Certified Ethical Hacker (CEH v11) Training
Level: Intermediate
Course #: 2031
Course info - Prices, Enrollment
Key Features of this Certified Ethical Hacker Training:
Official EC-Council Curriculum
Access to hundreds of exam prep questions
Exam voucher included in course tuition After-course instructor coaching benefit
After-course computing sandbox included
You Will Learn How To:
Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
Apply countermeasures to secure your system against threats
Test system security and data access using real-world hacking techniques
Employ complex tools to identify and analyze your company’s risks and weaknesses Find vulnerabilities in a network infrastructure
Live, Instructor-Led – Live, Online Training
5-day instructor-led training course
Exam voucher included
One-on-one after-course instructor coaching
Live Review Session
Certified Ethical Hacker
Recommended Experience
Two years of security-related experience and a strong practical working knowledge of TCP/IP
Certification Information
This is an EC-Council certification prep course.
Certified Ethical Hacker Course Outline
Ethical Hacking Fundamentals
Considering the effects of hacking
Reviewing the elements of information security
The security, functionality and usability triangle
Outlining the methods of hackers
Reconnaissance
Scanning
Gaining access
Maintaining access Covering tracks
Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
Functions of an ethical hacker
Conducting vulnerability research
Identifying elements of information warfare
Applying Covert Techniques to Scan and Attack a Network
Footprinting and reconnaissance
Objectives and methods of footprinting
Searching for information with Google Hacking
Employing footprinting countermeasures
Scanning networks
Adopting multiple scanning techniques
Identifying IDS–evasion and IP–fragmentation tools
Leveraging vulnerability scanning tools
Applying IP spoofing detection
Examining enumeration techniques
Enumerating user accounts using default passwords
Simple Network Management Protocol (SNMP) enumeration
Analyzing System Risks and Weaknesses to Apply Countermeasures
System hacking
CEH Hacking Methodology (CHM)
Cracking passwords and escalating privileges
Defending against password cracking and keyloggers
Hiding information with steganography
Uncovering Trojans and backdoors
Injecting a Trojan into a host
Analyzing Trojan activity
Dissecting viruses, worms and sniffers
Distributing malware on the web
Recognizing key indicators of a virus attack
Analyzing worms and malware
Social engineering and Denial–of–Service (DoS)
Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks
Recognizing symptoms and techniques of a DoS attack
Implementing tools to defend against DoS attacks
Assessing and Preventing Gaps in a Network Infrastructure
Hacking web applications and wireless networks
Cross–Site Scripting (XSS) and web application DoS attacks
Defending against SQL injection
Implementing a man–in–the–middle attack
Hijacking sessions and web servers
Spoofing a site to steal credentials
Preventing hijacking by implementing countermeasures
Leveraging Metasploit in an attack
Evading IDS, firewalls and honeypots
Assessing various types of Intrusion Detection Systems (IDS) and tools
Bypassing firewalls and accessing blocked sites
Buffer overflow and cryptography
Exploiting input validation failures
Defending against memory corruption attacks
Performing Penetration Testing
Performing security and vulnerability assessments
Determining testing points and locations
Announced vs. unannounced testing