SlideShare a Scribd company logo
1
Certified Ethical Hacker
v12 (CEH v12)
Exam Code (312-50)
About
CEHv12 Exam
โ€ข Certified Ethical Hacker Certification
โ€ข Prerequisites: None
โ€ข Domains Covered:
โœ” Information Security and Ethical Hacking Overview (6%)
โœ” Reconnaissance Techniques (21%)
โœ” System Hacking Phases and Attack Techniques (17%)
โœ” Network and Perimeter Hacking (14%)
โœ” Web Application Hacking (16%)
โœ” Wireless Network Hacking (6%)
โœ” Mobile Platform, IoT, and OT Hacking (8%)
โœ” Cloud Computing (6%)
โœ” Cryptography (6%)
CEHv12:
Domains Segmentation
CEHv12:
Exam Information
Who Should
Take this Exam?
โ€ข Cybersecurity professionals who want to validate their skills
in ethical hacking and penetration testing
โ€ข Information security officers, auditors, and consultants
โ€ข Network and systems administrators
โ€ข IT professionals who are interested in understanding the
latest techniques and tools used by hackers
โ€ข Penetration testers and vulnerability analysts
โ€ข Law enforcement personnel, military personnel, and
government employees who need to understand the latest
cyber threats and defenses
โ€ข Anyone who wants to start a career in ethical hacking or
cybersecurity and needs a recognized certification to
demonstrate their knowledge and skills.
What Does
CEH v12 Exam Validates?
โ€ข Knowledge of the latest hacking techniques and tools used by
attackers
โ€ข Ability to identify and exploit vulnerabilities in network and
system infrastructure
โ€ข Understanding of various attack types and methods, including
social engineering, network attacks, and application attacks
โ€ข Knowledge of the legal and ethical considerations that must
be taken into account during penetration testing and ethical
hacking activities
โ€ข Ability to use various tools and techniques to perform
vulnerability assessments and penetration tests
โ€ข Understanding of cryptography, malware analysis, and other
key concepts in information security
โ€ข Knowledge of various operating systems, networking
protocols, and web application technologies
โ€ข Ability to create and implement security policies and
procedures to protect an organization's assets from cyber
threats
โ€ข Recognition as a qualified professional in ethical hacking and
penetration testing.
What Will
You Learn?
โ€ข Introduction to ethical hacking and penetration testing
methodologies
โ€ข System hacking and exploitation
โ€ข Incident response and disaster recovery procedures.
โ€ข Social engineering attacks and defenses
โ€ข Cryptography and steganography
4 Phase Process
Topics Covered
โ€ข Introduction to Ethical Hacking
โ€ข Foot-printing and Reconnaissance
โ€ข Scanning Networks
โ€ข Enumeration
โ€ข Vulnerability Analysis
โ€ข System Hacking
โ€ข Malware Threats
โ€ข Sniffing
โ€ข Social Engineering
โ€ข Denial-of-Service
โ€ข Session Hijacking
โ€ข Evading IDS, Firewalls, and Honeypots
โ€ข Hacking Web Servers
โ€ข Hacking Web Applications
โ€ข SQL Injection
โ€ข Hacking Wireless Networks and Mobile Platforms
โ€ข IoT Hacking
โ€ข Cloud Computing and Cryptography
Thank You

More Related Content

Similar to Introduction to CEHv12..pptx

cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
ย 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Daniel Thomas
ย 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
Afaq Mansoor Khan
ย 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
PiotrPatun
ย 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
infosecTrain
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
Infosec train
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
priyanshamadhwal2
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
priyanshamadhwal2
ย 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
InfosecTrain Education
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
Infosec train
ย 
Ethical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptxEthical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptx
SamridhiJain47
ย 
Ethical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem IrfanEthical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem Irfan
Rasool Irfan
ย 
What Skills Does A Cybersecurity Analyst Need.pdf
What Skills Does A Cybersecurity Analyst Need.pdfWhat Skills Does A Cybersecurity Analyst Need.pdf
What Skills Does A Cybersecurity Analyst Need.pdf
Bytecode Security
ย 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
kaouthermejri
ย 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
Ahmed Musaad
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
ย 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
Saurabh Upadhyay
ย 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ambemPrashanthi
ย 
Visibility on the network a tactical cti-based approach
Visibility on the network   a tactical cti-based approachVisibility on the network   a tactical cti-based approach
Visibility on the network a tactical cti-based approach
Alfredo Hickman
ย 
Recruiters' guide to hire an Ethical hacker
Recruiters' guide to hire an Ethical hackerRecruiters' guide to hire an Ethical hacker
Recruiters' guide to hire an Ethical hacker
Ayman Hussein
ย 

Similar to Introduction to CEHv12..pptx (20)

cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
ย 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
ย 
Ethical Hacking - An Overview
Ethical Hacking - An OverviewEthical Hacking - An Overview
Ethical Hacking - An Overview
ย 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
ย 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
ย 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
ย 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
ย 
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
๐‹๐š๐ญ๐ž๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฉ๐“๐ˆ๐€ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐’๐˜๐ŸŽ-๐Ÿ•๐ŸŽ๐Ÿ ๐„๐ฑ๐š๐ฆ
ย 
Ethical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptxEthical Hacking Course-PPT.pptx
Ethical Hacking Course-PPT.pptx
ย 
Ethical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem IrfanEthical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem Irfan
ย 
What Skills Does A Cybersecurity Analyst Need.pdf
What Skills Does A Cybersecurity Analyst Need.pdfWhat Skills Does A Cybersecurity Analyst Need.pdf
What Skills Does A Cybersecurity Analyst Need.pdf
ย 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
ย 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
ย 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
ย 
Visibility on the network a tactical cti-based approach
Visibility on the network   a tactical cti-based approachVisibility on the network   a tactical cti-based approach
Visibility on the network a tactical cti-based approach
ย 
Recruiters' guide to hire an Ethical hacker
Recruiters' guide to hire an Ethical hackerRecruiters' guide to hire an Ethical hacker
Recruiters' guide to hire an Ethical hacker
ย 

Recently uploaded

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
Nguyen Thanh Tu Collection
ย 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
ย 
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdfู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ
ย 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
ย 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
ย 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
ย 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
ย 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
ย 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
ย 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
ย 

Recently uploaded (20)

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
ย 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
ย 
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdfู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ย 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
ย 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
ย 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
ย 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
ย 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
ย 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
ย 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
ย 

Introduction to CEHv12..pptx

  • 1. 1 Certified Ethical Hacker v12 (CEH v12) Exam Code (312-50)
  • 2. About CEHv12 Exam โ€ข Certified Ethical Hacker Certification โ€ข Prerequisites: None โ€ข Domains Covered: โœ” Information Security and Ethical Hacking Overview (6%) โœ” Reconnaissance Techniques (21%) โœ” System Hacking Phases and Attack Techniques (17%) โœ” Network and Perimeter Hacking (14%) โœ” Web Application Hacking (16%) โœ” Wireless Network Hacking (6%) โœ” Mobile Platform, IoT, and OT Hacking (8%) โœ” Cloud Computing (6%) โœ” Cryptography (6%)
  • 5. Who Should Take this Exam? โ€ข Cybersecurity professionals who want to validate their skills in ethical hacking and penetration testing โ€ข Information security officers, auditors, and consultants โ€ข Network and systems administrators โ€ข IT professionals who are interested in understanding the latest techniques and tools used by hackers โ€ข Penetration testers and vulnerability analysts โ€ข Law enforcement personnel, military personnel, and government employees who need to understand the latest cyber threats and defenses โ€ข Anyone who wants to start a career in ethical hacking or cybersecurity and needs a recognized certification to demonstrate their knowledge and skills.
  • 6. What Does CEH v12 Exam Validates? โ€ข Knowledge of the latest hacking techniques and tools used by attackers โ€ข Ability to identify and exploit vulnerabilities in network and system infrastructure โ€ข Understanding of various attack types and methods, including social engineering, network attacks, and application attacks โ€ข Knowledge of the legal and ethical considerations that must be taken into account during penetration testing and ethical hacking activities โ€ข Ability to use various tools and techniques to perform vulnerability assessments and penetration tests โ€ข Understanding of cryptography, malware analysis, and other key concepts in information security โ€ข Knowledge of various operating systems, networking protocols, and web application technologies โ€ข Ability to create and implement security policies and procedures to protect an organization's assets from cyber threats โ€ข Recognition as a qualified professional in ethical hacking and penetration testing.
  • 7. What Will You Learn? โ€ข Introduction to ethical hacking and penetration testing methodologies โ€ข System hacking and exploitation โ€ข Incident response and disaster recovery procedures. โ€ข Social engineering attacks and defenses โ€ข Cryptography and steganography
  • 9. Topics Covered โ€ข Introduction to Ethical Hacking โ€ข Foot-printing and Reconnaissance โ€ข Scanning Networks โ€ข Enumeration โ€ข Vulnerability Analysis โ€ข System Hacking โ€ข Malware Threats โ€ข Sniffing โ€ข Social Engineering โ€ข Denial-of-Service โ€ข Session Hijacking โ€ข Evading IDS, Firewalls, and Honeypots โ€ข Hacking Web Servers โ€ข Hacking Web Applications โ€ข SQL Injection โ€ข Hacking Wireless Networks and Mobile Platforms โ€ข IoT Hacking โ€ข Cloud Computing and Cryptography