Open Site Navigation

Certified Ethical Hacker

This Training will educate the student into an interactive environment where they will be shown about how to scan, test, hack and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential se- curity systems. Students will understand how our defense measure works and then to scan their networks & attack their own. Once Training completes students will have hands on under- standing and experience in Ethical Hacking.

Certified Ethical Hacker

Course Modules

Introduction To Ethical Hacking


  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Hacking Phases
  • Types of Attacks
  • Information Security Controls




Footprinting And Reconnaissance


  • Footprinting Concepts
  • Footprinting Threats
  • Footprinting Methodology
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Footprinting using Google
  • WHOIS Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting through
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing




Scanning Networks


  • Overview of Network Scanning
  • CEH Scanning Methodology
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Scanning Pen Testing




Enumeration


  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • UNIX/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • DNS Enumeration




System Hacking


  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing




Trojans and Backdoors


  • Trojan Concepts
  • Trojan Infection
  • Types of Trojans
  • Trojan Detection
  • Countermeasures
  • Anti-Trojan Software
  • Pen Testing for Trojans and Backdoors




Viruses and Worms


  • Virus and Worms Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Counter-measures
  • Penetration Testing for Virus




Sniffers


  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Counter measures
  • Sniffing Pen Testing




Social Engineering


  • Social Engineering Concepts
  • Social Engineering Techniques
  • Imperso-nation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Social Engineering Pen Testing




Denial of Service


  • DoS/DDoS Concepts
  • DoS Attack Techniques
  • Botnet
  • DDoS Case Study
  • DoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • Denial-of-Service (DoS) Attack Penetration Testing




Session Hijacking


  • Session Hijacking Concepts
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measuresSession Hijacking Pen Testing




Hacking Webservers


  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing




Hacking Web Applications


  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Authorization Attack Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Data Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing




SQL Injection


  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • Advanced SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures




Hacking Wireless Networks


  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • GPS Mapping
  • Wireless Traffic Analysis
  • Launch Wireless Attacks
  • Crack Wi-Fi Encryption
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Security ToolsWi-Fi Pen Testing




Hacking Mobile Platforms


  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools




Evading IDS, Firewalls and Honeypots


  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evading Tools
  • Countermeasures
  • Penetration Testing




Cryptography


  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools




Penetration Testing


  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Techniques
  • Pen Testing Phases
  • Pen Testing Roadmap
  • Outsourcing Pen Testing Services





Duration of the courses: 120 Hours

Prerequisites

This course is best suited for Network security officers and practitioners, Site administrators, IS/IT specialist, analyst or manager, IS/IT auditor or consultant, IT operations manager, IT security specialist, analyst, manager, architect or administrator, IT security officer, auditor or engineer, Network specialist, analyst, manager, architect, consultant or administrator, Technical support engineer, Senior systems engineer, Systems analyst or administrator.

Key Benefits

End of this course, you will learn how to successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam, apply countermeasures to secure your system against threats, test system security and data access using real-world hacking techniques, employ complex tools to identify and analyse your company's risks and weaknesses and find vulnerabilities in a network infrastructure