On Demand
Ethical Hacking (C|EH) – V12 (312-50) Training & Certification
Get Trained & Get Certified in Ethical Hacking
Students Enrolled
0
+
Ratings for this course
What you'll learn?
- Foot printing.
- Network scanning.
- System Hacking.
- Vulnerability Analysis.
- Webserver and web application attacks.
Description
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Why SNTI
SNTI Training Institute is the leading choice in Pune for Ethical Hacking (C|EH) – V12 (312-50) training and certification. Our institute stands out with highly experienced instructors who provide practical insights and hands-on training. We offer comprehensive and up-to-date course content, along with state-of-the-art lab facilities for hands-on practice. Our focus on practical application helps students develop real-world skills, preparing them for a successful career. With a strong track record and dedicated placement support, SNTI Training Institute is the best place to learn Ethical Hacking (C|EH) – V12 (312-50) in Pune.
Ideal Candidates for This Course:
- Undergraduate students from computer background-BE(IT), BE (Comp), BCA, BSc (Comp), BSc (IT).
- BCS IT Professional having knowledge of Computer and Networking.
- Security officers & Security professionals.
- Site administrators.
Curriculum
Total Hours
0
Hours
Certified Ethical Hacking (C|EH)
Module 1: Introduction to Ethical Hacking
- Information Security Overview.
- Ethical Hacking Concepts.
- Information Security Laws and Standards.
- Terminologies used in Ethical Hacking.
- Introduction to Kali Linux.
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts.
- Tools used for footprinting-Reconng, Maltego, Whois database, Netcraft, E-mail tackers, web spiders
- Footprinting through Search Engines, Web Services, Social Networking Sites.
Module 3: Scanning Networks
- Scanning Concepts.
- Scanning Techniques.
- Tools- Nmap, Nessus, Mbsa.
Module 4 : Enumeration
- Enumeration Techniques using Nmap script engine.
- Tools- Superscan.
Module 5 : Vulnerability Analysis
- Vulnerability analysis and Methodology.
- Vulnerability Assessment Tools.
Module 6: System Hacking
- Goals of System hacking.
- Tools – Metasploit framework * imp, keylogger tools, spywares, steganography tools, Hydra, Johj the ripper.
Module 7: Malware Threats
- Malware concepts for virus, worms, Trojans, spywares.
- Trojan software: Prorat.
Module 8: Sniffing
- Sniffing Techniques.
- Tools – Wireshark, dnssniff, urlsniff, Ettercap.
- Sniffing Detection Techniques.
Module 9: Social Engineering
- Social Engineering concepts.
- Tools- setoolkit, phishing.
Module 10: Denial-of-Service
- DoS and DDoS Concepts.
- Tools – hping3, syn flooder, Yersinia.
- DoS/DDoS Protection Tools.
Module 11: Session Hijacking
- Session Hijacking Concept.
- Tools: Burpsuite.
Module 12: Evading IDS, Firewalls, and Honeypots
- Firewall, IDS, Honeypot concept.
- Tools- windows defender, KFsensor honeypot.
Module 13: Hacking Web Servers
- Web Server concepts.
- Tools- Metasploit framework and sqlmap.
Module 14: Hacking Web Applications
- Web Application concepts.
- OWASP top 10 Risks.
- Tools- Burpsuite, Accunetix, OWASP ZAP.
Module 15: SQL Injection
- SQL injection attack techniques.
- Tools- Boolian Exploitation, sqlmap, Havij.
Module 16: Module 16:Hacking Wireless Networks
- Wi-Fi Concepts.
- Wireless Encryption.
- Wireless Threats.
- Wireless Hacking Methodology.
- Craking tools – Aircrack.
Module 17: Hacking Mobile Platforms
- Android and IOS concepts and vulnerability.
- OWASP Top10 Mobile platform Risks.
- Tools- Metasploit.
Module 18: IoT Hacking
- IOT Concepts.
- IoT Hacking Methodology.
- IoT Hacking Tools.
Module 19: Cloud Computing
- Cloud computing concepts.
- Cloud Computing Attacks.
- Cloud Security.
- Cloud Security Tools.
Module 20:Cryptography
- Cryptography Concepts.
- Algorithms.
- Tools- Online Hash crackers, cain & Able, cryptool.

Course Features
- Duration: 120 hours
- Training Type: Classroom & Online
- Students Enrolled: 7000+
- Certificate: Yes
- Batch Available: Mon-Sun
- 100% Placement Support: Yes
Salary Scale
Maximum
10 LPA
70%
Average
4 LPA
50%
Minimum
2.5 LPA
30%
Job Role
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
- It is a long established fact that a reader will
Training Option
- Live-Online Instructor Led Training
- 100+ lab assignments & Quizzes
- 24/7 Lab access on Rooman Cloud Lab
- Labs Designed & Mentorship support by Industry Experts
- 5 capstone projects
- Live-Online sessions with Industry Experts & Subject Matter Expert from Rooman
- Access to Recorded Session of Live-Online Classes available 24/7
- Industry Recognized Course Completion Certificate
- Interview Preparation & Placement Support


- In-Person Classroom based Training conducted by Subject Matter Expert
- Flexibility to attend classes at any of our 50+ Centers PAN India
- Hands-on experience at our state-of-the-art Lab
- 100+ lab assignments & Quizzes
- 24/7 Lab access on Rooman Cloud Lab
- Labs Designed & Mentorship support by Industry Experts
- 5 Capstone & 1 real-world project
- Exclusive sessions with Industry & Subject Matter Expert
- Access to Recorded Session of Live-Online Classes available 24/7
- Industry Recognized Course Completion Certificate
- Interview Preparation & Placement Support
- Access to Campus Placement drives
- 1 year access to our LMS
Our Alumni

Exam Partner






FAQ
Item #1
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
