Certified Ethical Hacker Course Description
IT Security is a severe issue in the IT industry across the globe, especially with the IT sector booming. Security breaches can come from anywhere. Competitors, spies, rogue employees, bored teens and even hackers are invading computers everywhere to make trouble and steal information. While following best practices and security principles and policies are very important, they cannot guarantee that your data safety will not be compromised.
How can these breaches be prevented? By knowing what to look for. The best way to beat a cybercriminal is to think like them to know what types of attacks they make, and how you can guard against them. Ethical hacking and countermeasures serve to test and evaluate the security of the corporate environment in the real world. Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.
The Ethical Hacker certification by EC-Council gives the students a real-time environment where they get to scan, test, hack and secure their own systems. All students get in-depth knowledge and practical experience with the current essential security systems in our lab intensive environment. How intruders escalate privileges and what steps can be taken to secure a system are some of the basic tactics that the students get trained in. Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation are some of the topics that the students get to learn about in this program.
Certified Ethical Hacking Course Learning Outcomes;
- Learn tools required to be an Ethical Hacker.
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Certified Ethical Hacker Training – Suggested Audience
The Certified Ethical Hacking v9.0 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Suggested attendees based on our past programs are:
- Network Administrator
- System Administrator
- IT Security Analyst
- Web Administrator
- System Engineer
Certified Ethical Hacker In-house/Corporate Training
If you have a group of 5-6 participants, apply for in-house training. For commercials please send us an email with group size to firstname.lastname@example.org
|01. Introduction to Ethical Hacking|
|02. Foot Printing & Reconnaissance|
|03. Scanning Networks|
|05. System Hacking|
|06. Trojans & Backdoors|
|07. Viruses & Worms|
|09. Social Engineering|
|10. Denial of Service|
|11. Session Hijacking|
|12. Hijacking Web servers|
|13. Hacking Web Applications|
|14. SQL Injection|
|15. Hacking Wireless Networks|
|16. Evading IDS, Firewalls & Honey pots|
|17. Buffer Overflow|
|19. Penetration Testing|
|20. Detailed coverage and labs in Module 18: Cryptography|
|Shellshock CVE-2014-6271 Details||00:00:00|
|Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X. Details||00:00:00|
|Detailed coverage and labs in Module 11: Hacking Webservers Details||00:00:00|
|21. Poodle CVE-2014-3566|
|POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password. Details||00:00:00|
|Case study in Module 18: Cryptography Details||00:00:00|
|22. Hacking Using Mobile Phones|
|CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) usingmobile phones Details||00:00:00|
|Courseware covers latestmobile hacking toolsin all the modules Details||00:00:00|
|Coverage of latest Trojan, Virus, Backdoors Details||00:00:00|
|Courseware covers Information Security Controls and Information Security Laws and Standards Details||00:00:00|
|Labs on Hacking Mobile Platforms and Cloud Computing Details||00:00:00|
|More than 40 percent new labs are added from Version 8 Details||00:00:00|
No Reviews found for this course.