Description

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Target Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

General Objective

- With CEH you will learn how to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you’ll learn how intruders operate and the steps you can take to secure a system.

- In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

Prerequisite

At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+ Prep Course is highly recommended.

Course outlines


• Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds.
• Information Security Overview.
• Information Security Threats and Attack Vectors.
• Hacking Concepts, Types, and Phases.
• Ethical Hacking Concepts and Scope.
• Information Security Controls.
• Information Security Policies.
• Physical Security.
• What is Vulnerability Assessment?
• Penetration Testing.
• Information Security Laws and Standards.

• Foot printing Concepts Information Security Overview.
• Foot printing Methodology.
• Foot printing using Advanced Google Hacking Techniques Ethical Hacking Concepts and Scope.
• Foot printing through Social Networking Sites.
• Website Foot printing Physical Security.
• Email Foot printing Penetration Testing.
• Competitive Intelligence .
• WHOIS Foot printing.
• DNS Foot printing.
• Network Foot printing.
• Foot printing through Social Engineering.
• Foot printing Tools.
• Foot printing Countermeasures.
• Foot printing Penetration Testing.

• Overview of Network Scanning.
• CEH Scanning Methodology.
• Scanning Techniques.
• Scanning Tool: Nets can Tools Pro.
• Scanning Beyond IDS.
• Banner Grabbing.
• Scan for Vulnerability.
• Draw Network Diagrams.
• Prepare Proxies.
• Introduction to Anonymizers.
• Spoofing IP Address.
• IP Spoofing Detection Techniques.
• Scanning Pen Testing.

• Enumeration Concepts.
• NetBIOS Enumeration.
• SNMP Enumeration
• LDAP Enumeration
• NTP Enumeration
• SMTP Enumeration

• Information at Hand before System Hacking Stage.
• System Hacking: Goals.
• CEH Hacking Methodology (CHM).
• CEH System Hacking Steps.
• Cracking Passwords.
• Escalating Privileges.
• Executing Applications.
• Spyware.
• How to Defend Against Keyloggers.
• How to Defend Against Spyware.
• Hiding Files.
• Detecting Rootkits.
• NTFS Data Stream.
• What Is Steganography?.
• Steganalysis.
• Covering Tracks.
• Penetration Testing.

• Introduction to Malware.
• Trojan Concepts.
• Types of Trojans.
• Virus and Worms Concepts.
• Writing a Simple Virus Program.
• Malware Reverse Engineering.
• Malware Detection.
• Countermeasures
• Anti-Malware Software
• Penetration Testing.

• Sniffing Concepts.
• MAC Attacks.
• DHCP Attacks.
• ARP Poisoning.
• Anti-Malware Software.
• Spoofing Attack.
• DNS Poisoning.
• Sniffing Tools.
• Packet Sniffing Tool: Capsa Network Analyzer.
• Network Packet Analyzer.
• Counter measures.
• Sniffing Detection Techniques.
• Promiscuous Detection Tool.
• Sniffing Pen Testing.

• Social Engineering Concepts.
• Social Engineering Techniques.
• Eavesdropping and Shoulder Surfing.
• Reverse Social Engineering, Piggybacking, and Tailgating.
• Computer-based Social Engineering.
• Mobile-based Social Engineering.
• Impersonation on Social Networking Sites.
• Identity Theft.
• Real Steven Gets Huge Credit Card Statement.
• Social Engineering Countermeasures.
• Penetration Testing.

• DoS/DDoS Concepts.
• DoS/DDoS Attack Techniques.
• Botnets.
• DDoS Case Study.
• DoS/DDoS Attack Tools
• Counter-measures.
• DoS/DDoS Protection Tools.
• DoS/DDoS Attack Penetration Testing

• Attack Techniques 2015.
• Session Hijacking Concepts.
• Application Level Session Hijacking.
• Network-level Session Hijacking.
• Session Hijacking Tools.
• Countermeasures.
• Session Hijacking Pen Testing.

• Webserver Market Shares.
• Webserver Concepts.
• Webserver Attacks.
• Webserver Misconfiguration Example.
• Attack Methodology.
• Webserver Footprinting.
• Webserver Attack Tools.
• Countermeasures.
• Patch Management.
• Webserver Security Tools.
• QualysGuard Malware Detection.
• Webserver Pen Testing.

• Web Application Attack Report.
• Variety of Hacking Actions within Web App Attacks Pattern.
• Web App Concepts.
• Web App Threats.
• Command Injection Example.
• How LDAP Injection Works.
• Cross-Site Request Forgery (CSRF) Attack.
• Web Application Denial-of-Service (DoS) Attack.
• Web App Hacking Methodology.
• Attack Web Servers
• Analyze Web Applications
• Attack Authentication Mechanism.
• Authorization Attack Schemes.
• Attack Session Management Mechanism.
• Session Management Attack.
• Perform Injection Attacks.
• Injection Attacks/Input Validation Attacks.
• Attack Data Connectivity.
• Attack Web App Client.
• Attack Web Services.
• Web Application Hacking Tools.
• Web Application Hacking Tools.
• Countermeasures.
• Web Application Security Tools.
• Web Application Firewall.
• Web Application Pen Testing Framework.

• SQL Injection Concepts.
• Types of SQL Injection.
• SQL Injection Methodology.
• Launch SQL Injection Attacks.
• Advanced SQL Injection.
• SQL Injection Tools.
• Evasion Techniques.
• Counter-measures.
• SQL Injection Detection Tool.

• Are You Protected from Hackers on Public Wi-Fi?.
• Wi-Fi Statistics.
• Wireless Concepts.
• Types of Wireless Antenna.
• Wireless Encryption.
• Wireless Hacking Methodology.
• What is Spectrum Analysis?.
• Bluetooth Hacking.
• Countermeasures.
• Wireless Security Tools.
• Wi-Fi Pen Testing.

• Mobile Platform Attack Vectors.
• Hacking Android OS.
• Hacking iOS
• Hacking Windows Phone OS.
• Hacking BlackBerry.
• Mobile Device Management (MDM).
• Mobile Security Guidelines and Tools.
• Mobile Pen Testing.
• Mobile Pen Testing Toolkit.

• Evading IDS.
• IDS/Firewall Evading Tools.
• Detecting Honeypots.
• IDS/Firewall Evasion Counter-measures.
• Penetration Testing.

• Introduction to Cloud Computing.
• Cloud Computing Threats.
• Cloud Computing Attacks.
• SQL Injection Attacks
• Cryptanalysis Attacks.
• Cloud Security.
• Cloud Security Tools
• Cloud Penetration Testing.

• Market Survey 2014: The Year of Encryption.
• Case Study: Heartbleed.
• Case Study: Poodle bleed.
• Cryptography Concepts.
• Encryption Algorithms.
• Cryptography Tools.
• Email Encryption.
• Disk Encryption.
• Cryptography Attacks.
• Cryptanalysis Tools.

Subscribe Email

GET IN TOUCH

Address
PO Box 14390 Faha, 72854 Kuwait
Phone
(+965) 22626234

GET IN TOUCH