Certified Ethical Hacker - CEH v12 is a seminar dedicated to teaching you to think like a hacker, so that you can beat a hacker!.
Topics
Various types of footprinting, footprinting tools, and countermeasures
Information security controls, laws, and standards
Enumeration techniques and enumeration countermeasures
Network scanning techniques and scanning countermeasures
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
Vulnerability analysis to identify security loopholes in the target organization`s network, communication infrastructure, and end systems
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing
Different types of malware (Trojan viruses, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
Mobile platform attack vector, Android vulnerability exploitations, and mobile security guidelines and tools