CEH Certified Ethical Hacker in noida by amirit techservices

 40 hours of instructor-led training

 Accredited Training Partner (ATP) of EC-Council

 Study Material(e-Kit) by EC Council


 Covers 20 current security domains and 340 attack technologies

Classroom Training

✔ Classroom training is considered the most effective form of learning.
✔ Develops important personality and career building skills.
✔ Technology-Based Learning. Common methods of learning via technology include.

Campus Training

✔ Online assessment program during campus placement.
✔ Campus learning is a premium option for campus instruction
✔ 24*7 learning assistance and support

Corporate House Training

✔ Flexible pricing options
✔ Enterprise grade Learning Management System (LMS)
✔ Enterprise dashboards for individuals and teams
✔ 24×7 learner assistance and support

Interactive Workshop

✔ A workshop is a great way for someone to learn about a particular subject.
✔ Workshop are usually longer often 1 to 2 days
✔ Seminars are usually 90 minutes to 3 hours
✔ A training workshop is a type of interactive training

Online Training

✔ Online training is effective for training across multiple locations.
✔ 24×7 learner assistance and support.
✔ Amirit Techservices online course platform is one of the most well-known sources of education via the internet.

CEH Training

 

Module 01: Introduction to Ethical Hacking

  • Information Security Overview
    • Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
    • Essential Terminology
    • Elements of Information Security
    • The Security, Functionality, and Usability Triangle
  • Information Security Threats and Attack Vectors
    • Motives, Goals, and Objectives of Information Security Attacks
    • Top Information Security Attack Vectors
    • Information Security Threat Categories
    • Types of Attacks on a System
    • Information Warfare
  • Hacking Concepts
    • What is Hacking?
    • Who is a Hacker?
    • Hacker Classes
    • Hacking Phases
      • Reconnaissance
      • Scanning
      • Gaining Access
      • Maintaining Access
      • Clearing Tracks
  • Ethical Hacking Concepts
    • What is Ethical Hacking?
    • Why Ethical Hacking is Necessary
    • Scope and Limitations of Ethical Hacking
    • Skills of an Ethical Hacker
  • Information Security Controls
    • Information Assurance (IA)
    • Information Security Management Program
    • Enterprise Information Security Architecture (EISA)
    • Network Security Zoning
    • Defense-in-Depth
    • Information Security Policies
      • Types of Security Policies
      • Examples of Security Policies
      • Privacy Policies at Workplace
      • Steps to Create and Implement Security Policie
      • HR/Legal Implications of Security Policy Enforcement
    • Physical Security
      • Types of Physical Security Control
      • Physical Security Controls
    • What is Risk?
      • Risk Management
      • Key Roles and Responsibilities in Risk Management
    • Threat Modeling
    • Incident Management
      • Incident Management Process
      • Responsibilities of an Incident Response Team
    • Security Incident and Event Management (SIEM)
      • SIEM Architecture
    • User Behavior Analytics (UBA)
    • Network Security Controls
      • Access Control
      • Types of Access Control
      • User Identification, Authentication, Authorization and Accounting
    • Identity and Access Management (IAM)
    • Data Leakage
      • Data Leakage Threats
      • What is Data Loss Prevention (DLP)?
    • Data Backup
    • Data Recovery
    • Role of AI/ML in Cyber Security
  • Penetration Testing Concepts
    • Penetration Testing
    • Why Penetration Testing
    • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
    • Blue Teaming/Red Teaming
    • Types of Penetration Testing
    • Phases of Penetration Testing
    • Security Testing Methodology
  • Information Security Laws and Standards
    • Payment Card Industry Data Security Standard (PCI-DSS)
    • ISO/IEC 27001:2013
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Sarbanes Oxley Act (SOX)
    • The Digital Millennium Copyright Act (DMCA)
    • Federal Information Security Management Act (FISMA)
    • Cyber Law in Different Countries

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

  • Enumeration Concepts
    • What is Enumeration?
    • Techniques for Enumeration
    • Services and Ports to Enumerate
  • NetBIOS Enumeration
    • NetBIOS Enumeration
    • NetBIOS Enumeration Tools
    • Enumerating User Accounts
    • Enumerating Shared Resources Using Net View
  • SNMP Enumeration
    • SNMP (Simple Network Management Protocol) Enumeration
    • Working of SNMP
    • Management Information Base (MIB)
    • SNMP Enumeration Tools
  • LDAP Enumeration
    • LDAP Enumeration
    • LDAP Enumeration Tools
  • NTP Enumeration
    • NTP Enumeration
    • NTP Enumeration Commands
    • NTP Enumeration Tools
  • SMTP and DNS Enumeration
    • SMTP Enumeration
    • SMTP Enumeration Tools
    • DNS Enumeration Using Zone Transfer
  • Other Enumeration Techniques
    • IPsec Enumeration
    • VoIP Enumeration
    • RPC Enumeration
    • Unix/Linux User Enumeration
  • Enumeration Countermeasures
    • Enumeration Countermeasures
  • Enumeration Pen Testing
    • Enumeration Pen Testing

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

  • Malware Concepts
    • Introduction to Malware
    • Different Ways a Malware can Get into a System
    • Common Techniques Attackers Use to Distribute Malware on the Web
    • Components of Malware Trojan Concepts
    • What is a Trojan?
    • How Hackers Use Trojans
    • Common Ports used by Trojans
    • How to Infect Systems Using a Trojan
    • Trojan Horse Construction Kit
    • Wrappers
    • Crypters
    • How Attackers Deploy a Trojan
    • Exploit Kits
    • Evading Anti-Virus Techniques
    • Types of Trojans
      • Remote Access Trojans
      • Backdoor Trojans
      • Botnet Trojans
      • Rootkit Trojans
      • E-banking Trojans
        • Working of E-banking Trojans
        • E-banking Trojan: ZeuS
      • Proxy Server Trojans
      • Covert Channel Trojans
      • Defacement Trojans
      • Service Protocol Trojans
      • Mobile Trojans
      • IoT Trojans
      • Other Trojans
  • Virus and Worm Concepts
    • Introduction to Viruses
    • Stages of Virus Life
    • Working of Viruses
    • Indications of Virus Attack
    • How does a Computer Get Infected by Viruses
    • Virus Hoaxes
    • Fake Antiviruses
    • Ransomware
    • Types of Viruses
      • System and File Viruses
      • Multipartite and Macro Viruses
      • Cluster and Stealth Viruses
      • Encryption and Sparse Infector Viruses
      • Polymorphic Viruses
      • Metamorphic Viruses
      • Overwriting File or Cavity Viruses
      • Companion/Camouflage and Shell Viruses
      • File Extension Viruses
      • FAT and Logic Bomb Viruses
      • Web Scripting and E-mail Viruses
      • Other Viruses
    • Creating Virus
    • Computer Worms
    • Worm Makers
  • Malware Analysis
    • What is Sheep Dip Computer?
    • Anti-Virus Sensor Systems
    • Introduction to Malware Analysis
    • Malware Analysis Procedure: Preparing Testbed
    • Static Malware Analysis
      • File Fingerprinting
      • Local and Online Malware Scanning
      • Performing Strings Search
      • Identifying Packing/ Obfuscation Methods o
      • Finding the Portable Executables (PE) Information o
      • Identifying File Dependencies o
      • Malware Disassembly
    • Dynamic Malware Analysis
      • Port Monitoring
      • Process Monitoring
      • Registry Monitoring
      • Windows Services Monitoring
      • Startup Programs Monitoring
      • Event Logs Monitoring/Analysis
      • Installation Monitoring
      • Files and Folder Monitoring
      • Device Drivers Monitoring
      • Network Traffic Monitoring/Analysis
      • DNS Monitoring/ Resolution API Calls Monitoring
    • Virus Detection Methods
    • Trojan Analysis: ZeuS/Zbot
    • Virus Analysis: WannaCry
  • Countermeasures
    • Trojan Countermeasures
    • Backdoor Countermeasures
    • Virus and Worms Countermeasures
  • Anti-Malware Software
    • Anti-Trojan Software
    • Antivirus Software
  • Malware Penetration Testing
    • Malware Penetration Testing

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking Session

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

1. What are the prerequisites for the certification?

2. What is the validity of my CEH exam voucher?

3. How much does the CEH certification exam cost?

4. How many attempts do I have to pass the CEH exam?

1. How are the Labs conducted?

2. Who are our instructors and how are they selected?

3. What tools do I need to attend the training sessions?

4. How long is the CEH certification valid for?