preloder

CEH (v10) – Certified Ethical Hacker

This Certified Ethical Hacker-Version 10 (earlier CEHv9) course will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes, and reverse engineering, so you can better protect corporate infrastructure from data breaches. This ethical hacking course will help you master advanced network packet analysis and advanced system penetration testing techniques to build your network security skill-set and beat hackers at their own game.

CEH v10 Certified Ethical Hacker training (earlier CEH v9) and certification course provide hands-on classroom training to help you master the same techniques that hackers use to penetrate network systems and leverage them ethically to protect your own infrastructure.

Skills you will learn

  • Grasp the step-by-step methodology and tactics that hackers use to penetrate network systems
  • Understand the finer nuances of trojans, backdoors and countermeasures
  • Get a better understanding of IDS, firewalls, honeypots and wireless hacking
  • Master advanced hacking concepts, including mobile device and smartphone hacking, writing virus codes, exploit writing & reverse engineering and corporate espionage.
  • Gain expertise on advanced concepts such as advanced network packet analysis, securing IIS & Apache web servers, Windows system administration using Powershell, and hacking SQL and Oracle databases.
  • Cover the latest developments in mobile and web technologies including Andriod, iOS, BlackBerry, Windows Phone and HTML 5
  • Learn advanced log management for information assurance and allow you to manage information security with more clarity

Who should take this course?

The Certified Ethical Hacker CEH training course is best suited for:

  • Network security officers and practitioners
  • Site administrators
  • IS/IT specialist, analyst or manager
  • IS/IT auditor or consultant
  • IT operations manager
  • IT security specialist, analyst, manager, architect or administrator
  • IT security officer, auditor or engineer
  • Network specialist, analyst, manager, architect, consultant or administrator
  • Technical support engineer
  • Senior systems engineer
  • Systems analyst or administrator

Introduction to Ethical Hacker

1
Information Security Overview
2
Information Security Threats and Attack Vectors
3
Hacking Concepts
4
Ethical Hacking Concepts
5
Information Security Controls
6
Penetration Testing Concepts
7
Information Security Laws and Standards
8
Penetration Testing Concepts
9
Information Security Laws and Standards

Footprinting and Reconnaissance

1
Footprinting Concepts
2
Footprinting through Search Engines
3
Footprinting through Web Services
4
Footprinting through Social Networking Sites
5
Website Footprinting
6
Email Footprinting
7
Competitive Intelligence
8
Who is Footprinting
9
DNS Footprinting
10
Network Footprinting
11
Footprinting through Social Engineering
12
Footprinting Tools
13
Countermeasures
14
Footprinting Pen Testing

Scanning Networks

1
Network Scanning Concepts
2
Scanning Tools
3
Scanning Techniques
4
Scanning Beyond IDS and Firewall
5
Banner Grabbing
6
Draw Network Diagrams
7
Scanning Pen Testing

Enumeration

1
Enumeration Concepts
2
NetBIOS Enumeration
3
SNMP Enumeration
4
LDAP Enumeration
5
NTP Enumeration
6
SMTP and DNS Enumeration
7
Other Enumeration Techniques
8
Enumeration Countermeasures
9
Enumeration Pen Testing

Vulnerability Analysis

1
Vulnerability Assessment Concepts
2
Vulnerability Assessment Solutions
3
Vulnerability Scoring Systems
4
Vulnerability Assessment Tools
5
Vulnerability Assessment Reports

System Hacking

1
System Hacking Concepts
2
Cracking Passwords
3
Escalating Privileges
4
Executing Applications
5
Hiding Files
6
Covering Tracks
7
Penetration Testing

Malware Threats

1
Malware Concepts
2
Trojan Concepts
3
Virus and Worm Concepts
4
Malware Analysis
5
Countermeasures
6
Anti-Malware Software
7
Malware Penetration Testing

Sniffing

1
Sniffing Concepts
2
Sniffing Technique: MAC Attacks
3
Sniffing Technique: DHCP Attacks
4
Sniffing Technique: ARP Poisoning
5
Sniffing Technique: Spoofing Attacks
6
Sniffing Technique: DNS Poisoning
7
Sniffing Tools
8
Countermeasures
9
Sniffing Detection Techniques
10
Sniffing Pen Testing

Social Engineering

1
Social Engineering Concepts
2
Social Engineering Techniques
3
Insider Threats
4
Impersonation on Social Networking Sites
5
Identity Theft
6
Countermeasures
7
Social Engineering Pen Testing

Denial of Service

1
DoS/DDoS Concepts
2
DoS/DDoS Attack Techniques
3
Botnets
4
DDoS Case Study
5
DoS/DDoS Attack Tools
6
Countermeasures
7
DoS/DDoS Protection Tools
8
DoS/DDoS Penetration Testing

Session Hijacking

1
Session Hijacking Concepts
2
Application Level Session Hijacking
3
Network Level Session Hijacking
4
Session Hijacking Tools
5
Countermeasures
6
Penetration Testing

Evading IDS

Firewalls and Honeypots

1
IDS, Firewall and Honeypot Concepts
2
IDS, Firewall and Honeypot Solutions
3
Evading IDS
4
Evading Firewalls
5
IDS/Firewall Evading Tools
6
Detecting Honeypots
7
IDS/Firewall Evasion Countermeasures
8
Penetration Testing

Hacking Web Servers

1
Web Server Concepts
2
Web Server Attacks
3
Web Server Attack Methodology
4
Web Server Attack Tools
5
Countermeasures
6
Patch Management
7
Web Server Security Tools
8
Web Server Pen Testing

Hacking Web Applications

1
Web App Concepts
2
Web App Threats
3
Hacking Methodology
4
Web App Hacking Tools
5
Countermeasures
6
Web App Security Testing Tools
7
Web App Pen Testing
No announcements at this moment.

Be the first to add a review.

Please, login to leave a review
This website uses cookies and asks your personal data to enhance your browsing experience.