Ready to Learn More

CEH: Certified Ethical Hacker

OVERVIEW:

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

COURSE CONTENTS:

    Module 1: Introduction to Ethical Hacking
  • Explaining the Certification
  • Introducing Security
  • Introducing Hacking
  • Introduction to Ethical Hacking
    Module 2: Foot printing
  • Defining Foot printing
  • Information Gathering Methodology
  • Locate the Network Range
  • Hacking Tools
    Module 3: Scanning
  • Definition of Scanning
  • Types of scanning
  • Objectives of Scanning
  • Scanning Methodology
  • Classification of Scanning
  • Hacking Tools
  • Countermeasures
    Module 4: Enumeration
  • What is Enumeration?
  • NetBios Null Sessions
  • Hacking Tools
  • Enumerating User Accounts
  • Active Directory Enumeration and Countermeasures
    Module 5: System Hacking
  • Administrator Password Guessing
  • Manual Password Cracking Algorithm
  • Automated Password Cracking
  • Password Types
  • Types of Password Attacks
  • Hacking Tools
    Module 6: Trojans and Backdoors
  • Effect on Business
  • What is a Trojan?
  • Overt and Covert Channels
  • Indications of a Trojan Attack
  • Reverse Engineering Trojans
  • Backdoor Countermeasures
    Module 7: Sniffers
  • Definition of sniffing
  • How a Sniffer works?
  • Passive Sniffing
  • Active Sniffing
  • Hacking Tools
  • Sniffing Countermeasures
    Module 8: Denial of Service
  • What is Denial of Service?
  • Goal of DoS(Denial of Service)
  • Impact and Modes of Attack
  • DoS Attack Classification
  • Hacking Tools
  • Countermeasures for Reflected DoS
  • Tools for Detecting DDOS Attacks
    Module 9: Social Engineering
  • What is Social Engineering?
  • Art of Manipulation
  • Human Weakness
  • Common Types of Social Engineering
  • Human Based Impersonation
    Module 10: Session Hijacking
  • Understanding Session Hijacking
  • Spoofing vs. Hijacking
  • Steps in Session Hijacking
  • Types of Session Hijacking
  • Hacking Tools
  • Protection against Session Hijacking
  • Countermeasures: IP Security
    Module 11: Hacking Web Servers
  • Popular Web Servers and Common Security Threats
  • Apache Vulnerability
  • Attack against IIS Console
  • Hacking Tools
  • Countermeasures
  • Increasing Web Server Security
    Module 12: Web Application Vulnerabilities
  • Web Application Hacking
  • Anatomy of an Attack
  • Web Application Threats
  • Carnivore
  • Google Hacking
  • Countermeasures
    Module 13: Web Based Password Cracking Techniques
  • Authentication- Definition
  • Authentication Mechanisms
  • Password Guessing
  • Query String
  • Cookies
  • Password Crackers Available
  • Hacking Tools
  • Countermeasures
    Module 14: SQL Injection
  • Attacking SQL Servers
  • SQL Server Resolution Service (SSRS)
  • Osql-L Probing
  • Port Scanning
  • SQL Server Talks
  • Preventive Measures
    Module 15: Hacking Wireless Networks
  • Wireless Basics
  • Components of Wireless Network
  • Access Point Positioning
  • Rogue Access Points
  • Tools to Generate Rogue Access Points
  • Scanning Tools
  • Sniffing Tools
  • Securing Wireless Networks
    Module 16: Worms and Viruses
  • Virus Characteristics
  • Symptoms of \'virus-like\' attack
  • Indications of a Virus Attack
  • Virus / Worms found in the wild
  • Virus writing tools
  • Virus Checkers
  • Virus Analyzers
    Module 17: Physical Security
  • Understanding Physical Security
  • Factors Affecting Physical Security
  • Wiretapping
  • Lock Picking Techniques
  • Spying Technologies
    Module 18: Linux Hacking
  • Linux Basics
  • Linux Vulnerabilities
  • Scanning Networks
  • Scanning Tools
  • Linux Security Tools
  • Advanced Intrusion Detection System
  • Linux Security Auditing Tool
  • Linux Security Countermeasures
    Module 19: Evading Firewalls, IDS and Honeypots
  • Intrusion Detection Systems
  • Ways to Detect Intrusion
  • Types of Intrusion Detection System
  • Intrusion Detection Tools
  • Honeypot Project
  • Tools to Detect Honeypot
    Module 20: Buffer Overflows
  • Buffer Overflows
  • How a Buffer Overflow Occurs
  • Shellcode
  • NOPS
  • Countermeasures
    Module 21: Cryptography
  • Public-key Cryptography
  • Working of Encryption
  • Digital Signature
  • Digital Certificate
  • RSA (Rivest Shamir Adleman)
  • RSA Attacks
    Module 22: Penetration Testing
  • Penetration Test vs. Vulnerability Test
  • Reliance on Checklists and Templates
  • Phases of Penetration Testing
  • Risk Analysis
  • Types of Penetration Testing
  • Types of Ethical Hacking
  • SANS Institute Top 20 Security Vulnerabilities
  • Penetration Testing Deliverable Templates
  • Active Reconnaissance
    OBJECTIVE:
  • Developing the hacker\'s mind
  • Network surveying
  • Port scanning
  • System identification/OS fingerprinting
  • Vulnerability research and verification
  • Service identification
  • Internet application testing
  • Document grinding
  • Recognizing security issues within an organization
  • Performing legal assessments on remote/foreign networks
  • Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor
  • Implementing the right tools for each task of the Methodology
  • Competitive Intelligence
  • Exploiting vulnerabilities remotely
  • Examining appropriate countermeasures to thwart malicious hacking
PREREQUISITES:

A Certified Ethical Hacker candidate should have at least two years of information technology security experience, a strong working knowledge of TCP/IP, and a basic familiarity with Linux.

BENEFITS:

This class will immerse the student into an interactive environment where they will be shown how to scan, test, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about intrusion detection, policy creation, social engineering, open source intelligence, incident handling, and log interpretation.

AUDIENCE:

The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

MATERIALS AVAILABLE: Yes
DURATION: 3 days