Certified Ethical Hacker (CEH)

Prepare for the EC-Council CEH certification while learning the latest ethical hacking techniques. If you’re concerned about the integrity of your network’s infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) to enhance your network’s defences. You’ll begin by learning how perimeter defences work. Then, by scanning and attacking your own network, you’ll learn how intruders operate and the steps you can take to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering,DDoS attacks, buffer overflows and virus creation.

In addition to learning how to scan, test, hack and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.
Our locations are easily accessible by public transportation. Flexibility is our approach, whether you are working full-time or looking for a job; we have classes running during the Day, evenings and weekends.

Target Audience

  • Network administrators
  • System engineers
  • Security administrators

Course Content

Introduction to Ethical Hacking

  • Information Security Overview
  • Essential Terminology
  • Information Security Elements
  • Security, Functionality and Usability Triangle
  • Information Security Threats and Attack Vectors
  • Information Security Threats
  • Hacking Concepts
  • Hacker Classes
  • Hacktivism
  • Hacking Phases
  • Types Of Attacks
  • Information Security Controls
  • Scope and Limitations of Ethical Hacking
  • Skills of an Ethical Hacker
  • Defense in Depth
  • Incident Management Process
  • Information Security Policies
  • Penetration Testing

Footprinting and Reconnaissance

  • Footprinting Concepts and Terminology
  • Footprinting Threats
  • Search Engines, Social Networking and Job Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Footprinting Using Google
  • WHOIS Footprinting
  • DNS Footprinting
  • Networking Footprinting
  • Footprinting Through Social Engineering
  • Footprinting Through Social Networking Sites
  • Footprinting Tools
  • Footprinting Counter Measures and Pen Testing

Scanning Networks

  • Overview of Network Scanning
  • Check for Live Systems
  • Check for Open Ports
  • Scanning Techniques
  • Xmas, Fin and Null Scans
  • IDLE Scan
  • ICMP Echo, List and UDP Scanning
  • ACK Flag and Port Scanning Countermeasures
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies

Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • UNIX/Linux and LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Enumeration Countermeasures

System Hacking

  • Hacking Methodology
  • Password Cracking
  • Password Attack Techniques and Types
  • Microsoft Authentication
  • Storing Hash Passwords and LAN Manager Hash
  • Strong Policy Implementation and Enforcement
  • Escalating Privileges
  • Executing Applications
  • Types of Spywares
  • Keylogger and Spyware Defense
  • Hiding Files
  • NTFS Data Streams
  • Steganography
  • Classification of Steganography
  • Steganography Types
  • Steganalysis
  • Cover Your Tracks
  • Penetration Testing

Trojans and Backdoors

  • Trojan Concepts
  • Trojan Infections
  • Types of Trojans
  • Detecting Trojans
  • Trojan Countermeasures
  • Anti Trojan Software

Viruses and Worms

  • Viruses and Worms
  • Viruses Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Virus Detection Methods

Sniffing

  • Sniffing Concepts
  • Types of Sniffing Attacks
  • Sniffing Protocols and SPAN Ports
  • MAC Attacks
  • DHCP Attacks
  • ARP Spoofing
  • Spoofing Attacks
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Attack Phases
  • Common Social Engineering Targets
  • Social Engineering Techniques and Types
  • Insider Attacks
  • Social Engineering Countermeasures
  • Summary

Desnial of Service

  • DoS Attacks
  • DoS Attack Types
  • Botnets
  • DDoS Attacks
  • DoS Attack Tools
  • DoS and DDoS Attack Counter Measures
  • DDoS Penetration Testing

Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Summary

Hacking Web Services

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter Measures
  • Webserver Security Tools
  • Webserver Pen Testing

Web Applications

  • Web App Threats
  • Injection Flaws
  • Cross Site Scripting Attack
  • Cookie/Session Poisoning and Session Fixation
  • Improper Error Handling
  • Broken Authentication and Session Management
  • Web Service Attack
  • Hacking Methodology
  • Web Hacking Tools
  • Web App Countermeasures
  • Security Tools
  • Web App Pen Testing

SQL Injection

  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection
  • Blind SQL Injection
  • Advanced SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Injection Attack Counter Measures

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Hacking Countermeasures

Hacking Mobile Platforms

  • Mobile Device Hacking Concepts
  • Mobile Attack Vectors
  • Hacking Android OS
  • Hacking Apple IOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management
  • Guidelines and Tools
  • Mobile Pen Testing

Evading IDS, Firewalls and Honeypots

  • Intrusion Detection Systems
  • Firewall Concepts
  • Honeypot Concepts
  • IDS Tools
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evasion Tools
  • Countermeasures

Buffer Overflow

  • Buffer Overflow Concepts
  • Buffer Overflow Methodology
  • Buffer Overflow Detection
  • Buffer Overflows Counter Measures
  • Buffer Overflow Security Tools

 

Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure
  • E-Mail Encryption
  • Disk Encryption
  • Cryptography Attacks

Penetration Testing

  • Pen Testing Concepts
  • Pen Testing Types
  • Pen Testing Techniques
  • Pen Testing Phases
  • Outsourcing Pen Testing

Related Articles

Responses

Your email address will not be published. Required fields are marked *