Certified Ethical Hacker (CEHv13)

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating
hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries,
and governments worldwide.
In its 13th version, the Certified Ethical Hacker provides comprehensive training, hands-
on learning labs, practice cyber ranges for engagement, certification assessments, cyber
competitions, and opportunities for continuous learning into one comprehensive program
curated through our new learning framework:
1. Learn 2. Certify 3. Engage 4. Compete.
Certified Ethical Hacker (CEHv13) – Course Objectives
After completing this course, students will be able to
- Introduction to Ethical Hacking
- Footprinting, Scanning, and Enumeration
- Hacking Web servers and Web applications
- DoS, SQL injection, Buffer overflow attacks
- Cryptography
- Wireless hacking
- Linux Hacking
- Phishing
- Countermeasures
Target Audience
- IT Professional
- Network Professional
- Network Admin
- System Engineer
Course Pre-Requisites
- An ethical hacker must have excellent computer networking and programming skills.
- An ethical hacker must be cautious, vigilant, and diligent in seeking to search and wait for the required results.
- An ethical hacker should always be wise enough to consider the scenario and certain users’ mindset, to utilize social engineering exploitations. A good ethical hacker still requires excellent problem-solving skills.
- Ethical hackers do require street smarts, people’s talents, and also manipulation skills.
- You need to keep up to date with new technologies, vulnerabilities, and exploitation techniques.
Course Summary
Course Fee
৳ 17,500
Training Method
Offline/Online
Total Modules
19
Course Duration
40 Hours
Total Session
20
Class Duration
2 Hours

Certified Ethical Hacker (CEHv13) Training - Details Course Outlines
Module-01
Introduction to Ethical Hacking
- Information Security Overview
- Hacking Concepts and Hacker Classes
- Ethical Hacking Concepts
- Hacking Methodologies and Frameworks
- Information Security Controls
- Information Security Laws and Standards
Module-02
Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Internet Research Services
- Footprinting through Social Networking Sites
- Whois Footprinting
- DNS Footprinting
- Network and Email Footprinting
- Footprinting through Social Engineering
- Footprinting Tasks using Advanced Tools and AI
- Footprinting Countermeasures
Module-03
Scanning Networks
- Network Scanning Concepts
- Host Discovery
- Port and Service Discovery
- OS Discovery
- Scanning Beyond IDS and Firewall
- Network Scanning Countermeasures
Module-04
Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP and LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
Module-05
Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
Module-06
System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Module-07
Malware Threats
- Malware and APT Concepts
- Fileless Malware Concepts
- Al-based Malware Concepts
- Malware Analysis
- Malware Countermeasures
Module-08
Sniffing
- Sniffing Concepts
- Sniffing Techniques
- Sniffing Tools
- Sniffing Countermeasures
Module-09
Social Engineering
- Social Engineering Concepts
- Human-based Social Engineering Techniques
- Computer-based Social Engineering Techniques
- Mobile-based Social Engineering Techniques
- Social Engineering Countermeasures
Module-10
Denial-of-Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures
Module-11
Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Countermeasures
Module-12
Evading IDS, Firewalls, and Honeypots
- IDS, IPS, and Firewall Concepts
- IDS, IPS, and Firewall Solutions
- Evading IDS/Firewalls
- Evading NAC and Endpoint Security
- Honeypot Concepts and Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
Module-13
Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
Module-14
Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API and Webhooks
- Web Application Security
Module-15
SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- Evasion Techniques
- SQL Injection Countermeasures
Module-16
Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Attack Countermeasures
Module-17
Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
Module-18
IoT and OT Hacking
- IoT Concepts and Attacks
- IoT Hacking Methodology
- IoT Attack Countermeasures
- OT Concepts and Attacks
- OT Hacking Methodology
- OT Attack Countermeasures
Module-19
Cloud Computing
- Cloud Computing Concepts
- Cloud Computing Threats
- Cloud Hacking
- AWS Hacking
- Microsoft Azure Hacking
- Google Cloud Hacking
- Container Hacking
- Cloud Security
Module-20
Cryptography
- Cryptography Concepts and Encryption Algorithms
- Applications of Cryptography
- Cryptanalysis Methods and Cryptography Attacks
- Cryptography Attack Countermeasures