Certified Ethical Hacker (CEHv12)

Cyber Security & Ethical Hacking Training in dhaka
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands- on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

Certified Ethical Hacker (CEHv12) – Course Objectives

After completing this course, students will be able to
  • Introduction to Ethical Hacking
  • Footprinting, Scanning, and Enumeration
  • Hacking Web servers and Web applications
  • DoS, SQL injection, Buffer overflow attacks
  • Cryptography
  • Wireless hacking
  • Linux Hacking
  • Phishing
  • Countermeasures

Target Audience


Course Pre-Requisites

  • An ethical hacker must have excellent computer networking and programming skills.
  • An ethical hacker must be cautious, vigilant, and diligent in seeking to search and wait for the required results.
  • An ethical hacker should always be wise enough to consider the scenario and certain users’ mindset, to utilize social engineering exploitations. A good ethical hacker still requires excellent problem-solving skills.
  • Ethical hackers do require street smarts, people’s talents, and also manipulation skills.
  • You need to keep up to date with new technologies, vulnerabilities, and exploitation techniques.

Course Summary

Course Fee

৳ 17,500

Training Method

Offline/Online

Total Modules

19

Course Duration

40 Hours

Total Session

20

Class Duration

2 Hours

Certified Ethical Hacker (CEHv12) Training - Details Course Outlines

Module-01

Introduction to Ethical Hacking

Module-02

Foot printing and Reconnaissance

Module-03

Scanning Networks

Module-04

Enumeration

Module-05

Vulnerability Analysis

Module-06

System Hacking

Module-07

Malware Threats

Module-08

Sniffing

Module-09

Social Engineering

Module-10

Denial-of-Service

Module-11

Session Hijacking

Module-12

Evading IDS, Firewalls, and Honeypots

Module-13

Hacking Web Servers

Module-14

SQL Injection

Module-15

Hacking Wireless Networks

Module-16

Hacking Mobile Platforms

Module-17

IoT and OT Hacking

Module-18

Cloud Computing

Module-19

Cryptography