CEH
Training
1.Introduction to ethical hacking and the hacking process
2.Footprinting and reconnaissance techniques
3.Scanning and enumeration techniques
4.System hacking techniques and tools
5.Malware and virus analysis and removal
6.Sniffing techniques and tools
7.Social engineering and phishing attacks
8.Web application hacking and security
9.Wireless network hacking and security
10.Mobile device hacking and security
DROP Organization
CEH
Training
11. Cloud security and hacking techniques
12.Cryptography and encryption techniques
13.Network traffic analysis and packet sniffing
14.Penetration testing methodologies and techniques
15.Vulnerability assessment and management
16.Incident response and disaster recovery planning
17.Compliance and regulatory requirements for ethical hacking
18.Legal and ethical issues in ethical hacking
19.Reporting and documentation of ethical hacking activities
20.Career paths and opportunities in ethical hacking and cybersecurity.
DROP Organization
CEH Footprinting and reconnaissance are the initial stages of ethical
hacking or penetration testing, where an attacker gathers
information about a target system or network. There are
various techniques and tools available for footprinting and
reconnaissance. Here are some commonly used tools:
Training
1.Nmap: Nmap is a network scanning tool that is used to discover hosts and
services on a network, as well as to identify potential vulnerabilities.
2.Maltego: Maltego is an open-source intelligence and forensics application that is
used for data mining and information gathering. It is capable of finding
relationships between pieces of information from various sources.
3.Shodan: Shodan is a search engine for internet-connected devices. It can be used
to find open ports, vulnerable services, and other information about a target
system.
4.Whois: Whois is a protocol used to look up information about domain names,
including their owners, contact details, and registration dates.
5.Recon-ng: Recon-ng is an open-source reconnaissance framework that is used
for information gathering and reconnaissance. It includes a variety of modules for
discovering hosts, subdomains, and other information.
DROP Organization
CEH
Training
1.Google Dorking: Google Dorking is a technique used to search Google for specific
information using advanced search operators. It can be used to find sensitive
information about a target system.
1.theHarvester: theHarvester is a tool used to gather information about email
addresses, subdomains, and hosts from public sources, including search engines,
social networks, and PGP key servers.
2.Metagoofil: Metagoofil is a tool that is used to extract metadata from public
documents, such as PDFs and Word documents. It can be used to gather
information about a target system or network.
3.Social engineering: Social engineering is a technique that involves manipulating
people into divulging sensitive information. This can include phishing attacks,
pretexting, and other tactics.
DROP Organization