

White Band Associates
E EH
Expert Ethical Hacker (EEH)
The Ultimate
Ethical Hacking Certification


Expert Ethical Hacker EEH will teach you the latest hacking tools, Terms & techniques, and methodologies used by Hackers/ Ethical Hackers and information security professionals to lawfully hack an organization.This ominous need has increased the demand of ethical hackers and cyber security professionals.
Vulnerability Assessment & Penetration Testing (VAPT) Track




Suggested career path only, courses can be taken independently, and the order is not fixed.
Expert Ethical Hacker
The number of devastating cyber attacks is increasing, and it's likely to get much worse. Constantly growing adoption of the mobile Internet, cloud computing, and IoT have expanded the attack landscape, making cyber security
the top of the agenda. This ominous need has increased the demand of ethical hackers and cyber security professionals.
​
EEH is a comprehensive training program that helps learners acquire a fundamental understanding of concepts like information security, hacking, and ethical hacking, and is a must-have guide for any IT security professional. This program covers discusses both basic as well as advanced hacking tools and techniques used by hackers and information security professionals, to break into an organization’s information system.
In this program, the learner will understand the logic behind hacking and the ways in which hackers go about it,
thus enabling you to prevent any such acts. As they say, “Prevention is better than cure!” This program makes the learners aware and in charge of their systems and allows them to test, uncover, hack and fix vulnerabilities, and stay in complete control of their information. The program proceeds with detailing the process of hacking in five consequential stages including investigation, scanning, gaining access, maintaining access, and covering your tracks.


EEh Objectives
In this course, you will learn about:
1. What is hacking and why one should do ethical hacking?
2. Different types of attacks and how to mitigate those attacks
3. Different attacks associated with Mobile and Cloud technologies
4. Implementing tools to perform ethical hacking
5. Encrypting and decrypting the code
Course Outcome
After competing this course, you will be able to:
ï‚· Describe ethical hacking and its importance
ï‚· Understand security posture and flow
ï‚· Identify different types of attacks and vulnerabilities and use techniques to mitigate those
ï‚· List threats associated with mobile and cloud technologies
ï‚· Practice cybersecurity techniques such as penetration testing
ï‚· Employ penetration testing process to uncover vulnerabilities/weaknesses in a computer/system/network
ï‚· Explain and employ encryption and decryption techniques

Table Of Contents Outline
1. Exploring Ethical Hacking
2. Introduction to Ethical Hacking
3. Virtualization
4. Setting Proxies
5. Foot printing and Reconnaissance
6. Scanning Computers and Networks
7. Enumeration
8. Vulnerability Analysis
9. System Hacking
10. Malware Threat
11. Sniffing
12. Social Engineering
13. Denial-of-Service
14. Session Hijacking
15. Honeypots, Firewalls and Evading IDS
16. Hacking Web Servers
17. Hacking Web Applications
18. Cross Site Scripting (XSS)
19. SQL Injection
20. Hacking Wireless Network
21. Hacking Mobile Devices
22. Cryptography
23. Self Security
About Exam
Number of Questions 140
Test Duration 2 Hours
Launch Date June 1 2021
Exam Codes EEH-WBA-004
Languages English
Passing Score 70 %
Mode of Exam online
