BLACK FRIDAY Bonanza Deals Massive Skills | Mini Prices Up to 50% on Career Booster Combos!
D H M S

Ethical Hacking Certification Training in Durgapur
Read Reviews

The Certified Ethical Hacker (C|EH v12) program is one of the most respected certifications in the cybersecurity field. It has been the world’s number one ethical hacking certification for 20 years and is continuously ranked number one in ethical hacking certification by different firms. Infosectrain’s CEH Online Training and Certification in Durgapur follows the latest version of CEH that is v12. The updated learning framework covers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, hands-on lab and practice range experience.

Watch Intro Video

CEH v12 Course Highlights

  • 40-Hour LIVE Instructor-led Training
  • EC-Council Authorized Partner
  • Highly Interactive and Dynamic Sessions
  • Practical Training on Latest Tools
  • 98% Exam Pass Rate
  • Learn from CEI Certified Trainers
  • Career Guidance and Mentorship
  • Extended Post- Training Support
  • Access to Recorded Sessions

Accredited By

CEH v12 TRAINING CALENDAR

Choose your Preferred Learning Mode

ON DEMAND TRAINING

Learn on Your Own Time
1-to-1 learning
Customized Solutions

Contact US

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business

you were looking for your convenient time & date

REQUEST A BATCH

CEH v12 Course Description

The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity. The v13 version introduces a robust integration of AI-powered technologies and advanced techniques to enhance the learning experience and effectiveness of ethical hacking strategies.

Through hands-on labs, real-world simulations, and cutting-edge AI-driven tools, participants will become proficient in ethical hacking techniques and critical cybersecurity practices for defending against traditional and modern AI-powered threats.

 

Differences Between CEH v12 and CEH v13

CEH v12 CEH v13
Total Number of Modules 20 20
Total Number of Labs 220 91 Core Labs + 130 Self-study Labs*
Attack Techniques 519 550
New Technology Added MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, Techniques for Establishing Persistence, Evading NAC and Endpoint Security, Fog Computing, Edge Computing, and Grid Computing AI-Driven Ethical Hacking, Active Directory Attacks, Ransomware Attacks and Mitigation, AI and Machine Learning in Cybersecurity, IoT Security Challenges, Critical Infrastructure Vulnerabilities, Deepfake Threats

Target Audience

This course is ideal for:

  • Security Analysts
  • Ethical Hackers
  • System Administrators
  • Network Administrators
  • Network and Security Engineers
  • Cyber Security Managers
  • Information Security Auditors
  • Security Professionals

Pre-Requisite

  • Basic understanding of network essentials and core concepts, including server and network components.

Exam Information

Certification Name C|EH v13 (MCQ Exam) C|EH v13 (Practical Exam)
Exam Format Multiple Choice Questions iLabs Cyber Range
Number of Questions 125 Questions 20 Questions
Exam Duration 240 Minutes 360 Minutes
Passing Score 60-80% 70%
Exam Delivery VUE / ECCEXAM

GET A FREE DEMO CLASS

For
Captcha*
8 + 67 =
loader-infosectrain

CEH v12 Course Objectives

  • Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security and security measures with AI-enhanced threat detection and response.
  • Concepts, methodologies, and tools of footprinting using AI for automated information gathering and reconnaissance.
  • Concepts of vulnerability assessment, its categories and strategies, and AI-driven exposure to technologies used in the industry.
  • Social engineering concepts and terminologies, including identity theft, impersonation, insider threats, social engineering techniques, and AI-based countermeasures.
  • Operational Technology (OT) essentials, threats, attack methodologies, and AI-powered attack prevention.
  • Recognizing vulnerabilities in IoT and ensuring the safety of IoT devices using AI-based security solutions.
  • Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, cryptanalysis, and enhanced cryptographic defense.
  • Cloud computing, threats and security, AI-driven container technology, and serverless computing security measures.

CEH v12 Course Content

Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Hacking Methodologies and Frameworks
  • Information Security Controls
  • Information Security Laws and Standards

 

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Internet Research Services
  • Footprinting through Social Networking Sites
  • Whois Footprinting
  • DNS Footprinting
  • Network and Email Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tasks using Advanced Tools and AI
  • Footprinting Countermeasures

 

Module 3: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Source Port Manipulation
  • Network Scanning Countermeasures

 

Module 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures

 

Module 5: Vulnerability Analysis 

  • Vulnerability Assessment Concepts
  • Vulnerability Scoring Systems and Databases
  • Vulnerability-Management Life Cycle
  • Vulnerability Research
  • Vulnerability Scanning and Analysis
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

 

Module 6: System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs

 

Module 7: Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Viruses and Worms
  • Fileless Malware Concepts
  • AI-based Malware Concepts
  • Malware Countermeasures
  • Anti-Malware Software

 

Module 8: Sniffing

  • Sniffing Concepts
  • Sniffing Technique
  • Sniffing Tools
  • Sniffing Countermeasures

 

Module 9: Social Engineering

  • Social Engineering Concepts
  • Human-based Social Engineering Techniques
  • Computer-based Social Engineering Techniques
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures

 

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Countermeasures

 

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures

 

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection/Prevention System (IDS/IPS) Concepts
  • Firewall Concepts
  • IDS, IPS, and Firewall Solutions
  • Evading IDS/Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Concepts
  • IDS/Firewall Evasion Countermeasures

 

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management

 

Module 14: Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API and Webhooks
  • Web Application Security

 

Module 15: SQL Injections 

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • Evasion Techniques
  • SQL Injection Countermeasures

 

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Attack Countermeasures

 

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines
  • Mobile Security Tools

 

Module 18: IoT Hacking & OT Hacking

  • IoT Hacking
  • IoT Concepts and Attacks
  • IoT Hacking Methodology
  • OT Hacking

 

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Hacking
  • Cloud Hacking Methodology
  • AWS Hacking
  • Microsoft Azure Hacking
  • Google Cloud Hacking
  • Container Hacking
  • Cloud Security

 

Module 20: Cryptography

  • Cryptography Concepts and Encryption Algorithms
  • Applications of Cryptography
  • Cryptanalysis
  • Cryptography Attack Countermeasures

 

Need customized curriculum Talk to Advisor

CEH v12 Course Benefits

CEH v12 Course Benefits

Here What people are saying about InfosecTrain

Why InfosecTrain

Guaranteed* to run Courses

4 hrs/day in Weekday/Weekend

Customized Training

Technical Support Post Training

Access to the recorded session

Accredited Instructors

CEH v12 FAQs

1. What is the CEH (Certified Ethical Hacker) course?

Certified Ethical Hacker (CEH V12) certification is one of the most sought-after security qualifications in the world. This internationally recognised security certification proves that you know how to find weak spots in an organization’s network infrastructure and help stop cyberattacks.

2. How long do you need to study for the CEH exam?

Well, it depends on person to person. If you have proper guidance, stick to your schedule and use relevant resources, then 1 month is sufficient for good results.

3. Which is the best ethical hacking certification?
EC-Council’s Certified Ethical Hacker (C|EH v12) program is one of the most prestigious certifications in the cybersecurity field. For 20 years, it has held the top spot in the world for ethical hacking certification, and many firms have consistently placed it first.
4. What are the prerequisites for doing CEH certification?
In order to pursue CEH certification you must have a basic understanding of network essentials and core concepts, including server and network components.
5. What is the qualification for an ethical hacker?
It is recommended to have a bachelor’s degree in Computer Science or related discipline.
6. How many questions are on the CEH exam?
There are 125 questions in the CEH objective exam and 20 questions in the practical exam.
7. What is the pass rate for CEH?
The passing score is 60%-80% in the CEH objective exam and 70% in the practical exam.
8. Who can register for this CEH Ethical Hacking course?
Anyone who is interested in becoming an Ethical Hacker, System Administrator, Network Administrator, Engineer, Web Manager, Auditor or Security Professional can register for this course.
Active
TOP
whatsapp