Ethical Hacker Practical (CEH v12)

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

CEH Highlights
Demonstrate an understanding of attack vectors.
Perform network scanning to identify live and vulnerable machines in a network.
Perform OS banner grabbing, service, and user enumeration.
Perform system hacking, steganography, steganalysis attacks, and cover tracks.
Identify and use viruses, computer worms, and malware to exploit systems.
Perform packet sniffing.
Conduct a variety of web server and web application attacks, including directory traversal, parameter tampering, XSS, etc.
Perform SQL injection attacks.
Perform different types of cryptography attacks.
Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, end systems, etc.

Student Ratings & Reviews

No Review Yet
No Review Yet