Course Overview
TOPThe Certified Ethical Hacker (CEH) certification training course by EC-Council is offered both online and in-person. Over a 5-day period, students will cover all of the CEH exam objectives, take multiple practice exams and engage in hands-on labs as preparation for the certification exam administered on the last day of class.
Scheduled Classes
TOPWhat You'll Learn
TOP- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
Outline
TOP
Viewing outline for:
Module 1: Introduction to Ethical Hacking
- Information security overview
- Information security threats and attack vectors
- Hacking concepts
- Ethical hacking concepts
- Information Security Controls
- Penetration testing concepts
- Information security laws and standards
Module 2: Footprinting and Reconnaissance
- Footprinting concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking sites
- Website footprinting
- Email footprinting
- Competitive Intelligence
- WHOIS Footprinting
- DNS footprinting
- Network footprinting
- Footprinting through social engineering
- Footprinting tools
- Countermeasures
- Footprinting pen testing
Module 3: Scanning Networks
- Network scanning concepts
- Scanning tools
- Scanning techniques
- Scanning beyond IDS and firewall
- Banner grabbing
- Draw network diagrams
- Scanning pen test
Module 4: Enumeration
- Enumeration concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration SMTP and DNS Enumeration
- Other enurmeration techniques
- Enumeration countermeasures
- Enumeration pen testing
Module 5: Vulnerability Analysis
- Vulnerability assessment concepts
- Vulnerability assessment solutions
- Vulnerability scoring systems
- Vulnerability assessment tools
- Vulnerability assessment reports
Module 6: System Hacking
- System hacking concepts
- Cracking passwords
- Escalating privileges
- Executing applications
- Hiding files
- Covering tracks
- Penetration testing
Module 7: Malware Threats
- Malware concepts
- Trojan concepts
- Virus and worm concepts
- Malware analysis
- Countermeasures
- Anti-Malware software
- Malware penetration testing
Module 8: Sniffing
- Sniffing concepts
- Sniffing techniques: MAC Attacks
- Sniffing techniques: DHCP attacks
- Sniffing techniques: ARP Poisoning
- Sniffing techniques: Spoofing attacks
- Sniffing techniques: DNS poisoning
- Sniffing tools
- COuntermeasures
- Sniffing detection techniques
- Sniffing pen testing
Module 9: Social Engineering
- Social engineering concepts
- Social engineering techniques
- Insider threats
- Impersonation on social networking sites
- Identity theft
- Countermeasures
- Social engineering pen testing
Module 10: Denial of Service
- DoS/DDos Concepts
- DoS/DDoS attack techniques
- Botnets
- DDoS case study
- DoS/DDoS attack tools
- Countermeasures
- DoS/DDos protection tools
Module 11: Session Hijacking
- Session hijacking concepts
- Application level session hijacking
- Network level session hijacking
- Session hijacking tools
- Countermeasures
- Penetration testing
Module 12: Evading IDS, Firewalls, and Honeypots
- IDS, firewall and honeypot concepts
- IDS, firewall and honeypot solutions
- Evading IDS
- Evading firewalls
- IDS/firewall evading tools
- Detecting honeypots
- IDS/Firewall evasion countermeasures
- Penetration testing
Module 13: Hacking Webservers
- Web server operations
- Web server attacks
- Web server attack methodology
- Web server attack tools
- Countermeasures
- Patch management
- Web server security tools
- Web server pen testing
Module 14: Hacking Web Applications
- Web app concepts
- Web app threats
- Hacking methodology
- Web app hacking tools
- Countermeasures
- Web app security testing tools
- Web app pen testing
Module 15: SQL Injection
- SQL injection concepts
- Types of SQL injection
- SQL injection methodology
- SQL injection tools
- Evasion techniques
- Countermeasures
Module 16: Hacking Wireless Networks
- Wireless concepts
- Wireless encryption
- Wireless threats
- Wireless hacking methodology
- Wireless hacking tools
- Bluetooth hacking
- Countermeasures
- Wireless security tools
- Wireless pen testing
Module 17: Hacking Mobile Platforms
- Mobile platform attack vectors
- Hacking Android OS
- Hakcing iOS
- Mobile spyware
- Mobile device management
- Mobile security guidelines and tools
- Mobile pen testing
Module 18: IoT Hacking
- IoT concepts
- IoT attacks
- IoT hacking methodology
- IoT hacking tools
- Countermeasures
- IoT pen testing
Module 19: Cloud Computing
- Cloud computing concepts
- Cloud computing threats
- Cloud computing attacks
- Cloud security
- Cloud security tools
- Cloud penetration testing
Module 20: Cryptography
- Cryptography concepts
- Encryption algorithms
- Cryptography tools
- Public key infrastructure (PKI)
- Email encryption
- Disk encryption
- Cryptanalysis Countermeasures
Prerequisites
TOPBefore attending this course, students should have:
- At least two years of experience in IT security
- Strong understanding of TCP/IP
- CompTIA Security+ certification is recommended
Who Should Attend
TOPThis course fortifies the knowledge of IT security professionals to help them think as a hacker to detect weaknesses and vulnerabilities within network infrastructures. Candidates include:
- Auditors
- Site Administrators
- Security Officers
- Security Professionals