1
Certified Ethical Hacker
v12 (CEH v12)
Exam Code (312-50)
About
CEHv12 Exam
• Certified Ethical Hacker Certification
• Prerequisites: None
• Domains Covered:
✔ Information Security and Ethical Hacking Overview (6%)
✔ Reconnaissance Techniques (21%)
✔ System Hacking Phases and Attack Techniques (17%)
✔ Network and Perimeter Hacking (14%)
✔ Web Application Hacking (16%)
✔ Wireless Network Hacking (6%)
✔ Mobile Platform, IoT, and OT Hacking (8%)
✔ Cloud Computing (6%)
✔ Cryptography (6%)
CEHv12:
Domains Segmentation
CEHv12:
Exam Information
Who Should
Take this Exam?
• Cybersecurity professionals who want to validate their skills
in ethical hacking and penetration testing
• Information security officers, auditors, and consultants
• Network and systems administrators
• IT professionals who are interested in understanding the
latest techniques and tools used by hackers
• Penetration testers and vulnerability analysts
• Law enforcement personnel, military personnel, and
government employees who need to understand the latest
cyber threats and defenses
• Anyone who wants to start a career in ethical hacking or
cybersecurity and needs a recognized certification to
demonstrate their knowledge and skills.
What Does
CEH v12 Exam Validates?
• Knowledge of the latest hacking techniques and tools used by
attackers
• Ability to identify and exploit vulnerabilities in network and
system infrastructure
• Understanding of various attack types and methods, including
social engineering, network attacks, and application attacks
• Knowledge of the legal and ethical considerations that must
be taken into account during penetration testing and ethical
hacking activities
• Ability to use various tools and techniques to perform
vulnerability assessments and penetration tests
• Understanding of cryptography, malware analysis, and other
key concepts in information security
• Knowledge of various operating systems, networking
protocols, and web application technologies
• Ability to create and implement security policies and
procedures to protect an organization's assets from cyber
threats
• Recognition as a qualified professional in ethical hacking and
penetration testing.
What Will
You Learn?
• Introduction to ethical hacking and penetration testing
methodologies
• System hacking and exploitation
• Incident response and disaster recovery procedures.
• Social engineering attacks and defenses
• Cryptography and steganography
4 Phase Process
Topics Covered
• Introduction to Ethical Hacking
• Foot-printing and Reconnaissance
• Scanning Networks
• Enumeration
• Vulnerability Analysis
• System Hacking
• Malware Threats
• Sniffing
• Social Engineering
• Denial-of-Service
• Session Hijacking
• Evading IDS, Firewalls, and Honeypots
• Hacking Web Servers
• Hacking Web Applications
• SQL Injection
• Hacking Wireless Networks and Mobile Platforms
• IoT Hacking
• Cloud Computing and Cryptography
Thank You

Introduction to CEHv12..pptx

  • 1.
    1 Certified Ethical Hacker v12(CEH v12) Exam Code (312-50)
  • 2.
    About CEHv12 Exam • CertifiedEthical Hacker Certification • Prerequisites: None • Domains Covered: ✔ Information Security and Ethical Hacking Overview (6%) ✔ Reconnaissance Techniques (21%) ✔ System Hacking Phases and Attack Techniques (17%) ✔ Network and Perimeter Hacking (14%) ✔ Web Application Hacking (16%) ✔ Wireless Network Hacking (6%) ✔ Mobile Platform, IoT, and OT Hacking (8%) ✔ Cloud Computing (6%) ✔ Cryptography (6%)
  • 3.
  • 4.
  • 5.
    Who Should Take thisExam? • Cybersecurity professionals who want to validate their skills in ethical hacking and penetration testing • Information security officers, auditors, and consultants • Network and systems administrators • IT professionals who are interested in understanding the latest techniques and tools used by hackers • Penetration testers and vulnerability analysts • Law enforcement personnel, military personnel, and government employees who need to understand the latest cyber threats and defenses • Anyone who wants to start a career in ethical hacking or cybersecurity and needs a recognized certification to demonstrate their knowledge and skills.
  • 6.
    What Does CEH v12Exam Validates? • Knowledge of the latest hacking techniques and tools used by attackers • Ability to identify and exploit vulnerabilities in network and system infrastructure • Understanding of various attack types and methods, including social engineering, network attacks, and application attacks • Knowledge of the legal and ethical considerations that must be taken into account during penetration testing and ethical hacking activities • Ability to use various tools and techniques to perform vulnerability assessments and penetration tests • Understanding of cryptography, malware analysis, and other key concepts in information security • Knowledge of various operating systems, networking protocols, and web application technologies • Ability to create and implement security policies and procedures to protect an organization's assets from cyber threats • Recognition as a qualified professional in ethical hacking and penetration testing.
  • 7.
    What Will You Learn? •Introduction to ethical hacking and penetration testing methodologies • System hacking and exploitation • Incident response and disaster recovery procedures. • Social engineering attacks and defenses • Cryptography and steganography
  • 8.
  • 9.
    Topics Covered • Introductionto Ethical Hacking • Foot-printing and Reconnaissance • Scanning Networks • Enumeration • Vulnerability Analysis • System Hacking • Malware Threats • Sniffing • Social Engineering • Denial-of-Service • Session Hijacking • Evading IDS, Firewalls, and Honeypots • Hacking Web Servers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks and Mobile Platforms • IoT Hacking • Cloud Computing and Cryptography
  • 10.