The Certified Ethical Hacker (CEH) v11 by EC-Council is one of the most recognized cybersecurity certifications globally. It equips professionals with the skills to think and act like hackers (ethically) to identify and fix vulnerabilities before malicious attackers exploit them.
What is CEH v11?
The CEH v11 is the 11th version of the Certified Ethical Hacker program by EC-Council. It focuses on offensive security—teaching penetration testing, vulnerability assessment, and cyber attack techniques for defensive purposes.
CEH v11 All Modules PDF – Features & Content
A CEH v11 All Modules PDF typically includes detailed notes, lab exercises, and exam-focused content covering 20 core modules. Below is a breakdown:
Introduction to Ethical Hacking
- Cyber Security Fundamentals.
- Hacking Phases (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks.)
- Types of Hackers (White Hat, Black Hat, Grey Hat).
Footprinting and Reconnaissance
- OSINT (Open-Source Intelligence) Techniques.
- WHOIS, DNS, Google Hacking (Dorking).
- Network & Social Media Recon.
Scanning Networks
- Nmap, Hping3, Nessus Scanning.
- Port Scanning Techniques (TCP, UDP, SYN, Stealth Scans).
Enumeration
- Extracting Usernames, Shares, Services.
- SNMP, LDAP, SMB Enumeration.
Malware Threats
- Viruses, Worms, Trojans, Ransomware.
- Analyzing Malware (Static & Dynamic Analysis).
Sniffing
- MITM Attacks (Man-in-the-Middle).
- Wireshark, Tcpdump, Ettercap.
Social Engineering
- Phishing, Vishing, Baiting, Tailgating.
- Tools: SET (Social Engineering Toolkit).
Denial-of-Service (DoS/DDoS)
- SYN Flood, UDP Flood, ICMP Attacks.
- Botnets & Mitigation Techniques.
Session Hijacking
- Cookie Stealing, Session Fixation.
- Tools: Burp Suite, Firesheep.