Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views2 pages

Course Details

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

Course Details

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CEH CEH

COURSE CONTENT Web Enumeration: CTF: Bug Bounty Hunting:


l Whois lookup Introduction
Duration: 100+ hours l l Bug Hunting
l Reverse lookup l Methods to solve l Common vulneabilities neglected
Introduction: l IP history l Lab Setup by testers
l Includes Ethical Hacking Course l Detecting Backend Technology l Intial Foothold and exploitation l Making Valid POCs
l Difference between VA & PT l Directory Fuzzing
l Domains Of VAPT l Subdomain Enumeration
l Types of VAPT l Eyewitness CTF Creation:
l Red Team vs Blue Team l Google Dorking l Introduction
l Shodan Metasploit: l Static Analysis
Linux Essentials: l Introduction l Initial Configurations
l History CMS Testing: l Information Gathering l Understanding Of services
l Lab Setup l CMS l Payloads l Researching
l OS Architecture l WPScan l Meterpreter l Implementation
l Basic Commands of Linux l JoomScan l Auxiliary l Clearing Loopholes
l Basic Commands of Windows l CMSmap l Reporting
l OS Auditing
OWASP Top 10: Fundamentals of Reverse
Web Scanners: l Injection Web VAPT Reporting: Engineering:
l Acunetix l Broken Authentication l Ways to report l Introduction
l Vega l Sensitive Data Exposure l Formatting & Guidelines of l Debugging Tools
l ZAP l XML External Entities report l Understanding of Assembly
l Nikto l Broken Access Control l Case Study
l
l Cross Site Scripting
l Insecure Deserialization Web Patch Management:
l Using Components with known l Securing Webapps
Burp Suite: vulnerabilities l Applying Input Validations
l l IP Whitelisting
l Dashboard
l Target l Implementing access control
l Proxy Web Extreme Bugs: l Removing HTTP Headers
l Intruder l Subdomain Takeover l Preventing CSRF With Token
l l Setting Login Limits
l Repeater
l Sequencer l HTTP Parameter Pollution
l Decoder l SSRF
l Comparer l CSRF
l Extender l Local File Inclusion
l Project Options l Remote File Inclusion
7 l Clickjacking 8
CEH CEH

Network VAPT: SOC & Threat Intelligence:


l Network Infrastructure l Monitoring & Detection
l Information Gathering l Log Monitoring
l Nmap Scanning l
l Nessus
l Backdoors
2016
l Compromising Dcs
l Role of AD 2015

l Post Exploitation JOB PROFILE


2014

l AV Evasion
The penetration tester 2013
l Empire frequently works as a part of
l Powershell an information technology (IT)
2012

or cyber security team. 2011

Metasploit: 0 10 20 30 40 50 60 70 80 90 100

l Introduction The kinds of jobs available are


l Information Gathering that of Network Security
Engineer, System Security
l Payloads 2016
Manager, IT Security Auditor, IT
l Auxiliary 2015

l Meterpeter Security Administrator, Web


l Armitage Security Administrator, Web
2014

Security Manager, Network 2013

Security Consultant, etc. 2012

Course Details like Duration and Cost


For Course Details
2011

0 10 20 30 40 50 60 70 80 90 100

an excellent, well-paid and importantly COURSE SPECIFICATIONS

Contact us at 8074557618 (whats app)


is an in-demand career and profession!
Instagram: @cyberblockz_official If you are interested in a career in Duration 100+ Hours
information security then go for it –
Check Youtube for Demo Class especially if you are just starting your
professional life. If you already work in Regular /
Batches
IT then rotating into the InfoSec space Weekends
is likely very achievable. In fact, the
majority of our students are ‘mature’ in
the sense that they have been working
for at least 10/ 15 years in IT.

9 10

You might also like