Pour les demandes entreprises : (+212) 703173603
Pour les demandes particuliers : (+212) 702062126
The Certified Ethical Hacker (CEH v12) training provides advanced knowledge of ethical hacking techniques, tools, and methodologies used to assess and secure systems.
Module 1: Introduction to Ethical Hacking
Understanding Ethical Hacking
Ethical and Legal Considerations
Scope and Goals
Different Types of Hackers
Module 2: Footprinting and Reconnaissance
Information Gathering Techniques
Footprinting Methods
Search Engine Footprinting
Social Media Footprinting
Module 3: Network Scanning
Overview of Network Scanning
Types of Scans
Scanning Tools and Techniques
Module 4: Enumeration
Introduction to Enumeration
Enumeration Techniques
Enumerating Network Services
Module 5: Vulnerability Analysis
Identifying Vulnerabilities
Vulnerability Assessment Tools
Common Vulnerabilities and Exposures (CVE)
Module 6: System Hacking
Password Cracking
Privilege Escalation
Gaining Unauthorized Access
Module 7: Malware Threats
Introduction to Malware
Types of Malware
Malware Analysis Techniques
Module 8: Sniffing
Sniffing Concepts
Sniffing Tools
Packet Analysis
Module 9: Social Engineering
Understanding Social Engineering
Social Engineering Techniques
Mitigation Strategies
Module 10: Denial of Service (DoS)
DoS Attack Types
DoS Countermeasures
Protecting Against DoS Attacks
Module 11: Session Hijacking
Session Hijacking Concepts
Session Hijacking Techniques
Preventing Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Intrusion Detection Systems (IDS)
Firewall Evasion Techniques
Detecting and Avoiding Honeypots
Module 13: Hacking Web Servers
Web Server Architecture
Web Server Attacks
Securing Web Servers
Module 14: Hacking Web Applications
Web Application Architecture
Web Application Attacks
Web Application Security Best Practices
Module 15: SQL Injection
SQL Injection Concepts
SQL Injection Attacks
Preventing SQL Injection Attacks
Module 16: Hacking Wireless Networks
Wireless Network Basics
Wireless Security Protocols
Exploiting Wireless Networks
Module 17: Hacking Mobile Platforms
Mobile Security Challenges
Mobile Platform Vulnerabilities
Exploiting Mobile Devices
Module 18: IoT Hacking
Internet of Things (IoT) Overview
IoT Security Challenges
Exploiting IoT Devices
Module 19: Cloud Computing
Cloud Computing Fundamentals
Cloud Security Risks
Cloud Security Best Practices
Module 20: Cryptography
Cryptographic Concepts
Encryption Techniques
Cryptanalysis Attacks and Countermeasures