This Ethical Hacking course in Australia is curated by Ethical Hacking experts who aim to make you proficient in the field of Cybersecurity and Ethical Hacking. They will teach you concepts such as sniffing attacks, footprinting, and more. Moreover, with the help of our projects, you will gain exposure and become capable of solving real-world problems. So, register for this Ethical Hacking training in Australia by Intellipaat and start your Ethical Hacking career.
Intellipaat’s Ethical Hacking courses in Australia will help you become a master in Wi-Fi chalking, MAC attacks, security controls, penetration testing, SuperScan, session hijacking, LDAP enumeration, and other important topics in Ethical Hacking.
These are the following modules that will be taught in Ethical Hacking classes in Australia –
No. There are no prerequisites to sign up for this CEH training in Australia.
The cost of the Certified Ethical Hacker course CEH v11 exam in Australia is US$100. This exam fee is non-refundable. If a candidate is not able to pass the exam on the first attempt, he/she can attempt the exam for the second time but he/she has to purchase an ECC Exam center voucher to retake the exam at a discounted price.
The following professionals are eligible to take up our Ethical Hacking training in Australia:
You should enroll in this Ethical Hacking course in Australia for the following reasons:
Talk to Us
Information Security Overview
1.1 Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
1.2 Essential Terminology
1.3 Elements of Information Security
1.4 The Security, Functionality, and Usability Triangle
Information Security Threats and Attack Vectors
1.5 Motives, Goals, and Objectives of Information Security Attacks
1.6 Top Information Security Attack Vectors
1.7 Information Security Threat Categories
1.8 Types of Attacks on a System
1.9 Information Warfare
Hacking Concepts
1.10 What is Hacking?
1.11Who is a Hacker?
1.12 Hacker Classes
1.13 Hacking Phases
Ethical Hacking Concepts
1.14 What is Ethical Hacking?
1.15 Why Ethical Hacking is Necessary
1.16 Scope and Limitations of Ethical Hacking
1.17 Skills of an Ethical Hacker
Information Security Controls
1.18 Information Assurance (IA)
1.19 Information Security Management Program
1.20 Enterprise Information Security Architecture (EISA)
1.21 Network Security Zoning
1.22 Defense-in-Depth
1.23 Information Security Policies
1.24 Physical Security
1.25 What is Risk?
1.26 Threat Modeling
1.27 Incident Management
1.28 Security Incident and Event Management (SIEM)
1.29 User Behavior Analytics (UBA)
1.30 Network Security Controls
1.31 Identity and Access Management (IAM)
1.32 Data Leakage
1.33 Data Backup
1.34 Data Recovery
1.35 Role of AI/ML in Cyber Security
Penetration Testing Concepts
1.36 Penetration Testing
1.37 Why Penetration Testing
1.38 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
1.39 Blue Teaming/Red Teaming
1.40 Types of Penetration Testing
1.41 Phases of Penetration Testing
1.42 Security Testing Methodology
Information Security Laws and Standards
1.43 Payment Card Industry Data Security Standard (PCI-DSS)
1.44 ISO/IEC 27001:2013
1.45 Health Insurance Portability and Accountability Act (HIPAA)
1.46 Sarbanes Oxley Act (SOX)
1.47 The Digital Millennium Copyright Act (DMCA)
1.48 Federal Information Security Management Act (FISMA)
1.49 Cyber Law in Different Countries
Footprinting Concepts
2.1 What is Footprinting?
2.2 Objectives of Footprinting
Footprinting through Search Engines
2.3 Footprinting through Search Engines
2.4 Footprint Using Advanced Google Hacking Techniques
2.5 Information Gathering Using Google Advanced Search and Image Search
2.6 Google Hacking Database
2.7 VoIP and VPN Footprinting through Google Hacking Database
Footprinting through Web Services
2.8 Finding Company’s Top-level Domains (TLDs) and Sub-domains
2.9 Finding the Geographical Location of the Target
2.10 People Search on Social Networking Sites and People Search Services
2.11 Gathering Information from LinkedIn
2.12 Gather Information from Financial Services
2.13 Footprinting through Job Sites
2.14 Monitoring Target Using Alerts
2.15 Information Gathering Using Groups, Forums, and Blogs
2.16 Determining the Operating System
2.17 VoIP and VPN Footprinting through SHODAN
Footprinting through Social Networking Sites
2.18 Collecting Information through Social Engineering on Social Networking Sites
Website Footprinting
2.19 Website Footprinting
2.20 Website Footprinting using Web Spiders
2.21 Mirroring Entire Website
2.22 Extracting Website Information from https://archive.org
2.23 Extracting Metadata of Public Documents
2.24 Monitoring Web Pages for Updates and Changes
Email Footprinting
2.25 Tracking Email Communications
2.26 Collecting Information from Email Header
2.27 Email Tracking Tools
Competitive Intelligence
2.28 Competitive Intelligence Gathering
2.29 Competitive Intelligence – When Did this Company Begin? How Did it Develop?
2.30 Competitive Intelligence – What Are the Company’s Plans?
2.31 Competitive Intelligence – What Expert Opinions Say About the Company
2.32 Monitoring Website Traffic of Target Company
2.33 Tracking Online Reputation of the Target
Whois Footprinting
2.34 Whois Lookup
2.35 Whois Lookup Result Analysis
2.36 Whois Lookup Tools
2.37 Finding IP Geolocation Information
DNS Footprinting
2.38 Extracting DNS Information
2.39 DNS Interrogation Tools
Network Footprinting
2.40 Locate the Network Range
2.41 Traceroute
2.42 Traceroute Analysis
2.43 Traceroute Tools
Footprinting through Social Engineering
2.44 Footprinting through Social Engineering
2.45 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
Footprinting Tools
2.46 Maltego
2.47 Recon-ng
2.48 FOCA
2.49 Recon-Dog
2.50 OSRFramework
2.51 Additional Footprinting Tools
Countermeasures
2.52 Footprinting Countermeasures
Footprinting Pen Testing
2.53 Footprinting Pen Testing
2.54 Footprinting Pen Testing Report Templates
Network Scanning Concepts
3.1 Overview of Network Scanning
3.2 TCP Communication Flags
3.3 TCP/IP Communication
3.4 Creating Custom Packet Using TCP Flags
3.5 Scanning in IPv6 Networks
Scanning Tools
3.6 Nmap
3.7 Hping2 / Hping3
3.8 Scanning Tools
3.9 Scanning Tools for Mobile
Scanning Techniques
3.10 Scanning Techniques
Scanning Beyond IDS and Firewall
3.11 IDS/Firewall Evasion Techniques
Banner Grabbing
3.12 Banner Grabbing
3.13 How to Identify Target System OS
3.14 Banner Grabbing Countermeasures
Draw Network Diagrams
3.15Â Drawing Network Diagrams
3.16Â Network Discovery and Mapping Tools
3.17Â Network Discovery Tools for Mobile
Scanning Pen Testing
3.18Â Scanning Pen Testing
Enumeration Concepts
4.1 What is Enumeration?
4.2Â Techniques for Enumeration
4.3Â Services and Ports to Enumerate
NetBIOS Enumeration
4.4Â NetBIOS Enumeration
4.5Â NetBIOS Enumeration Tools
4.6Â Enumerating User Accounts
4.7Â Enumerating Shared Resources Using Net View
SNMP Enumeration
4.8Â SNMP (Simple Network Management Protocol) Enumeration
4.9Â Working of SNMP
4.10 Management Information Base (MIB)
4.11 SNMP Enumeration Tools
LDAP Enumeration
4.12 LDAP Enumeration
4.13 LDAP Enumeration Tools
NTP Enumeration
4.14 NTP Enumeration
4.15 NTP Enumeration Commands
4.16 NTP Enumeration Tools
SMTP and DNS Enumeration
4.17 SMTP Enumeration
4.18 SMTP Enumeration Tools
4.19 DNS Enumeration Using Zone Transfer
Other Enumeration Techniques
4.20Â IPsec Enumeration
4.21Â VoIP Enumeration
4.22Â RPC Enumeration
4.23Â Unix/Linux User Enumeration
Enumeration Countermeasures
4.24Â Enumeration Countermeasures
Enumeration Pen Testing
4.25Â Enumeration Pen Testing
Vulnerability Assessment Concepts
5.1 Vulnerability Research
5.2Â Vulnerability Classification
5.3Â What is Vulnerability Assessment?
5.4Â Types of Vulnerability Assessment
5.5Â Vulnerability-Management Life Cycle
Vulnerability Assessment Solutions
5.6Â Comparing Approaches to Vulnerability Assessment
5.7Â Working of Vulnerability Scanning Solutions
5.8Â Types of Vulnerability Assessment Tools
5.9Â Characteristics of a Good Vulnerability Assessment Solution
5.10Â Choosing a Vulnerability Assessment Tool
5.11 Criteria for Choosing a Vulnerability Assessment Tool
5.12 Best Practices for Selecting Vulnerability Assessment Tools
Vulnerability Scoring Systems
5.13 Common Vulnerability Scoring System (CVSS)
5.14 Common Vulnerabilities and Exposures (CVE)
5.15 National Vulnerability Database (NVD)
5.16 Resources for Vulnerability Research
Vulnerability Assessment Tools
5.17Â Vulnerability Assessment Tools
5.18Â Vulnerability Assessment Tools for Mobile
Vulnerability Assessment Reports
5.19Â Vulnerability Assessment Reports
5.20Â Analyzing Vulnerability Scanning Report
System Hacking Concepts
6.1 CEH Hacking Methodology (CHM)
6.2Â System Hacking Goals
Cracking Passwords
6.3Â Password Cracking
6.4Â Types of Password Attacks
6.5Â Password Recovery Tools
6.6Â Microsoft Authentication
6.7Â How Hash Passwords Are Stored in Windows SAM?
6.8Â NTLM Authentication Process
6.9Â Kerberos Authentication
6.10Â Password Salting
6.11Â Tools to Extract the Password Hashes
6.12Â Password Cracking Tools
6.13Â How to Defend against Password Cracking
6.14Â How to Defend against LLMNR/NBT-NS Poisoning
Escalating Privileges
6.15Â Privilege Escalation
6.16Â Privilege Escalation Using DLL Hijacking
6.17Â Privilege Escalation by Exploiting Vulnerabilities
6.18Â Privilege Escalation Using Dylib Hijacking
6.19Â Privilege Escalation using Spectre and Meltdown Vulnerabilities
6.20Â Other Privilege Escalation Techniques
6.21Â How to Defend Against Privilege Escalation
Executing Applications
6.22Â Executing Applications
6.23 Keylogger
6.24Â Spyware
6.25Â How to Defend Against Keyloggers
6.26Â How to Defend Against Spyware
Hiding Files
6.27Â Rootkits
6.28Â NTFS Data Stream
6.29Â What is Steganography?
Covering Tracks
6.30Â Covering Tracks
6.31Â Disabling Auditing: Auditpol
6.32Â Clearing Logs
6.33Â Manually Clearing Event Logs
6.34Â Ways to Clear Online Tracks
6.35Â Covering BASH Shell Tracks
6.36Â Covering Tracks on Network
6.37Â Covering Tracks on OS
6.38Â Covering Tracks Tools
Penetration Testing
6.39Â Password Cracking
6.40Â Privilege Escalation
6.41Â Executing Applications
6.42Â Hiding Files
6.43Â Covering Tracks
Malware Concepts
7.1 Introduction to Malware
7.2Â Different Ways a Malware can Get into a System
7.3Â Common Techniques Attackers Use to Distribute Malware on the Web
7.4Â Components of Malware
Trojan Concepts
7.5Â What is a Trojan?
7.6Â How Hackers Use Trojans
7.7Â Common Ports used by Trojans
7.8Â How to Infect Systems Using a Trojan
7.9Â Trojan Horse Construction Kit
7.10Â Wrappers
7.11 Crypters
7.12 How Attackers Deploy a Trojan
7.13 Exploit Kits
7.14 Evading Anti-Virus Techniques
7.15 Types of Trojans
Virus and Worm Concepts
7.16 Introduction to Viruses
7.17 Stages of Virus Life
7.18Â Working of Viruses
7.19 Indications of Virus Attack
7.20Â How does a Computer Get Infected by Viruses
7.21Â Virus Hoaxes
7.22Â Fake Antiviruses
7.23Â Ransomware
7.24Â Types of Viruses
7.25Â Creating Virus
7.26Â Computer Worms
7.27Â Worm Makers
Malware Analysis
7.28Â What is Sheep Dip Computer?
7.29Â Anti-Virus Sensor Systems
7.30Â Introduction to Malware Analysis
7.31Â Malware Analysis Procedure: Preparing Testbed
7.32 Static Malware Analysis
7.33 Dynamic Malware Analysis
7.34 Virus Detection Methods
7.35 Trojan Analysis: ZeuS/Zbot
7.36 Virus Analysis: WannaCry
Countermeasures
7.37 Trojan Countermeasures
7.38 Backdoor Countermeasures
7.39 Virus and Worms Countermeasures
Anti-Malware Software
7.40 Anti-Trojan Software
7.41 Antivirus Software
Malware Penetration Testing
7.42 Malware Penetration Testing
Sniffing Concepts
8.1 Network Sniffing
8.2Â Types of Sniffing
8.3Â How an Attacker Hacks the Network Using Sniffers
8.4Â Protocols Vulnerable to Sniffing
8.5Â Sniffing in the Data Link Layer of the OSI Model
8.6Â Hardware Protocol Analyzers
8.7Â SPAN Port
8.8Â Wiretapping
8.9Â Lawful Interception
Sniffing Technique: MAC Attacks
8.10 MAC Address/CAM Table
8.11 How CAM Works
8.12 What Happens When CAM Table Is Full?
8.13 MAC Flooding
8.14 Switch Port Stealing
8.15 How to Defend against MAC Attacks
Sniffing Technique: DHCP Attacks
8.16 How DHCP Works
8.17 DHCP Request/Reply Messages
8.18 DHCP Starvation Attack
8.19 Rogue DHCP Server Attack
8.20Â How to Defend Against DHCP Starvation and Rogue Server Attack
Sniffing Technique: ARP Poisoning
8.21Â What Is Address Resolution Protocol (ARP)?
8.22Â ARP Spoofing Attack
8.23Â Threats of ARP Poisoning
8.24Â ARP Poisoning Tools
8.25Â How to Defend Against ARP Poisoning
8.26Â Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
8.27Â ARP Spoofing Detection Tools
Sniffing Technique: Spoofing Attacks
8.28Â MAC Spoofing/Duplicating
8.29Â MAC Spoofing Technique: Windows
8.30Â MAC Spoofing Tools
8.31Â IRDP Spoofing
8.32Â How to Defend Against MAC Spoofing
Sniffing Technique: DNS Poisoning
8.33Â DNS Poisoning Techniques
8.34Â How to Defend Against DNS Spoofing
Sniffing Tools
8.35Â Sniffing Tool: Wireshark
8.36Â Display Filters in Wireshark
8.37Â Additional Wireshark Filters
8.38Â Sniffing Tools
8.39Â Packet Sniffing Tools for Mobile
Countermeasures
8.40Â How to Defend Against Sniffing
Sniffing Detection Techniques
8.41Â How to Detect Sniffing
8.42Â Sniffer Detection Techniques
8.43Â Promiscuous Detection Tools
Sniffing Pen Testing
8.44Â Sniffing Penetration Testing
Social Engineering Concepts
9.1 What is Social Engineering?
9.2Â Phases of a Social Engineering Attack
Social Engineering Techniques
9.3Â Types of Social Engineering
9.4Â Human-based Social Engineering
9.5Â Computer-based Social Engineering
9.6Â Mobile-based Social Engineering
Insider Threats
9.7Â Insider Threat / Insider Attack
9.8Â Type of Insider Threats
Impersonation on Social Networking Sites
9.9Â Social Engineering Through Impersonation on Social Networking Sites
9.10 Impersonation on Facebook
9.11 Social Networking Threats to Corporate Networks
Identity Theft
9.12 Identity Theft
Countermeasures
9.13 Social Engineering Countermeasures
9.14Â Insider Threats Countermeasures
9.15 Identity Theft Countermeasures
9.16 How to Detect Phishing Emails?
9.17 Anti-Phishing Toolbar
9.18 Common Social Engineering Targets and Defense Strategies
Social Engineering Pen Testing
9.19 Social Engineering Pen Testing
9.20Â Social Engineering Pen Testing Tools
DoS/DDoS Concepts
10.1 What is a Denial-of-Service Attack?
10.2Â What is Distributed Denial-of-Service Attack?
DoS/DDoS Attack Techniques
10.3Â Basic Categories of DoS/DDoS Attack Vectors
10.4Â UDP Flood Attack
10.5Â ICMP Flood Attack
10.6Â Ping of Death and Smurf Attack
10.7Â SYN Flood Attack
10.8Â Fragmentation Attack
10.9Â HTTP GET/POST and Slowloris Attacks
10.10 Multi-Vector Attack
10.11 Peer-to-Peer Attacks
10.12 Permanent Denial-of-Service Attack
10.13 Distributed Reflection Denial-of-Service (DRDoS)
Botnets
10.14 Organized Cyber Crime: Organizational Chart
10.15 Botnet
10.16 A Typical Botnet Setup
10.17 Botnet Ecosystem
10.18 Scanning Methods for Finding Vulnerable Machines
10.19 How Malicious Code Propagates?
10.20 Botnet Trojans
DDoS Case Study
10.21Â DDoS Attack
10.22Â Hackers Advertise Links to Download Botnet
10.23Â Use of Mobile Devices as Botnets for Launching DDoS Attacks
10.24Â DDoS Case Study: Dyn DDoS Attack
DoS/DDoS Attack Tools
10.25Â DoS/DDoS Attack Tools
10.26Â DoS and DDoS Attack Tool for Mobile
Countermeasures
10.27Â Detection Techniques
10.28Â DoS/DDoS Countermeasure Strategies
10.29Â DDoS Attack Countermeasures
10.30Â Techniques to Defend against Botnets
10.31Â DoS/DDoS Countermeasures
10.32Â DoS/DDoS Protection at ISP Level
10.33Â Enabling TCP Intercept on Cisco IOS Software
DoS/DDoS Protection Tools
10.34Â Advanced DDoS Protection Appliances
10.35Â DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing
10.36Â Denial-of-Service (DoS) Attack Pen Testing
Session Hijacking Concepts
11.1 What is Session Hijacking?
11.2Â Why Session Hijacking is Successful?
11.3Â Session Hijacking Process
11.4Â Packet Analysis of a Local Session Hijack
11.5Â Types of Session Hijacking
11.6Â Session Hijacking in OSI Model
11.7Â Spoofing vs. Hijacking
Application Level Session Hijacking
11.8Â Application Level Session Hijacking
11.9Â Compromising Session IDs using Sniffing and by Predicting Session Token
11.10 Compromising Session IDs Using Man-in-the-Middle Attack
11.11 Compromising Session IDs Using Man-in-the-Browser Attack
11.12 Compromising Session IDs Using Client-side Attacks
11.13 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
11.14 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
11.15 Compromising Session IDs Using Session Replay Attack
11.16 Compromising Session IDs Using Session Fixation
11.17 Session Hijacking Using Proxy Servers
11.18 Session Hijacking Using CRIME Attack
11.19 Session Hijacking Using Forbidden Attack
Network Level Session Hijacking
11.20Â TCP/IP Hijacking
11.21Â IP Spoofing: Source Routed Packets
11.22Â RST Hijacking
11.23Â Blind Hijacking
11.24Â UDP Hijacking
11.25Â MiTM Attack Using Forged ICMP and ARP Spoofing
Session Hijacking Tools
11.26Â Session Hijacking Tools
11.27Â Session Hijacking Tools for Mobile
Countermeasures
11.28Â Session Hijacking Detection Methods
11.29Â Protecting against Session Hijacking
11.30Â Methods to Prevent Session Hijacking: To be Followed by Web Developers
11.31Â Methods to Prevent Session Hijacking: To be Followed by Web Users
11.32Â Session Hijacking Detection Tools
11.33Â Approaches Vulnerable to Session Hijacking and their Preventative Solutions
11.34Â Approaches to Prevent Session Hijacking
11.35Â IPSec
11.36Â Session Hijacking Prevention Tools
Penetration Testing
11.37Â Session Hijacking Pen Testing
IDS, Firewall and Honeypot Concepts
12.1 Intrusion Detection System (IDS)
12.2Â Firewall
12.3Â Honeypot
IDS, Firewall and Honeypot Solutions
12.4Â Intrusion Detection Tool
12.5Â Firewalls
12.6Â Honeypot Tools
Evading IDS
12.7Â IDS Evasion Techniques
Evading Firewalls
12.8Â Firewall Evasion Techniques
IDS/Firewall Evading Tools
12.9Â IDS/Firewall Evasion Tools
12.10Â Packet Fragment Generator Tools
Detecting Honeypots
12.11 Detecting Honeypots
12.12 Detecting and Defeating Honeypots
12.13 Honeypot Detection Tool: Send-Safe Honeypot Hunter
IDS/Firewall Evasion Countermeasures
12.14 How to Defend Against IDS Evasion
12.15 How to Defend Against Firewall Evasion
Penetration Testing
12.16 Firewall/IDS Penetration Testing
Web Server Concepts
13.1 Web Server Operations
13.2Â Open Source Web Server Architecture
13.3Â IIS Web Server Architecture
13.4Â Web Server Security Issue
13.5Â Why Web Servers Are Compromised?
13.6Â Impact of Web Server Attacks
Web Server Attacks
13.7Â DoS/DDoS Attacks
13.8Â DNS Server Hijacking
13.9Â DNS Amplification Attack
13.10 Directory Traversal Attacks
13.11 Man-in-the-Middle/Sniffing Attack
13.12 Phishing Attacks
13.13 Website Defacement
13.14 Web Server Misconfiguration
13.15 HTTP Response Splitting Attack
13.16 Web Cache Poisoning Attack
13.17 SSH Brute Force Attack
13.18 Web Server Password Cracking
13.19 Web Application Attacks
Web Server Attack Methodology
13.20Â Information Gathering
13.21 Web Server Footprinting/Banner Grabbing
13.22Â Website Mirroring
13.23Â Vulnerability Scanning
13.24Â Session Hijacking
13.25Â Web Server Passwords Hacking
13.26Â Using Application Server as a Proxy
Web Server Attack Tools
13.27Â Metasploit
13.28Â Web Server Attack Tools
Countermeasures
13.29Â Place Web Servers in Separate Secure Server Security Segment on Network
13.30Â Countermeasures
13.31Â Detecting Web Server Hacking Attempts
13.32Â How to Defend Against Web Server Attacks
13.33Â How to Defend against HTTP Response Splitting and Web Cache Poisoning
13.34Â How to Defend against DNS Hijacking
Patch Management
13.35Â Patches and Hotfixes
13.36Â What is Patch Management
13.37Â Installation of a Patch
13.38Â Patch Management Tools
Web Server Security Tools
13.39Â Web Application Security Scanners
13.40Â Web Server Security Scanners
13.41Â Web Server Security Tools
Web Server Pen Testing
13.42Â Web Server Penetration Testing
13.43Â Web Server Pen Testing Tools
Web App Concepts
14.1 Introduction to Web Applications
14.2Â Web Application Architecture
14.3Â Web 2.0 Applications
14.4Â Vulnerability Stack
Web App Threats
14.5 OWASP Top 10 Application Security Risks – 2017
14.6Â Other Web Application Threats
Hacking Methodology
14.7Â Web App Hacking Methodology
14.8Â Footprint Web Infrastructure
14.9Â Attack Web Servers
14.10 Analyze Web Applications
14.11 Bypass Client-Side Controls
14.12 Attack Authentication Mechanism
14.13 Attack Authorization Schemes
14.14 Attack Access Controls
14.15 Attack Session Management Mechanism
14.16 Perform Injection/Input Validation Attacks
14.17 Attack Application Logic Flaws
14.18 Attack Database Connectivity
14.19 Attack Web App Client
14.20Â Attack Web Services
Web App Hacking Tools
14.21 Web Application Hacking Tools
Countermeasures
14.22Â Web Application Fuzz Testing
14.23Â Source Code Review
14.24Â Encoding Schemes
14.25Â How to Defend Against Injection Attacks
14.26Â Web Application Attack Countermeasures
14.27Â How to Defend Against Web Application Attacks
Web App Security Testing Tools
14.28 Web Application Security Testing Tools
14.29Â Web Application Firewall
Web App Pen Testing
14.30Â Web Application Pen Testing
14.31Â Web Application Pen Testing Framework
SQL Injection Concepts
15.1 What is SQL Injection?
15.2Â SQL Injection and Server-side Technologies
15.3Â Understanding HTTP POST Request
15.4 Understanding Normal SQL Query
15.5Â Understanding an SQL Injection Query
15.6 Understanding an SQL Injection Query – Code Analysis
15.7Â Example of a Web Application Vulnerable to SQL Injection: aspx
15.8Â Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
15.9Â Examples of SQL Injection
Types of SQL Injection
15.10 Types of SQL injection
SQL Injection Methodology
15.11 SQL Injection Methodology
SQL Injection Tools
15.12 SQL Injection Tools
15.13 SQL Injection Tools
15.14 SQL Injection Tools for Mobile
Evasion Techniques
15.15 Evading IDS
15.16 Types of Signature Evasion Techniques
Countermeasures
15.17 How to Defend Against SQL Injection Attacks
15.18 SQL Injection Detection Tools
15.19 SQL Injection Detection Tools
Wireless Concepts
16.1 Wireless Terminologies
16.2Â Wireless Networks
16.3Â Wireless Standards
16.4Â Service Set Identifier (SSID)
16.5Â Wi-Fi Authentication Modes
16.6Â Wi-Fi Authentication Process Using a Centralized Authentication Server
16.7Â Types of Wireless Antennas
Wireless Encryption
16.8Â Types of Wireless Encryption
16.9Â WEP vs. WPA vs. WPA2
16.10 WEP Issues
16.11 Weak Initialization Vectors (IV)
Wireless Threats
16.12 Wireless Threats
Wireless Hacking Methodology
16.13 Wireless Hacking Methodology
Wireless Hacking Tools
16.14Â WEP/WPA Cracking Tools
16.15 WEP/WPA Cracking Tool for Mobile
16.16 Wi-Fi Sniffer
16.17 Wi-Fi Traffic Analyzer Tools
16.18 Other Wireless Hacking Tools
Bluetooth Hacking
16.19 Bluetooth Stack
16.20Â Bluetooth Hacking
16.21Â Bluetooth Threats
16.22Â How to BlueJack a Victim
16.23Â Bluetooth Hacking Tools
Countermeasures
16.24Â Wireless Security Layers
16.25Â How to Defend Against WPA/WPA2 Cracking
16.26Â How to Defend Against KRACK Attacks
16.27Â How to Detect and Block Rogue AP
16.28Â How to Defend Against Wireless Attacks
16.29Â How to Defend Against Bluetooth Hacking
Wireless Security Tools
16.30Â Wireless Intrusion Prevention Systems
16.31Â Wireless IPS Deployment
16.32Â Wi-Fi Security Auditing Tools
16.33Â Wi-Fi Intrusion Prevention System
16.34Â Wi-Fi Predictive Planning Tools
16.35Â Wi-Fi Vulnerability Scanning Tools
16.36Â Bluetooth Security Tools
16.37Â Wi-Fi Security Tools for Mobile
Wireless Pen Testing
16.38Â Wireless Penetration Testing
16.39Â Wireless Penetration Testing Framework
Mobile Platform Attack Vectors
17.1 Vulnerable Areas in Mobile Business Environment
17.2Â OWASP Top 10 Mobile Risks – 2016
17.3Â Anatomy of a Mobile Attack
17.4Â How a Hacker can Profit from Mobile when Successfully Compromised
17.5Â Mobile Attack Vectors and Mobile Platform Vulnerabilities
17.6Â Security Issues Arising from App Stores
17.7Â App Sandboxing Issues
17.8Â Mobile Spam
17.9Â SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
17.10 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
Hacking Android OS
17.11 Android OS
17.12 Android Rooting
17.13 Blocking Wi-Fi Access using NetCut
17.14 Hacking with zANTI
17.15 Hacking Networks Using Network Spoofer
17.16 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
17.17 Performing Session Hijacking Using DroidSheep
17.18 Hacking with Orbot Proxy
17.19 Android-based Sniffers
17.20Â Android Trojans
17.21Â Securing Android Devices
17.22Â Android Security Tool: Find My Device
17.23Â Android Security Tools
17.24Â Android Vulnerability Scanner
17.25Â Android Device Tracking Tools
Hacking iOS
17.26Â Apple iOS
17.27Â Jailbreaking iOS
17.28Â iOS Trojans
17.29Â Guidelines for Securing iOS Devices
17.30Â iOS Device Tracking Tools
17.31Â iOS Device Security Tools
Mobile Spyware
17.32Â Mobile Spyware
17.33Â Mobile Spyware: mSpy
17.34Â Mobile Spywares
Mobile Device Management
17.35Â Mobile Device Management (MDM)
17.36Â Mobile Device Management Solutions
17.37Â Bring Your Own Device (BYOD)
Mobile Security Guidelines and Tools
17.38Â General Guidelines for Mobile Platform Security
17.39Â Mobile Device Security Guidelines for Administrator
17.40Â SMS Phishing Countermeasures
17.41Â Mobile Protection Tools
17.42Â Mobile Anti-Spyware
Mobile Pen Testing
17.43Â Android Phone Pen Testing
17.44Â iPhone Pen Testing
17.45Â Mobile Pen Testing Toolkit: Hackode
IoT Concepts
18.1 What is IoT
18.2Â How IoT Works
18.3Â IoT Architecture
18.4Â IoT Application Areas and Devices
18.5Â IoT Technologies and Protocols
18.6Â IoT Communication Models
18.7Â Challenges of IoT
18.8Â Threat vs Opportunity
IoT Attacks
18.9Â IoT Security Problems
18.10 OWASP Top 10 IoT Vulnerabilities and Obstacles
18.11 IoT Attack Surface Areas
18.12 IoT Threats
18.13 Hacking IoT Devices: General Scenario
18.14 IoT Attacks
18.15 IoT Attacks in Different Sectors
18.16 Case Study: Dyn Attack
IoT Hacking Methodology
18.17 What is IoT Device Hacking?
18.18 IoT Hacking Methodology
IoT Hacking Tools
18.19 Information Gathering Tools
18.20Â Sniffing Tools
18.21Â Vulnerability Scanning Tools
18.22Â IoT Hacking Tools
Countermeasures
18.23Â How to Defend Against IoT Hacking
18.24Â General Guidelines for IoT Device Manufacturing Companies
18.25Â OWASP Top 10 IoT Vulnerabilities Solutions
18.26Â IoT Framework Security Considerations
18.27Â IoT Security Tools
IoT Pen Testing
18.28Â IoT Pen Testing
Cloud Computing Concepts
19.1 Introduction to Cloud Computing
19.2Â Separation of Responsibilities in Cloud
19.3Â Cloud Deployment Models
19.4Â NIST Cloud Deployment Reference Architecture
19.5Â Cloud Computing Benefits
19.6Â Understanding Virtualization
Cloud Computing Threats
19.7Â Cloud Computing Threats
Cloud Computing Attacks
19.8Â Service Hijacking using Social Engineering Attacks
19.9Â Service Hijacking using Network Sniffing
19.10 Session Hijacking using XSS Attack
19.11 Session Hijacking using Session Riding
19.12 Domain Name System (DNS) Attacks
19.13 Side Channel Attacks or Cross-guest VM Breaches
19.14 SQL Injection Attacks
19.15 Cryptanalysis Attacks
19.16 Wrapping Attack
19.17 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
19.18 Man-in-the-Cloud Attack
Cloud Security
19.19 Cloud Security Control Layers
19.20Â Cloud Security is the Responsibility of both Cloud Provider and Consumer
19.21Â Cloud Computing Security Considerations
19.22Â Placement of Security Controls in the Cloud
19.23Â Best Practices for Securing Cloud
19.24Â NIST Recommendations for Cloud Security
19.25Â Organization/Provider Cloud Security Compliance Checklist
Cloud Security Tools
19.26Â Cloud Security Tools
Cloud Penetration Testing
19.27Â What is Cloud Pen Testing?
19.28Â Key Considerations for Pen Testing in the Cloud
19.29Â Cloud Penetration Testing
19.30Â Recommendations for Cloud Testing
Cryptography Concepts
20.1 Cryptography
20.2Â Government Access to Keys (GAK)
Encryption Algorithms
20.3Â Ciphers
20.4Â Data Encryption Standard (DES)
20.5Â Advanced Encryption Standard (AES)
20.6Â RC4, RC5, and RC6 Algorithms
20.7Â Twofish
20.8Â The DSA and Related Signature Schemes
20.9Â Rivest Shamir Adleman (RSA)
20.10 Diffie-Hellman
20.11 Message Digest (One-Way Hash) Functions
Cryptography Tools
20.12 MD5 Hash Calculators
20.13 Hash Calculators for Mobile
20.14 Cryptography Tools
20.15 Cryptography Tools for Mobile
Public Key Infrastructure (PKI)
20.16 Public Key Infrastructure (PKI)
Email Encryption
20.17 Digital Signature
20.18 Secure Sockets Layer (SSL)
20.19 Transport Layer Security (TLS)
20.20Â Cryptography Toolkit
20.21 Pretty Good Privacy (PGP)
Disk Encryption
20.22Â Disk Encryption
20.23Â Disk Encryption Tools
Cryptanalysis
20.24Â Cryptanalysis Methods
20.25Â Code Breaking Methodologies
20.26Â Cryptography Attacks
20.27Â Cryptanalysis Tools
20.28Â Online MD5 Decryption Tools
Countermeasures
20.29Â How to Defend Against Cryptographic Attacks
Free Career Counselling
There are no prerequisites to enroll in this CEH course in Australia. However, having a basic understanding of TCP/IP may enhance your learning experience.
Yes. This online training program is accredited by EC-Council.
To unlock Intellipaat’s Ethical Hacking certification, you have to complete the course, along with the projects, and score 60 percent or more in the quiz conducted by Intellipaat.
Yes. The CEH exam fee is included in the overall cost of this training program.
You can have a maximum of five attempts within a 12-month period to pass the certification exam. If you do not qualify on the first try, you are eligible to retake it. Although, if you end up failing in the successive exam attempts, then you will have to wait for a minimum of 14 days to retake the exam. Also, you cannot retake the exam for the same version if you have succeeded in passing it earlier.
You are eligible to get a refund in case you wish to cancel your enrollment in the course. However, for this, you need to get in touch with your course advisor or refer to the terms and conditions mentioned in the FAQs section.
To get more information about this course, you can type in the chat window on the right or reach out to the course advisors mentioned in the bottom part of the screen.
This Ethical hacking course online will help you gain hands-on experience in the field of Cybersecurity and Ethical Hacking training. Here, you will master system hacking practices, securing the IT infrastructure, footprinting, scanning networks, Ethical Hacking enumeration, Trojans, threats from malware, etc. You will receive the Ethical Hacking course completion certificate from us after completing the course.
As part of the best Ethical Hacking course online, you will be working on industry-based projects that have high relevance in the business world. On completing the CEH training in Australia with us, you can apply for the best Ethical Hacking jobs in top MNCs around the world. Intellipaat also offers lifetime access to the courseware, 24/7 online support, and course upgrades to the latest version for free.
Your CEH certification has a validity of 3 years. Further, you should earn more than 120 ECE credits if you wish to maintain this certification.
The EC-Council will reward you with your certificate in your ASPEN account in 7–10 days from the certification date.
The pattern followed by the CEH examination is as mentioned below:
1. Questions: 125 MCQs
2. Duration of the examination: 4 hours
3. Exam prefix: 312-50 (VUE), 312-50 (ECC Exam)
The CEH Practical exam requires the candidates to work on a real-world network that comprises virtual machines and several applications.
The format of the CEH Practical examination is as mentioned below:
1. Questions: 20 practical problems
2. Duration of the examination: 6 hours
3. Passing marks: 70%
4. Format of the test: iLabs Cyber Range
5. Availability: Aspen – iLabs
Below is a blueprint of the examination:
Domain | Weightage of Each Domain | Total Number of Items Per Domain | Objectives/Subdomains | Total Number of Items Per Subdomain |
Background | 21.79% | 27 | Network and Communication
Technologies |
10 |
Information Security Threats and the Attack Vector | 9 | |||
Information Security Technologies | 8 | |||
Analysis/Assessment | 12.73% | 16 | Information Security Assessment
and Analysis |
8 |
Information Security Assessment
Process |
8 | |||
Security | 23.73% | 30 | Information Security Controls | 15 |
Information Security Attack
Detection |
9 | |||
Information Security Attack
Prevention |
6 | |||
Tools/Systems/Programs | 28.91% | 36 | Information Security Systems | 7 |
Information Security Programs | 5 | |||
Information Security Tools | 24 | |||
Procedures/Methodology | 8.77% | 11 | Information Security Procedures | 5 |
Information Security Assessment
Methodologies |
6 | |||
Regulation/Policy | 1.90% | 2 | Information Security Policies/Laws/Acts | 2 |
Ethics | 2.17% | 3 | Ethics of Information Security | 3 |
Yes. We do provide a money-back guarantee. You can opt for a complete refund under the mentioned terms and conditions.
We provide instructor-led online training to offer knowledge and confidence to the students to clear the examination in the first try. We also give the option to reattempt the certification exam if you are unable to qualify it in the first try.
To clear your exam in the first attempt, we recommend you take it in 1 week to 45 days from the course completion so that the concepts are clear in your head. We provide a full refund if you do not clear the examination in the first attempt, given that you have taken the test within 6 months from the date when you enrolled in the course.
Process of Refund:
If you are unable to clear the certification exam in the first attempt, Intellipaat will provide you with a complete refund. To get a refund, you should reach out to our course advisors, and you need to submit your scorecard copy, along with the completion date of your training. We will provide the refund within 30 days after we get the necessary documents. Intellipaat will process the refund amount in the same payment method used for enrolling in the course.
Terms and Conditions:
This money-back guarantee is only for those students who have paid the complete course fee. This guarantee becomes null under the following conditions:
All our instructors are certified professionals in CEH with more than 12 years of industry experience in the domain. They have all been through a rigorous process of selection before signing up with us for training.
At Intellipaat, we offer online training wherein you can get an in-depth understanding of the concepts and clear all your queries related to the training. Moreover, we provide session recordings in case you require them in the future. Besides, you can refer to these recordings to catch up with our training program if you miss any class.
Follow the steps mentioned below to become a certified CEH professional:
Our support team and training assistants are available to provide solutions to your doubts and clear them.
We provide discounts frequently for several courses. Additionally, we offer group discounts, which you can avail after reaching out to our course advisors and getting information from them.
At Intellipaat, you can enroll in either the instructor-led online training or self-paced training. Apart from this, Intellipaat also offers corporate training for organizations to upskill their workforce. All trainers at Intellipaat have 12+ years of relevant industry experience, and they have been actively working as consultants in the same domain, which has made them subject matter experts. Go through the sample videos to check the quality of our trainers.
Intellipaat is offering the 24/7 query resolution, and you can raise a ticket with the dedicated support team at anytime. You can avail of the email support for all your queries. If your query does not get resolved through email, we can also arrange one-on-one sessions with our trainers.
You would be glad to know that you can contact Intellipaat support even after the completion of the training. We also do not put a limit on the number of tickets you can raise for query resolution and doubt clearance.
Intellipaat is offering you the most updated, relevant, and high-value real-world projects as part of the training program. This way, you can implement the learning that you have acquired in real-world industry setup. All training comes with multiple projects that thoroughly test your skills, learning, and practical knowledge, making you completely industry-ready.
You will work on highly exciting projects in the domains of high technology, ecommerce, marketing, sales, networking, banking, insurance, etc. After completing the projects successfully, your skills will be equal to 6 months of rigorous industry experience.
Intellipaat actively provides placement assistance to all learners who have successfully completed the training. For this, we are exclusively tied-up with over 80 top MNCs from around the world. This way, you can be placed in outstanding organizations such as Sony, Ericsson, TCS, Mu Sigma, Standard Chartered, Cognizant, and Cisco, among other equally great enterprises. We also help you with the job interview and résumé preparation as well.
You can definitely make the switch from self-paced training to online instructor-led training by simply paying the extra amount. You can join the very next batch, which will be duly notified to you.
Once you complete Intellipaat’s training program, working on real-world projects, quizzes, and assignments and scoring at least 60 percent marks in the qualifying exam, you will be awarded Intellipaat’s course completion certificate. This certificate is very well recognized in Intellipaat-affiliated organizations, including over 80 top MNCs from around the world and some of the Fortune 500companies.
Apparently, no. Our job assistance program is aimed at helping you land in your dream job. It offers a potential opportunity for you to explore various competitive openings in the corporate world and find a well-paid job, matching your profile. The final decision on hiring will always be based on your performance in the interview and the requirements of the recruiter.
Talk to us