Live Online Style Video +Live Instructor + Official Course-Book + Hands-on Labs

Certified Ethical Hacker v12 - CEHv12

Includes:

  1. Power Packed 34 Hours (Edited from 40 hours of Live Training)
  2. 6 months access to videos.
  3. Access via Laptop, Tab, Mobile, and Smart TV.
  4. Certificate of Completion.
  5. Official Course-Book
  6. 280+ Tests Questions (Qubits42)
You can also purchase an annual plan for USD 999. For one year, all Flexi Videos will be free for you. Buy Annual Plan

You will get access to Flexi Video within 30 minutes.

Flexi Video

USD 199

Official Course-Book1

USD 979

Hands-On-Labs

NA

1Delivery lead time is 5 Days

Total

USD 1178

100% Refund for Flexi Video (Course-Book is non-refundable) if user is not satisfied with the Video and seeks refund within 30 days of purchase.

Download Course Contents
Module 1: Introduction to Ethical Hacking
  • Information Security Overview
  • Hacking Methodologies and Frameworks
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • o Worm Makers
  • Fileless Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures
  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • SQL Injection Countermeasures
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • Cloud Computing Concepts
  • Container Technology
  • Manipulating CloudTrial Service
  • Cloud Security
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attack Countermeasures
Priyanka Verma

Skills

 
Open Source:Advance Web Application Security TestingEC-Council:Certified Application Security Engineer JAVA
(ISC)2:Certified Cloud Security Professional (CCSP)EC-Council:Certified Ethical Hacker V11 -CEH-v11
EC-Council:Certified Ethical Hacker v12 - CEHv12Open Source:Certified Forensic Investigation Specialist (CFIS)
(ISC)2:Certified in Cybersecurity(ISC)2:Certified Information Systems Security Professional (CISSP)
PECB:Certified Lead Forensics ExaminerOpen Source:Certified Secure Coding for Software Developers (CSCSD)
EC-Council:Certified Secure Computer User (CSCU)(ISC)2:Certified Secure Software Lifecycle Professional (CSSLP)
EC-Council:Certified SOC Analyst-CSAEC-Council:Certified Threat Intelligence Analyst (CTIA)
Check Point:Check Point Certified Security Administrator (CCSA) R81.10EC-Council:CHFI V10
CompTIA:CompTIA A+ 1001-1002CompTIA:CompTIA A+ 1101-1102
CompTIA:CompTIA Cybersecurity Analyst (CySA+)CompTIA:CompTIA Network+ (N10-008)

Learn more about Koenig. Download Presentation Buy Other Flexi

FAQ's

Flexi video for the new version will be provided free of cost.
Videos can only be streamed and not downloaded.
6 months from the date of delivery.
We do not track the pass rate of Flexi students. However, we trust it will be lower than for Live Online.
Presently, Flexi is only available in English.
You will be provided access to LET ( Learning Enhancement Tool), where you will get the links to access all your purchases.
Yes, you do. Flexi Videos do not include Course-Book or Labs.
Yes, Course-Book and Lab are not included in the annual plan. All Flexi videos are included.
Yes, you can pay from this web page.
It is only for one user.
We use the best standards in Internet security. Any data retained is not shared with third parties.
Yes, contact us for corporate packages.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
It’s a unique subscription plan where customers can avail unlimited Flexi courses within a year.
The subscription plan is valid for 1 year from the date of purchase.
No, this is limited to one user and its non-transferable.

Feedbacks from Clients