[CEH]: Ethical Hacking and Countermeasures



Similar documents
EC Council Certified Ethical Hacker V8

CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

EC-Council. Certified Ethical Hacker. Program Brochure

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

EC-Council. Program Brochure. EC-Council. Page 1

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Detailed Description about course module wise:

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Certified Ethical Hacker (CEH)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

SONDRA SCHNEIDER JOHN NUNES

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

LINUX / INFORMATION SECURITY

Professional Penetration Testing Techniques and Vulnerability Assessment ...

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Ethical Hacking v7 40 H.

FSP-201: Ethical Hacking & IT Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

INFORMATION SECURITY TRAINING

CRYPTUS DIPLOMA IN IT SECURITY

Corso: Certified Ethical Hacker Codice PCSNET: SIIN-1 Cod. Vendor: CEH Durata: 5

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

EC-Council Ethical Hacking and Countermeasures

Ethical Hacking Course Layout

Course Title: Course Description: Course Key Objective: Fee & Duration:

ETHICAL HACKING. By REAL TIME FACULTY

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Networking: EC Council Network Security Administrator NSA

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

CompTIA Security+ (Exam SY0-410)

CS Ethical Hacking Spring 2016

RMAR Technologies Pvt. Ltd.

Certified Cyber Security Expert V Web Application Development

A Systems Engineering Approach to Developing Cyber Security Professionals

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

MW , TU 1-3; and other times by appointment

Hackers are here. Where are you?

InfoSec Academy Pen Testing & Hacking Track

CERTIFIED PENETRATION TESTING CONSULTANT

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Understanding Security Testing

Certified Cyber Security Analyst VS-1160

Course Title: Penetration Testing: Security Analysis

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Audience. Pre-Requisites

Ethical Hacking I Course of Study for HAC2

Web App Security Audit Services


Brandman University. School of CCNA

Securing Cisco Network Devices (SND)

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Certified Ethical Hacking. CEH v8 Course. Ημέρα & Ημερομηνία Διεξαγωγής. 02/11/ /11-04/11 05/11-06/11-09/11 6 Συναντήσεις 9:00-17:00

Preliminary Course Syllabus

IINS Implementing Cisco Network Security 3.0 (IINS)

CIS 4204 Ethical Hacking Fall, 2014

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

Certified Security Analyst

BUY ONLINE FROM:

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Implementing Cisco IOS Network Security

KEVIN CARDWELL. Q/SA (Qualified Security Analyst) Penetration Tester. & Optional Q/PTL (Qualified Penetration Licence) Workshop

Penetration Testing. Presented by

Build Your Own Security Lab

CCA CYBER SECURITY TRACK

Hackers are here. Where are you?

locuz.com Professional Services Security Audit Services

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Network Security: A Practical Approach. Jan L. Harrington

Application Security Testing

Students must have at least 2 years experience in being a Network Administrator before attempting this course.

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Security + Certification (ITSY 1076) Syllabus

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Assessing Network Security

Jort Kollerie SonicWALL

Penetration testing & Ethical Hacking. Security Week 2014

Network Security Fundamentals

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Transcription:

[CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. : Instructor-led Course Overview This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50. Audience Profile This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Certification The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric/VUE exam to receive CEH certification. Course Outline Module 1: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information Security Controls

Module 2: Footprinting and Reconnaissance Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing Module 3: Scanning Networks Overview of Network Scanning CEH Scanning Methodology Module 4: Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration UNIX/Linux Enumeration LDAP Enumeration NTP Enumeration SMTP Enumeration DNS Enumeration Enumeration Countermeasures SMB Enumeration Countermeasures Enumeration Pen Testing Module 5: System Hacking Information at Hand Before System Hacking Stage System Hacking: Goals CEH Hacking Methodology (CHM) CEH System Hacking Steps Module 6: Trojans and Backdoors Trojan Concepts Trojan Infection Types of Trojans Trojan Detection Countermeasures Anti-Trojan Software Pen Testing for Trojans and Backdoors

Module 7: Viruses and Worms Virus and Worms Concepts Types of Viruses Computer Worms Malware Analysis Penetration Testing for Virus Module 8: Sniffers Sniffing Concepts MAC Attacks DHCP Attacks ARP Poisoning Spoofing Attack DNS Poisoning Sniffing Tools Counter measures Sniffing Pen Testing Module 9: Social Engineering Social Engineering Concepts Social Engineering Techniques Imperso-nation on Social Networking Sites Identity Theft Social Engineering Countermeasures Social Engineering Pen Testing Module 10: Denial of Service DoS/DDoS Concepts DoS Attack Techniques Botnet DDoS Case Study DoS Attack Tools DoS/DDoS Protection Tools Denial-of-Service (DoS) Attack Penetration Testing Module 11: Session Hijacking Session Hijacking Concepts Network-level Session Hijacking Session Hijacking Tools

Counter-measures Session Hijacking Pen Testing Module 12: Hacking Webservers Webserver Concepts Webserver Attacks Attack Methodology Webserver Attack Tools Patch Management Webserver Security Tools Webserver Pen Testing Module 13: Hacking Web Applications Web App Concepts Web App Threats Web App Hacking Methodology Web Application Hacking Tools Countermeasures Web App Pen Testing Module 14: SQL Injection SQL Injection Concepts Testing for SQL Injection Types of SQL Injection Blind SQL Injection SQL Injection Methodology Advanced SQL Injection Evasion Techniques Module 15: Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Wireless Security Tools Wi-Fi Pen Testing

Module 16: Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking ios Hacking Windows Phone OS Hacking BlackBerry Mobile Device Management (MDM) Mobile Security Guidelines and Tools Mobile Pen Testing Module 17: Evading IDA, Firewalls, and Honeypots IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot System Evading IDS Evading Firewalls Detecting Honeypots Firewall Evading Tools Countermeasures Penetration Testing Module 18: Buffer Overflow Buffer Overflow Concepts Buffer Overflow Methodology Buffer Overflow Examples Buffer Overflow Detection Buffer Overflow Counter-measures Buffer Overflow Security Tools Buffer Overflow Penetration Testing Module 19: Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure(PKI) Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools

Module 20: Penetration Testing Pen Testing Concepts Types of Pen Testing Pen Testing Techniques Pen Testing Phases Pen Testing Roadmap Outsourcing Pen Testing Services