defining point till a
specific accreditation. These modules are correlated to basics which never change
with advanced mechanisms. Nonetheless, our courses keep this course
fragmentation at the rooted specification that doesn’t reform even after a century.
We provide online training in disciplines such as Cyber Security, Cloud Computing,
Project Management, Digital Marketing, and Data Science among others, where
technologies and best practices are changingrapidly and demand for qualified
candidates significantly exceeds supply. We have deployed training to millions
of professionals and companies so they can have upgraded skills and become
certified to know the worth of their organization.
www.securiumsolutions.org
support@securiumsolutions.org
CONTACT US
Securium Solutions
Head of communications
ADDRESS (INDIA):
B-28, 1st Floor, Sector-01, Noida, Uttar Pradesh – 201301
ADDRESS (US):
1847 Solera Dr, Columbus, OH 43229
PHONE NUMBER (US): 1 (201) 549-9007
PHONE NUMBER (INDIA): +91 - 120 - 4310543
MOBILE NUMBER (INDIA): +91 - 931 – 062 - 4042 (WhatsApp)
SKYPE: securiumsolutions
EMAIL: info@securiumsolutions.org, support@securiumsolutions.org
WEB: www.securiumsolutions.org
www.securiumsolutions.org
support@securiumsolutions.org

More Related Content

Similar to ceh pdf work.pdf

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCRAW CYBER SECURITY PVT LTD
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramITpreneurs
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...Firojali Laskar
 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyE Hacking
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiCRAW CYBER SECURITY PVT LTD
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
12 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 201812 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 2018Paula Januszkiewicz
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 

Similar to ceh pdf work.pdf (20)

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
CEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH AcademyCEH and Security+ Training Outline - EH Academy
CEH and Security+ Training Outline - EH Academy
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
12 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 201812 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 2018
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

ceh pdf work.pdf

  • 1. EC Council’s CEH Online Course is one of the most prominent courses in the cyber security domain. This certification is from EC Council which is acknowledged all around the world. So, if you are thinking of entering the world of the cyber security domain and pass out their CEHv11 Course then we, at Securium Solutions have covered everything for you. It helps you get a good knowledge of hacking tools, practices, and techniques followed by hackers. CERTIFIED ETHICAL HACKER
  • 2. Table of Contents: Course Highlights Course Description Exam Information Training Objectives Course Content About Us Contact Us www.securiumsolutions.org support@securiumsolutions.org
  • 3. When it comes to the CEHv11 Course, it will help you get in-depth know-how of ethical hacking phases, countermeasures, and different attack vectors, and more. It will help you learn more about the process followed by hackers and act accordingly to protect any kind of security compromise. You will learn how to defend yourself from attacks that can cause system vulnerabilities and weaknesses. The CEH v11 Online Training will help you keep your organization safe and also strengthen security to reduce any kind of attack and threats. If you are looking to pursue a CEH Online Course at your convenience then you can consider Securium Solutions. We will cover all the aspects to help you learn how you will be able to create a systematic process that takes care of all the ethical hacking domains and procedures. CEH Online Course will help you avail an opportunity to learn the skills to accomplish CEHv11 credential and execute the work of ethical hackers. A few of the benefits of the CEHv11 course are given below: Course Description Hand Made Session Notes from the Trainer Training Cum Internship Offer after a Mock Test. Exclusive Dedicated Trainer Support. 6 Months of Free Access to labs for Practice. 5 Various Sets of Mock Tests to Clear CEHv11 Course Exam. Industry Insights Indulged Exclusive Approach (IIIEA) Course designed for both professional s and beginners The course has been created as per the latest updates and versions. Course Highlights www.securiumsolutions.org support@securiumsolutions.org
  • 4. Enhance Your Career: With the assistance of the respective course, you get to have a great career in the field of Information security. So, if you have an interest in the security domain, opt for CEH v11 certification. IT Security: Pursuing EC Council’s CEH v11 certification help you boost your IT career by enhancing your IT security understanding. It helps you gain proper knowledge of different techniques followed by hackers Better Package: After your complete your CEH v11 certification the chances of gaining a better package and opportunities are a lot higher. Build Community: With the assistance of CEH v11 certification, you can build a strongglobal community. You can also enhance your networking opportunities and even get your start-up in place. Assess Cyber Risks: This course helps you enhance your understanding of assessing different cyber risks and vulnerabilities that can exploit an IT infrastructure. Exam Information Below mentioned are the exam details for EC-Council CEH Online Course. Number of Questions: 125 Test Format: Multiple Choice Test Duration: 4 Hours Certification Name: 312-50 (ECC EXAM), 312-50 (VUE) Test Delivery: ECC EXAM, VUE www.securiumsolutions.org support@securiumsolutions.org
  • 5. Training Objectives Successful completion of the certification training empowers you with across the board understanding of: Information security standards, laws, and controls, System hacking procedures to assess system and network vulnerabilities. Different types of malware System auditing for malware analysis, malware attacks, and countermeasures. Different forms of countermeasures, and footprinting tools Network scanning countermeasures Network scanning techniques, Enumeration countermeasures and Enumeration techniques Vulnerability analysis to acknowledge the loopholes in the security of an organization’s communication infrastructure, network, and end systems. Session hijacking techniques Web Server attacks methodology to assess vulnerabilities and countermeasures. Assessing network vulnerabilities and countermeasures with packet sniffing techniques Social engineering techniques Acknowledging theft attacks to social engineering countermeasures and audit human-level vulnerabilities. DoS/DDoS attack techniques Tools to DoS/DDoS countermeasures. Penetration testing, vulnerability know-how, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Web application attacks, vulnerabilities, and countermeasures. SQL injection vulnerabilities, attacks, and countermeasures. Wireless encryption, hacking tools, hacking methodology, and security tools. Mobile platform vulnerability exploitations, security guidelines and tools. Cloud computing concepts and security techniques and tools. Cryptography ciphers, cryptography attacks, Public Key Infrastructure (PKI), and cryptanalysis tools. www.securiumsolutions.org support@securiumsolutions.org
  • 6. Course Content Pursuing the CEH Online Course by EC Council, helps you enhance your understanding of security fundamentals quite significantly. With the help, of the respective course, you get to enhance your skills when it comes to acknowledging vulnerabilities in the company’s network infrastructure. They also learn to work on different solutions that can counter all kinds of cyberattacks. Take a look at the CEH v11 Online Training outline below: Module01 - Introduction to Ethical Hacking Lesson 01 - Information Security Overview Lesson 02 - Information Security Threats and Attack Vectors Lesson 03 - Hacking Concepts Lesson 04 - Ethical Hacking Concepts Lesson 05 - Information Security Controls Lesson 06 - Penetration Testing Concepts Lesson 07 - Information Security Laws and Standards Module02 - Footprinting and Reconnaissance Lesson 01 - Footprinting Concepts Lesson 02 - Footprinting through Search Engines Lesson 03 - Footprinting through Web Services Lesson 04 - Footprinting through Social Networking Sites Lesson 05 - Website Footprinting Lesson 06 - Email Footprinting Lesson 07 - Competitive Intelligence Lesson 08 - Whois Footprinting Lesson 09 - DNS Footprinting Lesson 10 - Network Footprinting Lesson 11 - Footprinting through Social Engineering Lesson 12 - Footprinting Tools Lesson 13 - Countermeasures Lesson 14 - Footprinting Pen Testing www.securiumsolutions.org support@securiumsolutions.org
  • 7. Module03 - Scanning Networks Lesson 01 - Network Scanning Concepts Lesson 02 - Scanning Tools Lesson 03 - Scanning Techniques Lesson 04 - Scanning Beyond IDS and Firewall Lesson 05 - Banner Grabbing Lesson 06 - Draw Network Diagrams Lesson 07 - Scanning Pen Testing Module04 - Enumeration Lesson 01 - Enumeration Concepts Lesson 02 - NetBIOS Enumeration Lesson 03 - SNMP Enumeration Lesson 04 - LDAP Enumeration Lesson 05 - NTP Enumeration Lesson 06 - SMTP Enumeration and DNS Enumeration Lesson 07 - Other Enumeration Techniques Lesson 08 - Enumeration Countermeasures Lesson 09 - Enumeration Pen Testing Module05 - Vulnerability Analysis Lesson 01 - Vulnerability Assessment Concepts Lesson 02 - Vulnerability Assessment Solutions Lesson 03 - Vulnerability Scoring Systems Lesson 04 - Vulnerability Assessment Tools Lesson 05 - Vulnerability Assessment Reports www.securiumsolutions.org support@securiumsolutions.org
  • 8. Module06 - System Hacking Lesson 01 - System Hacking Concepts Lesson 02 - Cracking Passwords Lesson 03 - Escalating Privileges Lesson 04 - Executing Applications Lesson 05 - Hiding Files Lesson 06 - Covering Tracks Lesson 07 - Penetration Testing Module07 - Malware Threats Lesson 01 - Malware Concepts Lesson 02 - Trojan Concepts Lesson 03 - Virus and Worm Concepts Lesson 04 - Malware Analysis Lesson 05 - Countermeasures Lesson 06 - Anti-Malware Software Lesson 07 - Malware Penetration Testing Module08 - Sniffing Lesson 01 - Sniffing Concepts Lesson 02 - Sniffing Technique: MAC Attacks Lesson 03 - Sniffing Technique: DHCP Attacks Lesson 04 - Sniffing Technique: ARP Poisoning Lesson 05 - Sniffing Technique: Spoofing Attacks Lesson 06 - Sniffing Technique: DNS Poisoning Lesson 07 - Sniffing Tools Lesson 08 - Countermeasures Lesson 09 - Sniffing Detection Techniques Lesson 10 - Sniffing Pen Testing www.securiumsolutions.org support@securiumsolutions.org
  • 9. Module09 - Social Engineering Lesson 01 - Social Engineering Concepts Lesson 02 - Social Engineering Techniques Lesson 03 - Insider Threats Lesson 04 - Impersonation on Social Networking Sites Lesson 05 - Identity Theft Lesson 06 - Countermeasures Lesson 07 - Social Engineering Penetration Testing Module10 - Denial-of-Service Lesson 01 - DoS/DDoS Concepts Lesson 02 - DoS/DDoS Attack Techniques Lesson 03 - Botnets Lesson 04 - DDoS Case Study Lesson 05 - DoS/DDoS Attack Tools Lesson 06 - Countermeasures Lesson 07 - DoS/DDoS Protection Tools Lesson 08 - DoS/DDoS Attack Penetration Testing Module11 - Session Hijacking Lesson 01 - Session Hijacking Concepts Lesson 02 - Application Level Session Hijacking Lesson 03 - Network Level Session Hijacking Lesson 04 - Session Hijacking Tools Lesson 05 - Countermeasures Lesson 06 - Penetration Testing www.securiumsolutions.org support@securiumsolutions.org
  • 10. Module12 - Evading IDS, Firewalls, and Honeypots Lesson 01 - IDS, Firewall and Honeypot Concepts Lesson 02 - IDS, Firewall and Honeypot Solutions Lesson 03 - Evading IDS Lesson 04 - Evading Firewalls Lesson 05 - IDS/Firewall Evading Tools Lesson 06 - Detecting Honeypots Lesson 07 - IDS/Firewall Evasion Countermeasures Lesson 08 - Penetration Testing Module13 - Hacking Web Servers Lesson 01 - Web Server Concepts Lesson 02 - Web Server Attacks Lesson 03 - Web Server Attack Methodology Lesson 04 - Web Server Attack Tools Lesson 05 - Countermeasures Lesson 06 - Patch Management Lesson 07 - Web Server Security Tools Lesson 08 - Web Server Pen Testing Module14 - Hacking Web Applications Lesson 01 - Web App Concepts Lesson 02 - Web App Threats Lesson 03 - Hacking Methodology Lesson 04 - Web Application Hacking Tools Lesson 05 - Countermeasures Lesson 06 - Web App Security Testing Tools Lesson 07 - Web App Pen Testing www.securiumsolutions.org support@securiumsolutions.org
  • 11. Module15 - SQL Injection Lesson 01 - SQL Injection Concepts Lesson 02 - Types of SQL Injection Lesson 03 - SQL Injection Methodology Lesson 04 - SQL Injection Tools Lesson 05 - Evasion Techniques Lesson 06 - Countermeasures Module16 - Hacking Wireless Networks Lesson 01 - Wireless Concepts Lesson 02 - Wireless Encryption Lesson 03 - Wireless Threats Lesson 04 - Wireless Hacking Methodology Lesson 05 - Wireless Hacking Tools Lesson 06 - Bluetooth Hacking Lesson 07 - Countermeasures Lesson 08 - Wireless Security Tools Lesson 09 - Wi-Fi Pen Testing Module17 - Hacking Mobile Platforms Lesson 01 - Mobile Platform Attack Vectors Lesson 02 - Hacking Android OS Lesson 03 - Hacking iOS Lesson 04 - Mobile Spyware Lesson 05 - Mobile Device Management Lesson 06 - Mobile Security Guidelines and Tools Lesson 07 - Mobile Pen Testing www.securiumsolutions.org support@securiumsolutions.org
  • 12. Module18 - IoT Hacking Lesson 01- IoT Concepts Lesson 02- IoT Attacks Lesson 03- IoT Hacking Methodology Lesson 04- IoT Hacking Tools Lesson 05- Countermeasures Lesson 06- IoT Pen Testing Module19 - Cloud Computing Lesson 01 - Cloud Computing Concepts Lesson 02 - Cloud Computing Threats Lesson 03 - Cloud Computing Attacks Lesson 04 - Cloud Security Lesson 05 - Cloud Security Tools Lesson 06 - Cloud Penetration Testing Module20 - Cryptography Lesson 01 - Cryptography Concepts Lesson 02 - Encryption Algorithms Lesson 03 - Cryptography Tools Lesson 04 - Public Key Infrastructure (PKI) Lesson 05 - Email Encryption Lesson 06 - Disk Encryption Lesson 07 - Cryptanalysis Lesson 08 - Countermeasures www.securiumsolutions.org support@securiumsolutions.org
  • 13. ABOUT US Overview Securium solutions is the eminent medium that provides cyber security online training courses. Our courses run under the true mentorship of digitalization that is circulated by pre-planned modules to not merely teach but educate by advanced means. Spot the difference in its approach to derive its value. Within a professional frame, our cyber security certifications online are not just for a defining point till a specific accreditation. These modules are correlated to basics which never change with advanced mechanisms. Nonetheless, our courses keep this course fragmentation at the rooted specification that doesn’t reform even after a century. We provide online training in disciplines such as Cyber Security, Cloud Computing, Project Management, Digital Marketing, and Data Science among others, where technologies and best practices are changingrapidly and demand for qualified candidates significantly exceeds supply. We have deployed training to millions of professionals and companies so they can have upgraded skills and become certified to know the worth of their organization. www.securiumsolutions.org support@securiumsolutions.org
  • 14. CONTACT US Securium Solutions Head of communications ADDRESS (INDIA): B-28, 1st Floor, Sector-01, Noida, Uttar Pradesh – 201301 ADDRESS (US): 1847 Solera Dr, Columbus, OH 43229 PHONE NUMBER (US): 1 (201) 549-9007 PHONE NUMBER (INDIA): +91 - 120 - 4310543 MOBILE NUMBER (INDIA): +91 - 931 – 062 - 4042 (WhatsApp) SKYPE: securiumsolutions EMAIL: info@securiumsolutions.org, support@securiumsolutions.org WEB: www.securiumsolutions.org www.securiumsolutions.org support@securiumsolutions.org