CEH Certification Training

Content


EC Council
  1. Ethical Hacking Fundamentals
    • Considering the effects of hacking
      • Reviewing the elements of information security
      • The security, functionality and usability triangle
    • Outlining the methods of hackers
      • Reconnaissance
      • Scanning
      • Gaining access
      • Maintaining access
      • Covering tracks
      • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
    • Functions of an ethical hacker
      • Conducting vulnerability research
      • Identifying elements of information warfare
  2. Applying Covert Techniques to Scan and Attack a Network
    • Footprinting and reconnaissance
      • Objectives and methods of footprinting
      • Searching for information with Google Hacking
      • Employing footprinting countermeasures
    • Scanning networks
      • Adopting multiple scanning techniques
      • Identifying IDS–evasion and IP–fragmentation tools
      • Leveraging vulnerability scanning tools
      • Applying IP spoofing detection
    • Examining enumeration techniques
      • Enumerating user accounts using default passwords
      • Simple Network Management Protocol (SNMP) enumeration

    Delivery Format


    This course is available in the following formats:
    Classroom Live
    Duration: 2 Weeks

    Virtual Class
    Duration: 2 Weeks

  3. Analyzing System Risks and Weaknesses to Apply Countermeasures
    • System hacking
      • CEH Hacking Methodology (CHM)
      • Cracking passwords and escalating privileges
      • Defending against password cracking and keyloggers
      • Hiding information with steganography
    • Uncovering Trojans and backdoors
      • Injecting a Trojan into a host
      • Analyzing Trojan activity
    • Dissecting viruses, worms and sniffers
      • Distributing malware on the web
      • Recognizing key indicators of a virus attack
      • Analyzing worms and malware
    • Social engineering and Denial–of–Service (DoS)
      • Targets, intrusion tactics and strategies for prevention
      • Mitigating the risks of social networking to networks
      • Recognizing symptoms and techniques of a DoS attack
      • Implementing tools to defend against DoS attacks
  4. Performing Penetration Testing
    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing