
CEH v12

Ethical Hacking Foundations
Saturday
Introduction to Ethical Hacking
Footprinting & Reconnaissance
Scanning Networks
Sunday
Enumeration Techniques
Vulnerability Analysis
System Hacking & Privilege Escalation
Malware & Network Attacks
Saturday
Malware Threats (Trojans, Worms, Ransomware)
Sniffing & MITM Attacks
Social Engineering Techniques
Sunday
Denial-of-Service (DoS/DDoS)
Session Hijacking
IDS, Firewalls & Honeypots
Web & Application Exploits
Saturday
Hacking Web Servers
Hacking Web Applications
SQL Injection
Sunday
Cross-Site Scripting (XSS) & CSRF
Web App Security Testing Tools
Secure Coding Practices
Wireless, Mobile & IoT Hacking
Saturday
Wireless Network Attacks (WEP/WPA Cracking)
Rogue Access Points & Evil Twins
WLAN Security Protocols
Sunday
Mobile Platform Exploits (Android/iOS)
Mobile Malware & App Analysis
IoT & OT Hacking (Smart Devices, SCADA)
Cloud, Cryptography & Steganography
Saturday
Cloud Computing Threats & Security Controls
Cryptography Fundamentals (Symmetric/Asymmetric)
Hashing, PKI & Certificate Management
Sunday
Steganography Techniques
Encryption Tools & Use Cases
Cryptanalysis & Attacks
Hands-On Lab Mastery (Practical Prep)
Saturday
Nmap, Nikto & Recon Tools
Metasploit & Exploitation Frameworks
Burp Suite & Web App Testing
Sunday
Wireshark & Packet Analysis
John the Ripper & Password Cracking
Log Analysis & Incident Response
Final Review & Exam Readiness
Saturday
Theory Recap: All 20 Modules
Practice Questions & Exam Strategy
Time Management & Confidence Building
Sunday
Full Practical Simulation (Lab Challenge)
Review of Weak Areas
Certification Success Planning
