CEH CEH
COURSE CONTENT Web Enumeration: CTF: Bug Bounty Hunting:
l Whois lookup Introduction
Duration: 100+ hours l l Bug Hunting
l Reverse lookup l Methods to solve l Common vulneabilities neglected
Introduction: l IP history l Lab Setup by testers
l Includes Ethical Hacking Course l Detecting Backend Technology l Intial Foothold and exploitation l Making Valid POCs
l Difference between VA & PT l Directory Fuzzing
l Domains Of VAPT l Subdomain Enumeration
l Types of VAPT l Eyewitness CTF Creation:
l Red Team vs Blue Team l Google Dorking l Introduction
l Shodan Metasploit: l Static Analysis
Linux Essentials: l Introduction l Initial Configurations
l History CMS Testing: l Information Gathering l Understanding Of services
l Lab Setup l CMS l Payloads l Researching
l OS Architecture l WPScan l Meterpreter l Implementation
l Basic Commands of Linux l JoomScan l Auxiliary l Clearing Loopholes
l Basic Commands of Windows l CMSmap l Reporting
l OS Auditing
OWASP Top 10: Fundamentals of Reverse
Web Scanners: l Injection Web VAPT Reporting: Engineering:
l Acunetix l Broken Authentication l Ways to report l Introduction
l Vega l Sensitive Data Exposure l Formatting & Guidelines of l Debugging Tools
l ZAP l XML External Entities report l Understanding of Assembly
l Nikto l Broken Access Control l Case Study
l
l Cross Site Scripting
l Insecure Deserialization Web Patch Management:
l Using Components with known l Securing Webapps
Burp Suite: vulnerabilities l Applying Input Validations
l l IP Whitelisting
l Dashboard
l Target l Implementing access control
l Proxy Web Extreme Bugs: l Removing HTTP Headers
l Intruder l Subdomain Takeover l Preventing CSRF With Token
l l Setting Login Limits
l Repeater
l Sequencer l HTTP Parameter Pollution
l Decoder l SSRF
l Comparer l CSRF
l Extender l Local File Inclusion
l Project Options l Remote File Inclusion
7 l Clickjacking 8
CEH CEH
Network VAPT: SOC & Threat Intelligence:
l Network Infrastructure l Monitoring & Detection
l Information Gathering l Log Monitoring
l Nmap Scanning l
l Nessus
l Backdoors
2016
l Compromising Dcs
l Role of AD 2015
l Post Exploitation JOB PROFILE
2014
l AV Evasion
The penetration tester 2013
l Empire frequently works as a part of
l Powershell an information technology (IT)
2012
or cyber security team. 2011
Metasploit: 0 10 20 30 40 50 60 70 80 90 100
l Introduction The kinds of jobs available are
l Information Gathering that of Network Security
Engineer, System Security
l Payloads 2016
Manager, IT Security Auditor, IT
l Auxiliary 2015
l Meterpeter Security Administrator, Web
l Armitage Security Administrator, Web
2014
Security Manager, Network 2013
Security Consultant, etc. 2012
Course Details like Duration and Cost
For Course Details
2011
0 10 20 30 40 50 60 70 80 90 100
an excellent, well-paid and importantly COURSE SPECIFICATIONS
Contact us at 8074557618 (whats app)
is an in-demand career and profession!
Instagram: @cyberblockz_official If you are interested in a career in Duration 100+ Hours
information security then go for it –
Check Youtube for Demo Class especially if you are just starting your
professional life. If you already work in Regular /
Batches
IT then rotating into the InfoSec space Weekends
is likely very achievable. In fact, the
majority of our students are ‘mature’ in
the sense that they have been working
for at least 10/ 15 years in IT.
9 10