CEH Certification Training
Content
- Ethical Hacking Fundamentals
- Considering the effects of hacking
- Reviewing the elements of information security
- The security, functionality and usability triangle
- Outlining the methods of hackers
- Reconnaissance
- Scanning
- Gaining access
- Maintaining access
- Covering tracks
- Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
- Functions of an ethical hacker
- Conducting vulnerability research
- Identifying elements of information warfare
- Applying Covert Techniques to Scan and Attack a Network
- Footprinting and reconnaissance
- Objectives and methods of footprinting
- Searching for information with Google Hacking
- Employing footprinting countermeasures
- Scanning networks
- Adopting multiple scanning techniques
- Identifying IDS–evasion and IP–fragmentation tools
- Leveraging vulnerability scanning tools
- Applying IP spoofing detection
- Examining enumeration techniques
- Enumerating user accounts using default passwords
- Simple Network Management Protocol (SNMP) enumeration
- Analyzing System Risks and Weaknesses to Apply Countermeasures
- System hacking
- CEH Hacking Methodology (CHM)
- Cracking passwords and escalating privileges
- Defending against password cracking and keyloggers
- Hiding information with steganography
- Uncovering Trojans and backdoors
- Injecting a Trojan into a host
- Analyzing Trojan activity
- Dissecting viruses, worms and sniffers
- Distributing malware on the web
- Recognizing key indicators of a virus attack
- Analyzing worms and malware
- Social engineering and Denial–of–Service (DoS)
- Targets, intrusion tactics and strategies for prevention
- Mitigating the risks of social networking to networks
- Recognizing symptoms and techniques of a DoS attack
- Implementing tools to defend against DoS attacks
- Performing Penetration Testing
- Performing security and vulnerability assessments
- Determining testing points and locations
- Announced vs. unannounced testing
Delivery Format
This course is available in the following formats:
Classroom Live
Duration: 2 Weeks
Virtual Class
Duration: 2 Weeks