SlideShare a Scribd company logo
1 of 2
Download to read offline
The Global Skill Development Council (GSDC) is the leading third-party, Vendor-
neutral, international credentialing and certification organization. The Global Skill
Development Council (GSDC) is proud to be ANSI Accredited Member.
The American National Standards Institute (ANSI) is a private, non-profit
organization that administers and coordinates the U.S. voluntary standards and
conformity assessment system.
Global Skill Development Council
CERTIFIED ETHICAL HACKING FOUNDATION
Global Skill Development Council
GSDC
Our Accreditation:
ABOUT CERTIFICATION
GSDC's Certified Ethical Hacker (CEH)
Foundation certification is aimed towards
demonstrating knowledge of assessing the security
of computer systems by looking for weaknesses and
vulnerabilities in target systems while using the
same knowledge and tools as a malicious hacker
yet in a lawful and legitimate manner to assess the
security posture of a target system.
Organizations employ ethical hackers to invade
networks and computer systems with the help of
their coding skills to find and fix security
vulnerabilities. Certified Ethical Hacking Foundation
certification clears your fundamentals of ethical
hacking so that you can arrange frameworks with the
assent of its creator to discover security vulnerabilities.
As a Certified Ethical Hacking Foundation
certification holder, you will be able to evaluate the
security instances of an association by recognizing
vulnerabilities in the system and its framework to
make valuable decisions.
OBJECTIVES
www.gsdcouncil.org / info@gsdcouncil.org
Certified Ethical Hacking Foundation's
objective is to shape your knowledge about:
Advanced step-by-step methodologies
used by hackers
Writing virus codes
Reverse engineering, so you can better
protect corporate infrastructure from data
breaches
Advanced network packet analysis
Securing web servers
Malware threats
Advanced system penetration testing
techniques to build your network security
skillset and beat hackers at their own game.
GSDC's Certified Ethical Hacker (CEH) Foundation
certification is aimed towards demonstrating knowledge of
assessing the security of computer systems by looking for
weaknesses and vulnerabilities in target systems TIFI
R E
E D
C
COURSE SYLLABUS
Further Information:
GSDC Technical Advisory Board :
The GSDC is the leading certification association which brings
together innovative organizations and founding thought-
leaders as Technical Advisors from over 40 countries to design
curriculum on Blockchain, Devops, Six Sigma & Agile
Certifications.
Find out more online at www.gsdcouncil.org
Target Audience
You may also be interested in:
Lean Six Sigma DevOps Practitioner
Certification Available:
Ethereum developer Blockchain Architect
Hyperledger Developer
Security officers
Auditors
Security professionals
Site administrators
Anyone who is concerned
about the integrity of the
network infrastructure.
1. Introduction to Ethical Hacking
Hacking Ethics
Legal implications of hacking.
Types of hackers
Basic Principles
White and black box test
Phases in the hacking process
2. Network Sniffing
Tools for Network Sniffing
Tools for Network Sniffing
Extracting Information
Function of HTTP headers
Extract information from HTTP headers
3. Hacking Wireless Networks
Aircrack-NG
Airodump-NG
Functions of tools within Aircrack.
ESSID&BSSID means
4. System Penetration
Intel Gathering
Information on a target online
Information on a target within a network
Software Tools (Nmap, Metasploit)
Can scan a target
How to combine tools
Fingerprinting and Vulnerabilities
How to find vulnerabilities based on scanning results
How to combine tools
Fingerprinting and Vulnerabilities
How to find vulnerabilities based on scanning results
Banual fingerprinting
Exploitation and Post Exploitation
Vulnerability with Metasploit
System information after exploitation
5.Dimensionality Reduction
Database Attacks
Test for SQLi vulnerabilities
Extracting data with SQLi
CONCAT, LOAD_FILE, UNION, SELECT,
@version, ORDER BY, LIMIT
Client Side Attacks
Create an XSS PoC (Proof of Concept)
Basics of session hijacking i/c/w XSS
Basic XSS filters
Server Side Attacks
RFI
PHP shells such as r57 and c99
Bind & Back connect shells
BENEFITS
Enhanced correspondence using regular wording crosswise over Ethical Hacking More return on investment
Cyber Security strategies enable associations to understand the advantages of items and possibly a prior rate of return while
items are being produced and moved forward
Build up a reasonable meaning of how an ethical hacking approach saves your organization from attacks.
Greater Employability

More Related Content

Similar to Ethical Hacking Certification.pdf

Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical HackerPiotrPatun
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Ethical Hacking Training
Ethical Hacking TrainingEthical Hacking Training
Ethical Hacking TrainingNovel Vista
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical HackingKoenig Solutions Ltd.
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric VanderburgEric Vanderburg
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hackingNigam Dave
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfinfosecTrain
 

Similar to Ethical Hacking Certification.pdf (20)

CAIF.pdf
CAIF.pdfCAIF.pdf
CAIF.pdf
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical Hacking Training
Ethical Hacking TrainingEthical Hacking Training
Ethical Hacking Training
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Super1
Super1Super1
Super1
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Ethical Hacking Certification.pdf

  • 1. The Global Skill Development Council (GSDC) is the leading third-party, Vendor- neutral, international credentialing and certification organization. The Global Skill Development Council (GSDC) is proud to be ANSI Accredited Member. The American National Standards Institute (ANSI) is a private, non-profit organization that administers and coordinates the U.S. voluntary standards and conformity assessment system. Global Skill Development Council CERTIFIED ETHICAL HACKING FOUNDATION Global Skill Development Council GSDC Our Accreditation: ABOUT CERTIFICATION GSDC's Certified Ethical Hacker (CEH) Foundation certification is aimed towards demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems while using the same knowledge and tools as a malicious hacker yet in a lawful and legitimate manner to assess the security posture of a target system. Organizations employ ethical hackers to invade networks and computer systems with the help of their coding skills to find and fix security vulnerabilities. Certified Ethical Hacking Foundation certification clears your fundamentals of ethical hacking so that you can arrange frameworks with the assent of its creator to discover security vulnerabilities. As a Certified Ethical Hacking Foundation certification holder, you will be able to evaluate the security instances of an association by recognizing vulnerabilities in the system and its framework to make valuable decisions. OBJECTIVES www.gsdcouncil.org / info@gsdcouncil.org Certified Ethical Hacking Foundation's objective is to shape your knowledge about: Advanced step-by-step methodologies used by hackers Writing virus codes Reverse engineering, so you can better protect corporate infrastructure from data breaches Advanced network packet analysis Securing web servers Malware threats Advanced system penetration testing techniques to build your network security skillset and beat hackers at their own game. GSDC's Certified Ethical Hacker (CEH) Foundation certification is aimed towards demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems TIFI R E E D C
  • 2. COURSE SYLLABUS Further Information: GSDC Technical Advisory Board : The GSDC is the leading certification association which brings together innovative organizations and founding thought- leaders as Technical Advisors from over 40 countries to design curriculum on Blockchain, Devops, Six Sigma & Agile Certifications. Find out more online at www.gsdcouncil.org Target Audience You may also be interested in: Lean Six Sigma DevOps Practitioner Certification Available: Ethereum developer Blockchain Architect Hyperledger Developer Security officers Auditors Security professionals Site administrators Anyone who is concerned about the integrity of the network infrastructure. 1. Introduction to Ethical Hacking Hacking Ethics Legal implications of hacking. Types of hackers Basic Principles White and black box test Phases in the hacking process 2. Network Sniffing Tools for Network Sniffing Tools for Network Sniffing Extracting Information Function of HTTP headers Extract information from HTTP headers 3. Hacking Wireless Networks Aircrack-NG Airodump-NG Functions of tools within Aircrack. ESSID&BSSID means 4. System Penetration Intel Gathering Information on a target online Information on a target within a network Software Tools (Nmap, Metasploit) Can scan a target How to combine tools Fingerprinting and Vulnerabilities How to find vulnerabilities based on scanning results How to combine tools Fingerprinting and Vulnerabilities How to find vulnerabilities based on scanning results Banual fingerprinting Exploitation and Post Exploitation Vulnerability with Metasploit System information after exploitation 5.Dimensionality Reduction Database Attacks Test for SQLi vulnerabilities Extracting data with SQLi CONCAT, LOAD_FILE, UNION, SELECT, @version, ORDER BY, LIMIT Client Side Attacks Create an XSS PoC (Proof of Concept) Basics of session hijacking i/c/w XSS Basic XSS filters Server Side Attacks RFI PHP shells such as r57 and c99 Bind & Back connect shells BENEFITS Enhanced correspondence using regular wording crosswise over Ethical Hacking More return on investment Cyber Security strategies enable associations to understand the advantages of items and possibly a prior rate of return while items are being produced and moved forward Build up a reasonable meaning of how an ethical hacking approach saves your organization from attacks. Greater Employability