Certified Ethical Hacker (CEH v10) Training Bundle 5

Certified Ethical Hacker (CEH v10) Training

Level: Intermediate
Course: 2031
NOTE: This course description is part of David Tech Bundle 5.
(Course Information, Tuition and Enrollment information for all individual courses available under ‘Course Catalog / David Tech CompTIA Courses‘)

In this award-winning Certified Ethical Hacker (CEH v10) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your CEH certification course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam remotely.

Certification Voucher Extensions

EC-Council is extending expiration dates on ALL ECC Exam Vouchers by 90 days at no cost, to ensure everyone has the appropriate time to prepare for their certification exams.

Key Features of this Certified Ethical Hacker Training:

Official EC-Council Curriculum

Access to hundreds of exam prep questions

Exam voucher included in course tuition After-course instructor coaching benefit

After-course computing sandbox included

You Will Learn How To:

Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam

Apply countermeasures to secure your system against threats

Test system security and data access using real-world hacking techniques

Employ complex tools to identify and analyze your company’s risks and weaknesses Find vulnerabilities in a network infrastructure

Live, Instructor-Led – Live, Online Training

10-day instructor-led training course

Exam voucher included

One-on-one after-course instructor coaching

After-course computing sandbox

Tuition can be paid later by invoice -OR- at the time of checkout by credit card

Certified Ethical Hacker Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking

Reviewing the elements of information security

The security, functionality and usability triangle

Outlining the methods of hackers

Reconnaissance

Scanning

Gaining access

Maintaining access Covering tracks

Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

Conducting vulnerability research

Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

Objectives and methods of footprinting

Searching for information with Google Hacking

Employing footprinting countermeasures

Scanning networks

Adopting multiple scanning techniques

Identifying IDS–evasion and IP–fragmentation tools

Leveraging vulnerability scanning tools

Applying IP spoofing detection

Examining enumeration techniques

Enumerating user accounts using default passwords

Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

CEH Hacking Methodology (CHM)

Cracking passwords and escalating privileges

Defending against password cracking and keyloggers

Hiding information with steganography

Uncovering Trojans and backdoors

Injecting a Trojan into a host

Analyzing Trojan activity

Dissecting viruses, worms and sniffers

Distributing malware on the web

Recognizing key indicators of a virus attack

Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks

Recognizing symptoms and techniques of a DoS attack

Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

Cross–Site Scripting (XSS) and web application DoS attacks

Defending against SQL injection

Implementing a man–in–the–middle attack

Hijacking sessions and web servers

Spoofing a site to steal credentials

Preventing hijacking by implementing countermeasures

Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

Assessing various types of Intrusion Detection Systems (IDS) and tools

Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

Exploiting input validation failures

Defending against memory corruption attacks

Performing Penetration Testing

Performing security and vulnerability assessments

Determining testing points and locations

Announced vs. unannounced testing

CEH Training FAQs

How do I become a Certified Ethical Hacker?

To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

How do I take the EC-Council Certified Ethical Hacker exam?

This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification.

Comments are closed.