Home
About us
Courses
Schools
School of Decentralized Economics
School of Cyber Resilience
School of Intelligent Systems
School of Design Thinking
Partners
Certification & Knowledge Partner
Academic Partner
Hiring Partner
Delivery Partner
Affiliate Partner
Hybrid Center Partner
3.0uni SANDBOX
Blog
3.0 TV
Home
About us
Courses
Schools
School of Decentralized Economics
School of Cyber Resilience
School of Intelligent Systems
School of Design Thinking
Partners
Certification & Knowledge Partner
Academic Partner
Hiring Partner
Delivery Partner
Affiliate Partner
Hybrid Center Partner
3.0uni SANDBOX
Blog
3.0 TV
Login
₹
0.00
0
Cart
Curriculum
21 Sections
46 Lessons
Lifetime
Expand all sections
Collapse all sections
Module 1 : Introduction to Ethical Hacking
4
1.0
Certified Ethical Hacker Orientation Session
1.1
Introduction to Certified Ethical Hacker Session 02
1.2
Introduction to Certified Ethical Hacking Session 03
1.3
CEHv13 Module 1 : Introduction to Ethical Hacking
25 Questions
Module 2 : Foot Printing and Reconnaissance
3
2.0
CEHv13 Foot Printing and Reconnaissance Session 01
2.1
CEHv13 Foot Printing and Reconnaissance Session 02
2.2
CEHv13 Module 2 : Footprinting and Reconnaissance
25 Questions
Module 3 : Scanning Networks
2
3.0
CEHv13 Scanning Networks Session
3.1
CEHv13 Module 3: Scanning Networks
25 Questions
Module 4 : Enumeration
2
4.0
CEHv13 Enumeration Session
4.1
CEHv13 Module 4: Enumeration
25 Questions
Certified Ethical Hacker v13 Program Sessions
24
5.0
CEHv13 Module 5: Vulnerability Analysis
25 Questions
5.1
CEHv13 Session 08
5.2
CEHv13 Session 09
5.3
CEHv13 Session 10
5.4
CEHv13 Session 11
5.5
CEHv13 Session 12
5.6
CEHv13 Session 13
5.7
CEHv13 Session 14
5.8
CEHv13 Session 15
5.9
CEHv13 Session 16
5.10
CEHv13 Session 17
5.11
CEHv13 Session 18
5.12
CEHv13 Session 19
5.13
CEHv13 Session 20
5.14
CEHv13 Session 21
5.15
CEHv13 Session 22
5.16
CEHv13 Session 23
5.17
CEHv13 Session 24
5.18
CEHv13 Session 25
5.19
CEHv13 Session 26
5.20
CEHv13 Session 27
5.21
CEHv13 Session 28
5.22
CEHv13 Exam taking strategies Session 01
5.23
CEHv13 Exam taking strategies Session 02
Module 5 : Vulnerability Analysis
1
6.0
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 6 : System Hacking
1
7.0
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Module 7 : Malware Threats
1
8.0
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Module 8 : Sniffing
1
9.0
Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 9 : Social Engineering
1
10.0
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10 : Denial-of-Service
1
11.0
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11 : Session Hijacking
1
12.0
Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Module 12 : Evading IDS, Firewalls, and Honeypots
1
13.0
Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Module 13 : Hacking Web Servers
1
14.0
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14 : Hacking Web Applications
1
15.0
Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.
Module 15 : SQL Injection
1
16.0
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16 : Hacking Wireless Networks
1
17.0
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17 : Hacking Mobile Platforms
1
18.0
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18 : IoT Hacking
1
19.0
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19 : Cloud Computing
1
20.0
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Module 20 : Cryptography
1
21.0
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
This content is protected, please
login
and
enroll
in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content