Certified Ethical Hacking Training - CEH Overview


Hacking involves creativity and thinking 'outside-of-the-box', that is why vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of 'defence in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

The goal of the Ethical Hacking & Countermeasures Course is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Delegates should be prepared for action paced course and the sheer size of the course content, however do not be intimidated as we will release e-learning prior to the delegate attending the course and also the instructor will prepare them thoroughly for the Certification Examination, the maunuals can then be taken home and to work and can be used as excellent reference volumes.

EC-Council Certified Ethical Hacker Certification:  EC-Council has successfully certified more than a thousand information security professionals. CEH examination is becoming more demanding and more effective in measuring the true skills of a Penetration tester. Students are now required to be able to interpret identify exploits, log files, identify attack signatures, recommend countermeasures, have a firm grasp of the main tools and know standard procedures involved in penetration testing. The student is tested on 150 questions picked randomly from a pool of questions contributed by the security community. Our Pass rate to date is 98% 

Who Should Attend? 

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.
Here is what you will study during the training of CEH.

Module 1: Introduction to Ethical Hacking
  • Why Security?
  • The Security, functionality and ease of use Triangle
  • Can Hacking be Ethical?

Module 2: Footprinting
  • Defining Footprinting

Module 3: Scanning
  • Definition of Scanning.
  • Types of scanning

Module 4: Enumeration
  • What is Enumeration?
  • NetBios Null Sessions

Module 5: System Hacking
  • Administrator Password Guessing
  • Manual Password Cracking Algorithm
  • Automated Password Cracking

Module 6: Trojans and Backdoors
  • Effect on Business
  • What is a Trojan?

Module 7: Sniffers
  • Definition of sniffing
  • How a Sniffer works?

Module 8: Denial of Service
  • What is Denial of Service?
  • Goal of DoS(Denial of Service)

Module 9: Social Engineering
  • What is Social Engineering?
  • Art of Manipulation

Module 10: Session Hijacking
  • Understanding Session Hijacking
  • Spoofing vs Hijacking
  • How Web Servers Work?

Module 11: Hacking Web Servers
  • How are Web Servers Compromised?
Module 12: Web Application Vulnerabilities
  • Web Application Set-up
  • Web Application Hacking

Module 13: Web Based Password Cracking Techniques
  • Authentication- Definition
  • Authentication Mechanisms
  • HTTP Authentication

Module 14: SQL Injection
  • Attacking SQL Servers
  • SQL Server Resolution Service (SSRS)

Module 15: Hacking Wireless Networks
  • Introduction to Wireless Networking
  • Business and Wireless Attacks

Module 16: Virus
  • Virus Characteristics
  • Symptoms of 'virus-like' attack

Module 17: Physical Security
  • Security statistics
  • Physical Security breach incidents

Module 18: Linux Hacking

  • Why Linux?
  • Linux basics

Module 19: Evading Firewalls, IDS and Honeypots
  • Intrusion Detection Systems
  • Ways to Detect Intrusion

Module 20: Buffer Overflows
  • Significance of Buffer Overflow Vulnerability
  • Why are Programs/Applications Vulnerable?

Module 21: Cryptography
  • Public-key Cryptography
  • Working of Encryption

Module 22: Penetration Testing Course
  • Introduction to Penetration Testing (PT)
Module 23: Advanced Exploit Writing
Module 24: Advanced Covert Hacking Techniques
Module 25: Advanced Virus Writing Techniques
Module 26: Advanced Reverse Engineering Techniques

For more news, follow us on Facebook , Twitter and G+.

Written by

We are Creative Blogger Theme Wavers which provides user friendly, effective and easy to use themes. Each support has free and providing HD support screen casting.

0 comments:

Post a Comment

 

© 2013 HackersFall. All rights resevered. Designed by Templateism

Back To Top