Kabul, Afghanistan
Social Links:


 the Certified Ethical Hacker (CEH) certification, version 12 (CEHv12), is a widely recognized certification in the field of cybersecurity. The CEH certification is designed for individuals who want to become ethical hackers, also known as penetration testers, and who are interested in understanding how to identify and address vulnerabilities in systems and networks to improve overall security.

Please note that the information I provide might not be up to date, as the certification landscape can change. For the most accurate and current information about the CEH certification, I recommend visiting the official website of the certification provider, EC-Council.

Key topics covered in the CEH certification typically include:

    Introduction to Ethical Hacking: Understanding the role and responsibilities of an ethical hacker, legal and ethical considerations, and hacking methodologies.

  • Footprinting and Reconnaissance: Gathering information about a target system or network, including techniques such as OSINT (Open Source Intelligence) gathering.
  •     Scanning Networks: Identifying active hosts, services, and vulnerabilities on a network using scanning tools.
  •     Enumeration: Gathering information about users, shares, and resources on a network.
  •     Vulnerability Analysis: Identifying and analyzing vulnerabilities in systems and networks.
  •     System Hacking: Exploiting vulnerabilities to gain unauthorized access to systems.
  •     Malware Threats: Understanding various types of malware and their impact, and analyzing malicious code.
  •     Sniffing: Capturing network traffic to analyze and identify potential security issues.
  •     Social Engineering: Exploiting human psychology to gain unauthorized access to systems or information.
  •     Denial-of-Service (DoS) Attacks: Disrupting network services and availability.
  •     Session Hijacking: Stealing ongoing network sessions to gain unauthorized access.
  •     Evading IDS, Firewalls, and Honeypots: Techniques to bypass security mechanisms.
  •     Hacking Web Servers: Exploiting vulnerabilities in web servers and web applications.
  •     Hacking Web Applications: Exploiting vulnerabilities in web applications.
  •     SQL Injection: Exploiting vulnerabilities in database systems using SQL injection attacks.
  •     Wireless Network Hacking: Exploiting vulnerabilities in wireless networks.
  •     Cryptography: Understanding cryptographic concepts and their role in security.

To earn the CEH certification, candidates typically need to pass the CEH exam, which covers these topics. The CEH certification demonstrates your skills and knowledge as an ethical hacker and is often sought after by professionals in cybersecurity and information security roles.