

Certified Ethical Hacker (CEH) V8
- Offered byXLNC
Certified Ethical Hacker (CEH) V8 at XLNC Overview
Duration | 6 months |
Total fee | ₹1,499 |
Mode of learning | Online |
Credential | Certificate |
Certified Ethical Hacker (CEH) V8 at XLNC Highlights
- Earn a certificate of completion from XLNC
- Prepares candidates to handle information security with more clarity
Certified Ethical Hacker (CEH) V8 at XLNC Course details
- For Security officers
- For Auditors
- For Security practitioners
- For Site administrators
- A CEH ethically penetrates into network systems using various tools to test the strength of a network
- CEH v8 course shows participants how to test, scan, hack and secure networks and systems
- Get in-depth theoretical knowledge and rich practical experience in hacking test networks
- Learn perimeter defences to scan and attack own networks
- Learn various techniques such as Intrusion Detection, Social Engineering, Policy Creation, Buffer Overflows, DDoS Attacks, Virus creation etc
- CEH v8 is approved by DoD (Department of Defence) under 'Directive 8570' to include CND (Computer Network Defence) category
- The course guides security professionals through an in-depth review of the Certified Ethical Hacker (CEH) v8 exam (312-50)
- This course provides step-by-step demonstrations of the different methods and tools needed to master the exam, as well as the concepts and knowledge a professional ethical hacker needs for the real world
- The course covers all areas tested on the exam, including system hacking, network attacks, web application hacking, and cryptography
Certified Ethical Hacker (CEH) V8 at XLNC Curriculum
Introduction
Welcome
Exam Info
Course Outline
Lab Setup
Intro to Ethical Hacking
About Hacking
About hackers
Types of tests
Defenses
Methodology
Hacking tools
Backtrack 5 tour
Reconnaissance
Footprinting
Footprinting methods
Internet searching
Google hacking pt. 1
Google hacking pt. 2
Whois and dns
Defeating footprinting
Scanning
Scanning intro
Tcp scans
Icmp and udp
Scan captures
Nmap pt. 1
Nmap pt. 2
Nessus pt. 1
Nessus pt. 2
Mitigation
Enumeration
Enumeration intro
Windows enumeration pt. 1
Windows enumeration pt. 2
Linux enumeration
Network enumeration pt. 1
Network enumeration pt. 2
Mitigation
System attacks
System attacks intro
Passwords 101
Password theft
Password cracking
Cracking demo pt. 1
Cracking demo pt. 2
Steganography
System hacking tools
Netcat demo
Remote control demo
Physical security
Physical attack demo