Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views4 pages

CEH Training

The document outlines a comprehensive training program for Certified Ethical Hacking (CEH), covering topics such as ethical hacking processes, reconnaissance techniques, system hacking, malware analysis, and security for various platforms. It also includes tools for information gathering and techniques like social engineering and Google Dorking. Additionally, the training addresses legal issues, compliance, and career opportunities in cybersecurity.

Uploaded by

Rajat Kundu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views4 pages

CEH Training

The document outlines a comprehensive training program for Certified Ethical Hacking (CEH), covering topics such as ethical hacking processes, reconnaissance techniques, system hacking, malware analysis, and security for various platforms. It also includes tools for information gathering and techniques like social engineering and Google Dorking. Additionally, the training addresses legal issues, compliance, and career opportunities in cybersecurity.

Uploaded by

Rajat Kundu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CEH

Training
1.Introduction to ethical hacking and the hacking process
2.Footprinting and reconnaissance techniques
3.Scanning and enumeration techniques
4.System hacking techniques and tools
5.Malware and virus analysis and removal
6.Sniffing techniques and tools
7.Social engineering and phishing attacks
8.Web application hacking and security
9.Wireless network hacking and security
10.Mobile device hacking and security

DROP Organization
CEH
Training
11. Cloud security and hacking techniques
12.Cryptography and encryption techniques
13.Network traffic analysis and packet sniffing
14.Penetration testing methodologies and techniques
15.Vulnerability assessment and management
16.Incident response and disaster recovery planning
17.Compliance and regulatory requirements for ethical hacking
18.Legal and ethical issues in ethical hacking
19.Reporting and documentation of ethical hacking activities
20.Career paths and opportunities in ethical hacking and cybersecurity.

DROP Organization
CEH Footprinting and reconnaissance are the initial stages of ethical
hacking or penetration testing, where an attacker gathers
information about a target system or network. There are
various techniques and tools available for footprinting and
reconnaissance. Here are some commonly used tools:

Training
1.Nmap: Nmap is a network scanning tool that is used to discover hosts and
services on a network, as well as to identify potential vulnerabilities.

2.Maltego: Maltego is an open-source intelligence and forensics application that is


used for data mining and information gathering. It is capable of finding
relationships between pieces of information from various sources.

3.Shodan: Shodan is a search engine for internet-connected devices. It can be used


to find open ports, vulnerable services, and other information about a target
system.

4.Whois: Whois is a protocol used to look up information about domain names,


including their owners, contact details, and registration dates.

5.Recon-ng: Recon-ng is an open-source reconnaissance framework that is used


for information gathering and reconnaissance. It includes a variety of modules for
discovering hosts, subdomains, and other information.
DROP Organization
CEH
Training
1.Google Dorking: Google Dorking is a technique used to search Google for specific
information using advanced search operators. It can be used to find sensitive
information about a target system.

1.theHarvester: theHarvester is a tool used to gather information about email


addresses, subdomains, and hosts from public sources, including search engines,
social networks, and PGP key servers.

2.Metagoofil: Metagoofil is a tool that is used to extract metadata from public


documents, such as PDFs and Word documents. It can be used to gather
information about a target system or network.

3.Social engineering: Social engineering is a technique that involves manipulating


people into divulging sensitive information. This can include phishing attacks,
pretexting, and other tactics.

DROP Organization

You might also like