In this course, Which maps to the cloud computing module in version 10 of the certified module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden Cloud-deployed.
Ethical Hacking involves a hacker agreeing with an organization or individual
Cyber Security is sub-stream of Computer Science, which provides knowledge and skills required for computer operating systems, networks, and data from cyber-attacks.
It is a Graduate course that involves the study of computer science with respect to programming, operating systems, Linux, cryptography, ethical hacking and mobile, and wireless security. Candidates are taught about practical topics like operations, software design, implementation, storage, security, and multiple encryption and hacking methodologies during the course. Tools like IaaS and SaaS are also highlighted in the course. Skills like management, leadership, research, and decision-making are enhanced through the course.
The syllabus for Ethical Hacking varies for different courses. Some of the common topics that most Ethical Hacking Courses cover are as given below in the table.
Cyber Ethics-Hacking Introduction | Information Gathering |
Scanning | Google Hacking Database |
Virus, Worms - Virus Analysis | Trojans and Backdoors |
Sniffers and keyloggers | Social Engineering |
Email, DNS, IP spoofing | System Hacking and Security |
HoneyPots | - |
Certified Ethical Hacker Course is a course by Ec-Council and is recognised globally. Their modules are designed for providing a comprehensive ethical hacking and penetration testing training and covers various topics. Here is a list of topics that are covered in the Certified Ethical Hacker Course.
Introduction to Ethical Hacking | Footprinting and Reconnaissance |
Scanning Networks | Enumeration |
System Hacking | Malware Threats |
Sniffing | Social Engineering |
Denial of Service | Session Hijacking |
Hacking Web Servers | Hacking Web Applications |
SQL Injection | Hacking Wireless Networks |
Hacking Mobile Platforms | Evading IDS, Firewalls and Honeypot |
Cloud Computing | Cryptography |
CEH v11 has a total of 20 modules. The topics may differ from other versions. The modules of CEH v11 course are given below in the table.
Modules | Topics |
---|---|
1 | Introduction to Ethical Hacking |
2 | Footprinting and Reconnaissance |
3 | Scanning Networks |
4 | Enumeration |
5 | Vulnerability Analysis |
6 | System Hacking |
7 | Malware Threats |
8 | Sniffing |
9 | Social Engineering |
10 | Denial-of-Service |
11 | Session Hijacking |
12 | Evading IDS, Firewalls, and Honeypots |
13 | Hacking Web Servers |
14 | Hacking Web Applications |
15 | SQL Injection |
16 | Hacking Wireless Networks |
17 | Hacking Mobile Platforms |
18 | IoT and OT Hacking |
19 | Cloud Computing |
20 | Cryptography |
Hacking Course covers Ethical Hacking, Website Hacking and Security and Mobile and Wireless security in general. Given below in the table is a list of topics that are covered in the above-mentioned.
Ethical Hacking | |
---|---|
Information Gathering | Cyber Ethics |
Hacking Introduction | Trojans and Backdoors |
Sniffers and keyloggers | Google Hacking Database |
Virus and Virus Analysis | Email, DNS, IP spoofing |
HoneyPots | Social Engineering |
System Hacking and Security | - |
Website Hacking And Security | |
SQL Injection | XSS Attacks and Countermeasures |
LFI/ RFI Attacks and Countermeasures | Vulnerability Research |
Vulnerability Assessment and Penetration Testing | Exploit Writing |
Information Disclosure Vulnerabilities | Buffer Overflow and Session Hijacking Attacks |
Secure Coding Practices | - |
Mobile And Wireless Security | |
SMS Forging and Countermeasures | Wireless Hacking and Security |
VoIP Hacking and Countermeasures | - |
Cyber Security and Ethical Hacking Course covers various areas related to Ethical Hacking such as cloud computing, Introduction to Ethical Hacking, Denial of Service, Hacking Mobile Platforms, Social Engineering and more. The table below consists of the list of topics that are covered in various Cyber Security and Ethical Hacking Courses.
Cloud Computing | Introduction to Ethical Hacking |
Denial of Service | Hacking Mobile Platforms |
Cryptography | Hacking Web Servers |
Session Hijacking | Scanning Networks |
Social Engineering | Malware Threats |
Footprinting and Reconnaissance | SQL Injection |
Evading IDS, Firewalls and Honeypots | Enumeration |
Student Review About Course