Contact us

#CEHv12 | EC Council

Certified Ethical Hacker - CEH v12 Course | Ec Council

"Unleash Your Inner Hacker: Become a Certified Ethical Hacker and Master the Art of Securing Digital Systems with EC Council's CEH v12 Certification Course!" 300+ Videos, 130+ labs | 30+ Hours of learning | 21+ Modules


 19 Modules | 320 Sessions | 30 hour 42 min 6 sec Total Time

91% off  INR  26500
Life-time Access | Certification
Instructor: SiemHunters Language: English

Our Students Working With

About the course


Certified Ethical Hacker (CEH) v12 is a professional certification program offered by Ec Council. This course enables learners to understand and master the tools and techniques used by hackers to infiltrate computer systems and networks. By learning the methodologies and tactics employed by these hackers, individuals can develop effective countermeasures to protect their organizations from potential cyber threats.

Key Highlights:

  • Coverage of the latest hacking techniques and tools
  • In-depth understanding of different attack vectors
  • Hands-on experience with various hacking techniques
  • Knowledge of the current security systems and their vulnerabilities
  • Recognized certification in the field of ethical hacking

What you will learn:

  • Introduction to Ethical Hacking
    This module provides an overview of ethical hacking, its key concepts, and the legal and ethical aspects of hacking.
  • Footprinting and Reconnaissance
    Learners will understand the techniques used to gather information about targets, such as scanning, enumeration, and mapping networks.
  • Scanning Networks
    This module covers network scanning techniques, including host discovery, port scanning, and vulnerability scanning.
  • Enumeration
    Students will learn about the process of extracting user names, machine names, network shares, and other network resources from a system or network.
  • Vulnerability Analysis
    This module focuses on vulnerability assessment and identification of security loopholes within systems and networks.
  • System Hacking
    Participants will gain insights into various ways to gain unauthorized access to systems to exploit vulnerabilities.
  • Malware Threats
    This section covers different types of malware, including viruses, worms, Trojans, and ransomware.
  • Sniffing
    Students will learn about network sniffing techniques, such as ARP poisoning and packet capturing.
  • Social Engineering
    This module provides an understanding of social engineering techniques used to manipulate individuals and gain unauthorized access to systems.
  • Denial-of-Service
    Learners will explore denial-of-service attacks and their impact on network resources and availability.
  • Session Hijacking
    This module covers various methods to hijack and tamper with network sessions.
  • Evading IDS, Firewalls, and Honeypots
    Participants will gain insights into techniques for avoiding detection by intrusion detection systems, firewalls, and honeypots.
  • Hacking Web Servers
    This section focuses on vulnerabilities associated with web servers and methods to exploit them.
  • Hacking Web Applications
    Learners will learn about web application vulnerabilities and techniques to identify and exploit them.
  • SQL Injection
    This module covers SQL injection attacks, prevention measures, and techniques for detection.
  • Hacking Wireless Networks
    Students will gain knowledge about vulnerabilities in wireless networks and methods of exploiting them.

Course Curriculum

Course Feedback

Launch your GraphyLaunch your Graphy
100K+ creators trust Graphy to teach online
SiemHunters 2024 Privacy policy Terms of use Contact us Refund policy