CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]



Similar documents
CEH Version8 Course Outline

[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

Certified Ethical Hacker Exam Version Comparison. Version Comparison

EC-Council. Certified Ethical Hacker. Program Brochure

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Ethical Hacking Course Layout

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

CYBERTRON NETWORK SOLUTIONS

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Detailed Description about course module wise:

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

CRYPTUS DIPLOMA IN IT SECURITY

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CompTIA Security+ (Exam SY0-410)

Corso: Certified Ethical Hacker Codice PCSNET: SIIN-1 Cod. Vendor: CEH Durata: 5

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Networking: EC Council Network Security Administrator NSA

Threat Events: Software Attacks (cont.)

SONDRA SCHNEIDER JOHN NUNES

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Security Analyst

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Chapter 15: Computer and Network Security

INFORMATION SECURITY TRAINING

Loophole+ with Ethical Hacking and Penetration Testing

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

EC-Council. Program Brochure. EC-Council. Page 1


FSP-201: Ethical Hacking & IT Security

Security + Certification (ITSY 1076) Syllabus

Build Your Own Security Lab

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

ASK PC Certified Information Systems Security Expert - CISSE

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

ETHICAL HACKING. By REAL TIME FACULTY

RMAR Technologies Pvt. Ltd.

A Systems Engineering Approach to Developing Cyber Security Professionals

EC-Council Certified Security Analyst (ECSA)

LINUX / INFORMATION SECURITY

EC-Council Ethical Hacking and Countermeasures

Hackers are here. Where are you?

Certified Cyber Security Analyst VS-1160

EC-Council Certified Ethical Hacker v.8. Course Overview

Vulnerability Assessment and Penetration Testing

Description: Objective: Attending students will learn:

Ethical Hacking and Countermeasures

Build Your Knowledge!

Ethical Hacking v7 40 H.

Malicious Network Traffic Analysis

CERTIFIED PENETRATION TESTING CONSULTANT

Ethical Hacking and Countermeasures

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

The Solution: EC-Council Press. This Certification: C EH Certified Ethical Hacker

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Ethical Hacking and Countermeasures V8

Ethical Hacking and Countermeasures (Version 8)

Course Title: Course Description: Course Key Objective: Fee & Duration:

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

IINS Implementing Cisco Network Security 3.0 (IINS)

Certified Penetration Testing Specialist

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.

Assessing Network Security

Hosts HARDENING WINDOWS NETWORKS TRAINING

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Jort Kollerie SonicWALL

McAfee Certified Assessment Specialist Network

Implementing Cisco IOS Network Security

Web App Security Audit Services

Application Security Testing

Ethical Hacking and Countermeasures

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Certified Penetration Testing Specialist

Course Title: Penetration Testing: Security Analysis

CompTIA Network+ (Exam N10-005)

Network Security Administrator

Students must have at least 2 years experience in being a Network Administrator before attempting this course.

EC-Council CEH v.7. Course Introduction

Eleventh Hour Security+

Hackers are here. Where are you?

CIS 4204 Ethical Hacking Fall, 2014

2016 TÜBİTAK BİLGEM Cyber Security Institute

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Windows Operating Systems. Basic Security

Transcription:

CH EHC EC-Council Ethical Hacking and [v.9] Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Intermediate Ethical Hacking Core Delivery Method Instructor-led (Classroom) Training Credits / Vouchers N/A Introduction The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, To beat a hacker, you need to think like a hacker. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This ethical hacking course puts you in the driver s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and taught how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks! Prerequisites The knowledge and skills that a learner must have before attending this course is as follows: Have successfully completed EC-Council s Network Security Administrator (ENSA) course or Have successfully completed Comptia s Security+ (IN-SE) course There is a minimum age requirement that applies and attendance of the Ethical Hacking and training course or attempts at the relevant exam, is restricted to candidates who are at least 18 years old Course Objectives Upon completing this course, the learner will be able to: Master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Content 1. Introduction to Ethical Hacking Internet is an Integral Part of Business and Personal Life What happens online in 60 Seconds Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types and Phases Ethical Hacking Concepts and Scope Information Security Controls Information Security Laws and Standards 2. Footprinting and Reconnaissance Footprinting Concepts Footprinting Methodology Footprinting Tools Footprinting Footprinting Penetration Testing 3. Scanning Networks Overview of Network Scanning CEH Scanning Methodology Checking for Open Ports Scanning Beyond IDS Banner Grabbing Scan for Vulnerability Draw Network Diagrams Prepare Proxies Scanning Pen Testing 4. Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP Enumeration SMTP Enumeration Enumeration SMB Enumeration Enumeration Pen Testing 5. System Hacking Information at Hand Before System Hacking Stage System Hacking: Goals CEH Hacking Methodology (CHM) CEH System Hacking Steps Cracking Passwords Password Cracking Types of Password Attacks Non-Electronic Attacks Active Online Attack Dictionary, Brute Forcing and Rule-based Attack Password Guessing Default Passwords Active Online Attack: Trojan/Spyware/Keylogger Example of Active Online Attack Using USB Drive Hash Injection Attack Passive Online Attack Wire Sniffing Man-in-the-Middle and Replay Attack Offline Attack Rainbow Attacks Tools to Create Rainbow Tables: rtgen and Winrtgen Distributed Network Attack Elcomsoft Distributed Password Recovery Microsoft Authentication How Hash Passwords Are Stored in Windows SAM? NTLM Authentication Process Kerberos Authentication Password Salting pwdump7 and fgdump Password Cracking Tools L0phtCrack and Ophcrack Cain & Abel and RainbowCrack Password Cracking Tools Password Cracking Tool for Mobile: FlexiSPY Password Grabber How to Defend against Password Cracking Implement and Enforce Strong Security Policy CEH System Hacking Steps Escalating Privileges Privilege Escalation Privilege Escalation Using DLL Hijacking Privilege Escalation Tool: Active@ Password Changer Privilege Escalation Tools How to Defend Against Privilege Escalation Executing Applications RemoteExec PDQ Deploy DameWare Remote Support Keylogger Types of Keystroke Loggers Hardware Keyloggers Keylogger: All In One Keylogger Keyloggers for Windows Keylogger for Mac: Amac Keylogger for Mac Keyloggers for MAC Spyware Spyware: Spytech SpyAgent Spyware: Power Spy 2014 What Does the Spyware Do? Spyware USB Spyware: USBSpy Audio Spyware: Spy Voice Recorder and Sound Snooper

Video Spyware: WebCam Least Significant Bit Insertion Penetration Testing Recorder Masking and Filtering Password Cracking Cellphone Spyware: Mobile Spy Algorithms and Transformation Privilege Escalation Telephone/Cellphone Spyware Image Steganography: Executing Applications GPS Spyware: SPYPhone QuickStego Hiding Files GPS Spyware Image Steganography Tools How to Defend Against Document Steganography: Keyloggers wbstego 6. Malware Threats Anti-Keylogger: Zemana Document Steganography Tools Introduction to Malware AntiLogger Video Steganography Trojan Concepts Anti-Keylogger Video Steganography: OmniHide Types of Trojans How to Defend Against Spyware PRO and Masker Virus and Worm Concepts Anti-Spyware: Video Steganography Tools Malware Reverse Engineering SUPERAntiSpyware Audio Steganography Malware Detection Anti-Spyware Audio Steganography: Hiding Files DeepSound Anti-Malware Software Rootkits Audio Steganography Tools Penetration Testing Types of Rootkits Folder Steganography: Invisible How Rootkit Works Secrets 4 7. Sniffing Rootkit Folder Steganography Tools Sniffing Concepts Avatar Spam/Email Steganography: MAC Attacks Necurs Spam Mimic DHCP Attacks Azazel Steganography Tools for Mobile ARP Poisoning ZeroAccess Phones Spoofing Attack Detecting Rootkits Steganalysis DNS Poisoning Steps for Detecting Rootkits Steganalysis Methods/Attacks Sniffing Tools How to Defend against Rootkits on Steganography Sniffing Tool: Wireshark Anti-Rootkit: Stinger and Detecting Text and Image Follow TCP Stream in Wireshark UnHackMe Steganography Display Filters in Wireshark Anti-Rootkits Detecting Audio and Video Additional Wireshark Filters NTFS Data Stream Steganography Sniffing Tool How to Create NTFS Streams Steganography Detection Tool: Packet Sniffing Tool: Capsa NTFS Stream Manipulation Gargoyle Investigator Forensic Network Analyser How to Defend against NTFS Pro Network Packet Analyser Streams Steganography Detection Tools Counter measures NTFS Stream Detector: Sniffing Detection Techniques StreamArmor Sniffing Pen Testing NTFS Stream Detectors Disabling Auditing: Auditpol What Is Steganography? Clearing Logs 8. Social Engineering Classification of Steganography Manually Clearing Event Logs Social Engineering Concepts Types of Steganography based Ways to Clear Online Tracks Social Engineering Techniques on Cover Medium Tool: CCleaner Impersonation on Social Whitespace Steganography Tool: MRU- Networking Sites Tool: SNOW Blaster Identity Theft Image Steganography Track Covering Tools

Social Engineering Penetration Testing 9. Denial of Service DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DDoS Case Study DoS/DDoS Attack Tools Counter-measures DoS/DDoS Protection Tools DoS/DDoS Attack Penetration Testing 10. Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network-level Session Hijacking Session Hijacking Tools Counter-measures Session Hijacking Pen Testing 11. Hacking Webservers Webserver Concepts Webserver Attacks Attack Methodology Webserver Attack Tools Counter-measures Patch Management Webserver Security Tools Webserver Pen Testing 12. Hacking Web Applications Web App Concepts Web App Threats Web App Hacking Methodology Web Application Hacking Tools Security Tools Web App Pen Testing 13. SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology Advanced SQL Injection SQL Injection Tools Evasion Techniques Counter-measures 14. Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Counter-measures Wireless Security Tools Wi-Fi Pen Testing 15. Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking ios Hacking Windows Phone OS Hacking BlackBerry Mobile Device Management (MDM) Mobile Security Guidelines and Tools Mobile Pen Testing 16. Evading IDS, Firewalls, and Honeypots IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot System Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Penetration Testing 17. Cloud Computing Introduction to Cloud Computing Cloud Computing Threats Cloud Computing Attacks Cloud Security Cloud Security Tools Cloud Penetration Testing 18. Cryptography Market Survey 2014: The Year of Encryption Case Study: Heartbleed Case Study: Poodlebleed Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure(PKI) Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools

Associated Certifications & Exam The CEH certification Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendorneutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50*. Exam Info: Number of Questions: 125 Passing Score: 70% Test Duration: 4 Hours Test Format: Multiple Choice On successful completion of this course students will receive a Torque IT attendance certificate *When you attend any authorized EC Council training course at Torque IT you will receive the associated Prime IBT examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorized EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your Prime IBT examination voucher into a Pearson VUE examination voucher, at an additional cost of USD100.