CEH v12 Syllabus
CEH v12 Syllabus
CEH v12 Syllabus
Page 1
Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP
Enumeration (Day 4)
Page 2
Virus Lifecycle (Day 7)
Types of Viruses (Day 7)
Ransomware (Day 7)
Computer Worms (Day 7)
Fileless Malware (Day 7)
Malware Analysis (Day 7)
Static Malware Analysis (Day 7)
Dynamic Malware Analysis (Day 7)
Virus Detection Methods (Day 7)
Trojan Analysis (Day 7)
Virus Analysis (Day 7)
Fileless Malware Analysis (Day 7)
Anti-Trojan Software (Day 7)
Antivirus Software (Day 7)
Fileless Malware Detection Tools (Day 7)
Page 3
Module 09: Social Engineering 2 Hours - 6 Topics
Learn social engineering concepts and techniques, including how to identify theft
attempts, audit human-level vulnerabilities, and suggest social engineering
countermeasures.
Hands-On Lab Exercises:
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
Perform social engineering using Various Techniques (Day 9)
Spoof a MAC address of a Linux machine (Day 9)
Detect a phishing attack (Day 9)
Audit an organization’s security for phishing attacks (Day 9)
Key topics covered:
Social Engineering (Day 9)
Types of Social Engineering (Day 9)
Phishing (Day 9)
Phishing Tools (Day 9)
Insider Threats/Insider Attacks (Day 9)
Identity Theft (Day 9)
Page 4
Key topics covered:
Session Hijacking (Day 11)
Types of Session Hijacking (Day 11)
Spoofing (Day 11)
Application-Level Session Hijacking (Day 11)
Man-in-the-Browser Attack (Day 11)
Client-side Attacks (Day 11)
Session Replay Attacks (Day 11)
Session Fixation Attack (Day 11)
CRIME Attack (Day 11)
Network Level Session Hijacking (Day 11)
TCP/IP Hijacking (Day 11)
Session Hijacking Tools (Day 11)
Session Hijacking Detection Methods (Day 11)
Session Hijacking Prevention Tools (Day 11)
Page 5
Patch Management Tools (Day 13)
Page 6
Module 16: Hacking Wireless Networks 2 Hours - 11 Topics
Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-
Fi security tools
Hands-On Lab Exercises:
Over 3 hands-on exercises with real-life simulated targets to build skills on how to:
Foot Print a wireless network (Day 16)
Perform wireless traffic analysis (Day 16)
Crack WEP, WPA, and WPA2 networks (Day 16)
Create a rogue access point to capture data packets (Day 16)
Key topics covered:
Wireless Terminology (Day 16)
Wireless Networks (Day 16)
Wireless Encryption (Day 16)
Wireless Threats (Day 16)
Wireless Hacking Methodology (Day 16)
Wi-Fi Encryption Cracking (Day 16)
WEP/WPA/WPA2 Cracking Tools (Day 16)
Bluetooth Hacking (Day 16)
Bluetooth Threats (Day 16)
Wi-Fi Security Auditing Tools (Day 16)
Bluetooth Security Tools (Day 16)
Page 7
Module 18: IoT and OT Hacking 2 Hours - 13 Topics
Learn about packet-sniffing techniques and how to use them to discover network
vulnerabilities, as well as countermeasures to defend against sniffing attacks.
Hands-On Lab Exercises:
Over 2 hands-on exercises with real-life simulated targets to build skills on how to:
Gather information using Online foot printing tools (Day 18)
Capture and analyze IoT device traffic (Day 18)
Key topics covered:
IoT Architecture (Day 18)
IoT Communication Models (Day 18)
OWASP Top 10 IoT Threats (Day 18)
IoT Vulnerabilities (Day 18)
IoT Hacking Methodology (Day 18)
IoT Hacking Tools (Day 18)
IoT Security Tools (Day 18)
IT/OT Convergence (IIOT) (Day 18)
ICS/SCADA, OT Vulnerabilities (Day 18)
OT Attacks (Day 18)
OT Hacking Methodology (Day 18)
OT Hacking Tools (Day 18)
OT Security Tools (Day 18)
Page 8
Cloud Attacks (Day 19)
Cloud Hacking (Day 19)
Cloud Network Security (Day 19)
Cloud Security Controls (Day 19)
Cloud Security Tools (Day 19)
Page 9