Ethical Hacking

 

Certified Ethical Hacking

Introduction

Ethical Hacker: The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technology from an offensive perspective. The course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field.

Prerequisites

  • Students taking the CEH course must have several years of information technology experience, TCP/IP and a general technical background.
  • In addition, the student needs extensive training in Linux basic skills, IP addressing, Configuring Routing and Linux Compiling running programs.

How You Will Benefit

  • This class will immerse the student into an interactive environment where s/he will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
  • Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.
  • Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical hacking.

What You Will Cover

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Hacking Laws
  • Module 3: Foot printing
  • Module 4: Google Hacking
  • Module 5: Scanning
  • Module 6: Enumeration
  • Module 7: System Hacking
  • Module 8: Trojans and Backdoors
  • Module 9: Viruses and Worms
  • Module 10: Sniffers
  • Module 11: Social Engineering
  • Module 12: Phishing
  • Module 13: Hacking Email Accounts
  • Module 14: Denial-of-Service
  • Module 15: Session Hijacking
  • Module 16: Hacking Web Servers
  • Module 17: web Application Vulnerabilities
  • Module 18: Web-Based Password Cracking Techniques
  • Module 19: SQL Injection
  • Module 20: Hacking Wireless Networks
  • Module 21: Physical Security
  • Module 22: Linux Hacking
  • Module 23: Evading IDS, Firewalls and Detecting Honey Pots
  • Module 24: Buffer Overflows
  • Module 25: Cryptography

Who Needs to Attend

  • This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
No entries found.