Certified Ethical Hacker - Rooman Technologies

Certified Ethical Hacker

Augment the Networking knowledge with In-demand Cybersecurity skills.
100% Placement Assistance | 1000+ Hiring Partners
4.5/5
6785 Learners Enrolled

Next Cohort Starts : 30 Oct, 2024

Limited number of seats available

Program Duration : 380 Hrs

At 15 - 20 hrs/week

Classroom Based

Learning format

About Program

The Certified Ethical Hacker (CEH) course is designed to equip individuals with the skills and knowledge needed to assess the security posture of computer systems and networks ethically. Participants learn various techniques used by hackers to penetrate systems, understand vulnerabilities, and exploit them. Through hands-on training, they gain insight into the mindset and methodologies of malicious actors, enabling them to anticipate and defend against potential cyber threats effectively. CEH certification is highly regarded in the cybersecurity industry and is ideal for professionals seeking to specialize in ethical hacking and penetration testing.

Course Curriculum

  • Risk Management & Incident Management
  • Information Security controls
  • Data Management
  • Concept of Penetration testing
  • Types of Penetration testing
  • Phases of Penetration testing
  • Vulnerability Assessment by Penetration testing
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to Distribute Malware on the Web
  • Components of Malware
  • Introduction to Viruses, Worms & Trojan
  • Types of Virus, Worms &Trojan
  • Fake Antiviruses
  • How Did Antivirus Works
  • Introduction to Malware Analysis
  • Malware Analysis Procedure
  • Malware Detection Method
  • Information Gathering Using Google Advanced Search and Image Search
  • VoIP and VPN Footprinting through Google Hacking Database
  • Finding Company’s Top-level Domains (TLDs) andSub-domains
  • Finding Location, People search, Professional search
  • Techniques for Enumeration, Services and Ports toEnumerate
  • NetBIOS, SNMP, LDAP Enumeration
  • Information Gathering Using Groups, Forums, and Blogs
  • Network Scanning Concepts
  • Scanning Tools and Techniques
  • Scanning Pen Testing
  • Port Scanning & Countermeasaures
  • Sniffing Concepts & Techniques
  • WireShark installing & concept
  • Sniffing Detection Techniques
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threat / Insider Attack
  • Basics to the SQL queries
  • How Injection Can be done
  • Cross Site ScrIPting Attacks
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Session Hijacking Concepts
  • Network Level Session Hijacking
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Hiding Files and Covering tracks
  • Client side Hijacking
  • Basics of Web Application and Technology stack.
  • OWASP Top 10 Application Security Risks – 2017
  • Injection Flaws
  • File Injection Attack
  • Broken Authentication
  • Sensitive Data Exposure
  • XML External Entity (XXE)
  • Broken Access Control
  • Security Misconfiguration
  • Cross-Site ScrIPting (XSS) Attacks
  • Insecure Deserialization
  • Using Components with Known Vulnerabilities
  • Web App Hacking Methodology and its foot printing
  • Password Attacks
  • Password Functionality Exploits
  • Password Guessing and Brute-forcing
  • Web Server Concepts
  • Web server attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Detecting Web Server Hacking Attempts
  • Patch Management
  • Web Server Security Tools
  • Basic of IOT, Architecture, Technology and Protocols
  • Challenges, Opportunity in IOT
  • OWASP Top 10 IOT Vulnerabilities and Obstacles
  • DDos Attack
  • Jamming Attack
  • Botnets
  • Man In middle concept
  • Data & Identity Theft
  • Introduction to Cloud & Virtualization
  • Cloud Deployment and responsibilities
  • Service Hijacking
  • Social Engineering
  • Network sniff
  • XSS attack
  • DNS (Domain Name system attack)
  • Control Layers and Responsibilities
  • Cloud Computing Security Consideration
  • Introduction to the Mobile architecture
  • Working principle for mobile OS
  • Security of the application used in Mobiles
  • Hacking Methodology for mobile with Metasploit
  • Introduction to Terminology, Networks,Standards
  • Types of Wireless Authentication and Encryption
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access)Encryption
  • WPA2 (Wi-Fi Protected Access 2) Encryption
  • Wi-Fi Discovery
  • GPS Mapping
  • Traffic canalizing
  • Launch Wireless attacks
  • Crack Wi-Fi Encryption
  • What is Firewall & Example
  • What is IDS & example
  • What is Honeypots & examples
  • Case study of Bypassing Firewall ,IDS, Firewall
  • Packet Fragmentation and Source Routing
  • Working with SNORT [DetectionTool]
  • IP address Decoy and Spoofing
  • IP Spoofing Detection Techniques: Direct TTL Probes
  • IP Spoofing Detection Techniques: IP Identification Number
  • IP Spoofing Detection Techniques: TCP Flow Control Method
  • IP Spoofing Countermeasures
  • Types of Cryptography
  • Government Access to Keys (GAK)
  • CIPhers
  • Data Encryption Standard
  • Advanced Encryption Standard
  • RC4, RC5, and RC6 Algorithms
  • Digital Signature, SSL, TLS
  • Cryptography Toolkit & Disk Encryption
  • Brute-Force Attack
  • Meet-in-the-Middle Attack on Digital Signature Scheme
  • Side Channel Attack
  • Hash Collision Attack
  • DUHK Attack
  • Rainbow Table Attack
  • Vulnerability Assessment Concept & Solutions
  • Vulnerability Assessment Tools & Reports
  • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • Understanding of Kali Linux commands
  • Using commands situation based
  • Understanding of web application
  • Web application tricks to get data
  • Doing pentesting Situation based
  • Installing and working on Kali Linux
  • Vulnerability Assessment Concept & Solutions
  • Vulnerability Assessment Tools & Reports

Salary Scale

Maximum
10 LPA
Average
4 LPA
Minimum
2.5 LPA

Job Role

Training Option

Need Guidance?

Talk to our experts on
080 4044 5566

Tools & Softwares

Certification & Quality Assurance

Our Alumni Work at

Certification Partners

What Students Say

Share processes an data secure lona need to know basis without the need

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Shams W.Pawel Founder & CEO of XpeedStudio

Behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarks grove right at the coast

Salary Scale

Maximum
10 LPA
Average
5 LPA
Minimum
3.5 LPA

Job Role

Get In Touch

Take a First Step Towards Building Your Career