When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.



Similar documents
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

EC Council Certified Ethical Hacker V8

[CEH]: Ethical Hacking and Countermeasures

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

CEH Version8 Course Outline

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Detailed Description about course module wise:

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council. Program Brochure. EC-Council. Page 1

Certified Cyber Security Analyst VS-1160

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

CYBERTRON NETWORK SOLUTIONS

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Certified Ethical Hacker Exam Version Comparison. Version Comparison

EC-Council. Certified Ethical Hacker. Program Brochure

Certified Ethical Hacker (CEH)

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

LINUX / INFORMATION SECURITY

Certified Cyber Security Expert V Web Application Development

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

FORBIDDEN - Ethical Hacking Workshop Duration

Ethical Hacking & Cyber Security Workshop

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Loophole+ with Ethical Hacking and Penetration Testing

SONDRA SCHNEIDER JOHN NUNES

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Hackers are here. Where are you?

Course Title: Course Description: Course Key Objective: Fee & Duration:

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Networking: EC Council Network Security Administrator NSA

A Systems Engineering Approach to Developing Cyber Security Professionals

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Certified Cyber Security Analyst VS-1160

Workshop Designed & Powered by TCIL IT, Chandigarh

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Hackers are here. Where are you?

Course Content: Session 1. Ethics & Hacking

Build Your Own Security Lab

CS Ethical Hacking Spring 2016

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Introduction to Cyber Security / Information Security

Penetration Testing. Presented by

EC-Council Certified Security Analyst (ECSA)

FSP-201: Ethical Hacking & IT Security

EC-Council Ethical Hacking and Countermeasures

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Understanding Security Testing

InfoSec Academy Pen Testing & Hacking Track

Ethical Hacking v7 40 H.

INFORMATION SECURITY TRAINING

13 Ways Through A Firewall

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Analyze. Secure. Defend. Do you hold ECSA credential?

Ethical Hacking Course Layout

Chapter 15: Computer and Network Security

Promoting Network Security (A Service Provider Perspective)

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Ethical Hacking I Course of Study for HAC2

ETHICAL HACKING CYBER SECURITY

Security A to Z the most important terms

Emerging Security Technological Threats

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

13 Ways Through A Firewall What you don t know will hurt you

Jort Kollerie SonicWALL

Course Title: Penetration Testing: Network & Perimeter Testing

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

CIS 4204 Ethical Hacking Fall, 2014

Defending Against Data Beaches: Internal Controls for Cybersecurity

Network/Internet Forensic and Intrusion Log Analysis

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

MW , TU 1-3; and other times by appointment

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

RMAR Technologies Pvt. Ltd.

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

IBM Protocol Analysis Module

Network Security Administrator

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Transcription:

Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab environment gives each student in-depth knowledge and practical experience with the essential security systems. Students will begin by understanding the anatomy of an attack and then be lead into scanning and attacking their own networks, although no real network is harmed. Students will also learn about: logical security alongside physical security; popular operating systems and applications; remote and LAN based hacking techniques; denial of service attacks through to the use of buffer overflows to compromise a system. The course showcases the tools required to be an Ethical Hacker. The Instructor will lead the class through proof of concept and finish on how to use the tools successfully in an attack. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Pre-requisites: This certification will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Delegates should have at least two years of information technology security experience, a strong working knowledge of TCP/IP, and a basic familiarity with Linux. Course Content: Module 1: Introduction to Ethical Hacking Module 2: Hacking Laws Module 3: Footprinting

Module 4: Google Hacking Module 5: Scanning Module 6: Enumeration Module 7: System Hacking Module 8: Trojans and Backdoors Module 9: Viruses and Worms Module 10: Sniffers Module 11: Social Engineering Module 12: Phishing Module 13: Hacking Email Accounts Module 14: Denial-of-Service Module 15: Session Hijacking Module 16: Hacking Web Servers Module 17: Web Application Vulnerabilities Module 18: Web-Based Password Cracking Techniques Module 19: SQL Injection Module 20: Hacking Wireless Networks Module 21: Physical Security

Module 22: Linux Hacking Module 23: Evading IDS, Firewalls and Detecting Honey Pots Module 24: Buffer Overflows Module 25: Cryptography Module 26: Penetration Testing Module 27: Covert Hacking Module 28: Writing Virus Codes Module 29: Assembly Language Tutorial Module 30: Exploit Writing Module 31: Smashing the Stack for Fun and Profit Module 32: Windows Based Buffer Overflow Exploit Writing Module 33: Reverse Engineering Module 34: MAC OS X Hacking Module 35: Hacking Routers, Cable Modems and Firewalls Module 36: Hacking Mobile Phones, PDA and Handheld Devices Module 37: Bluetooth Hacking Module 38: VoIP Hacking

Module 39: RFID Hacking Module 40: Spamming Module 41: Hacking USB Devices Module 42: Hacking Database Servers Module 43: Cyber Warfare- Hacking, Al-Qaida and Terrorism Module 44: Internet Content Filtering Techniques Module 45: Privacy on the Internet Module 46: Securing Laptop Computers Module 47: Spying Module 48: Corporate Espionage- Hacking Using Insiders Module 49: Creating Security Policies Module 50: Software Piracy and Warez Module 51: Hacking and Cheating Online Games Module 52: Hacking RSS and Atom Module 53: Hacking Web Browsers (Firefox, IE) Module 54: Proxy Server Module 55: Data Loss Prevention

Module 56: Hacking Global Positioning System (GPS) Module 57: Computer Forensics and Incident Handling Module 58: Credit Card Frauds Module 59: How to Steal Passwords Module 60: Firewall Module 61: Threats and Countermeasures Module 62: Case Studies Module 63: Botnets Module 64: Economic Espionage Module 65: Patch Management Module 66: Security Convergence Module 67: Identifying the Terrorist Course Duration: 5 Days