CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. The phases cut across footprinting and reconnaissance using the latest footprinting techniques, Network scanning, Enumeration, Vulnerability analysis to identify security loopholes, System hacking methodology, steganography, steganalysis attacks, and covering tracks.