Certified Ethical Hacker (CEH v11) Training

Certified Ethical Hacker (CEH v11) Training

Level: Intermediate
Course #: 2031

Course info - Prices, Enrollment
 
Key Features of this Certified Ethical Hacker Training:

Official EC-Council Curriculum

Access to hundreds of exam prep questions

Exam voucher included in course tuition After-course instructor coaching benefit

After-course computing sandbox included

You Will Learn How To:

Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam

Apply countermeasures to secure your system against threats

Test system security and data access using real-world hacking techniques

Employ complex tools to identify and analyze your company’s risks and weaknesses Find vulnerabilities in a network infrastructure

Live, Instructor-Led – Live, Online Training

5-day instructor-led training course

Exam voucher included

One-on-one after-course instructor coaching

Live Review Session

Certified Ethical Hacker

Recommended Experience

Two years of security-related experience and a strong practical working knowledge of TCP/IP

Certification Information

This is an EC-Council certification prep course.

Certified Ethical Hacker Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking

Reviewing the elements of information security

The security, functionality and usability triangle

Outlining the methods of hackers

Reconnaissance

Scanning

Gaining access

Maintaining access Covering tracks

Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

Conducting vulnerability research

Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

Objectives and methods of footprinting

Searching for information with Google Hacking

Employing footprinting countermeasures

Scanning networks

Adopting multiple scanning techniques

Identifying IDS–evasion and IP–fragmentation tools

Leveraging vulnerability scanning tools

Applying IP spoofing detection

Examining enumeration techniques

Enumerating user accounts using default passwords

Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

CEH Hacking Methodology (CHM)

Cracking passwords and escalating privileges

Defending against password cracking and keyloggers

Hiding information with steganography

Uncovering Trojans and backdoors

Injecting a Trojan into a host

Analyzing Trojan activity

Dissecting viruses, worms and sniffers

Distributing malware on the web

Recognizing key indicators of a virus attack

Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

Targets, intrusion tactics and strategies for prevention Mitigating the risks of social networking to networks

Recognizing symptoms and techniques of a DoS attack

Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

Cross–Site Scripting (XSS) and web application DoS attacks

Defending against SQL injection

Implementing a man–in–the–middle attack

Hijacking sessions and web servers

Spoofing a site to steal credentials

Preventing hijacking by implementing countermeasures

Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

Assessing various types of Intrusion Detection Systems (IDS) and tools

Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

Exploiting input validation failures

Defending against memory corruption attacks

Performing Penetration Testing

Performing security and vulnerability assessments

Determining testing points and locations

Announced vs. unannounced testing

Course info - Prices, Enrollment

Comments are closed.