Certified Ethical Hacking Training - CEH Overview


Hacking involves creativity and thinking 'outside-of-the-box', that is why vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of 'defence in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.


The goal of the Ethical Hacking & Countermeasures Course is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Delegates should be prepared for action paced course and the sheer size of the course content, however do not be intimidated as we will release e-learning prior to the delegate attending the course and also the instructor will prepare them thoroughly for the Certification Examination, the maunuals can then be taken home and to work and can be used as excellent reference volumes.

EC-Council Certified Ethical Hacker Certification: EC-Council has successfully certified more than a thousand information security professionals. CEH examination is becoming more demanding and more effective in measuring the true skills of a Penetration tester. Students are now required to be able to interpret identify exploits, log files, identify attack signatures, recommend countermeasures, have a firm grasp of the main tools and know standard procedures involved in penetration testing. The student is tested on 150 questions picked randomly from a pool of questions contributed by the security community. Our Pass rate to date is 98%  

Who Should Attend? This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.
 
Module 1: Introduction to Ethical Hacking
  • Why Security?
  • The Security, functionality and ease of use Triangle
  • Can Hacking be Ethical?
Module 2: Footprinting
  • Defining Footprinting
Module 3: Scanning
  • Definition of Scanning.
  • Types of scanning
Module 4: Enumeration
  • What is Enumeration?
  • NetBios Null Sessions
Module 5: System Hacking
  • Administrator Password Guessing
  • Manual Password Cracking Algorithm
  • Automated Password Cracking
Module 6: Trojans and Backdoors
  • Effect on Business
  • What is a Trojan?
Module 7: Sniffers
  • Definition of sniffing
  • How a Sniffer works?
Module 8: Denial of Service
  • What is Denial of Service?
  • Goal of DoS(Denial of Service)
Module 9: Social Engineering
  • What is Social Engineering?
  • Art of Manipulation
Module 10: Session Hijacking
  • Understanding Session Hijacking
  • Spoofing vs Hijacking
  • How Web Servers Work?
Module 11: Hacking Web Servers
  • How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
  • Web Application Set-up
  • Web Application Hacking
Module 13: Web Based Password Cracking Techniques
  • Authentication- Definition
  • Authentication Mechanisms
  • HTTP Authentication
Module 14: SQL Injection
  • Attacking SQL Servers
  • SQL Server Resolution Service (SSRS)
Module 15: Hacking Wireless Networks
  • Introduction to Wireless Networking
  • Business and Wireless Attacks
Module 16: Virus
  • Virus Characteristics
  • Symptoms of 'virus-like' attack
Module 17: Physical Security
  • Security statistics
  • Physical Security breach incidents
Module 18: Linux Hacking
  • Why Linux?
  • Linux basics
Module 19: Evading Firewalls, IDS and Honeypots
  • Intrusion Detection Systems
  • Ways to Detect Intrusion
Module 20: Buffer Overflows
  • Significance of Buffer Overflow Vulnerability
  • Why are Programs/Applications Vulnerable?
Module 21: Cryptography
  • Public-key Cryptography
  • Working of Encryption
Module 22: Penetration Testing Course
  • Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing
Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques

Module 26: Advanced Reverse Engineering Techniques