- Duration: 100 hours
Are you interested in network security and information technology—but perhaps want more of a challenge than typical IT provides? If so, ethical hacking certification is a unique way to set yourself apart from other IT professionals and add even more value to your organization. As a certified ethical hacker, you’ll use the same techniques as the bad guys to assess security and identify weaknesses, except you’ll use these hacking powers for good.
To put it one way, “To beat a hacker, you need to think like a hacker.” This course will immerse you into the hacker mindset, putting you in the driver’s seat of hands-on activities. You will scan, test, hack, and secure your own systems. You will learn the five phases of ethical hacking (reconnaissance, gaining access, enumeration, maintaining access, and covering your tracks) and the ways to approach your target and succeed at breaking in every time.
This accredited course provides you with advanced hacking tools and techniques so that you can assess the security posture of an organization with the same approach these malicious hackers use. You’ll be able to identify weaknesses and fix the problems before they are identified by the enemy, preventing what could potentially be catastrophic damage to your organization. This is sure to help you get ahead in your current and future positions.
Upon completion of this course, you will be prepared to sit for the Certified Ethical Hacker Exam 312-50, offered by EC-Council. This course also includes a voucher which covers the fee of the exam.
- Introduction to Ethical Hacking
- Key issues plaguing the information security world
- Incident Management Process
- Penetration Testing
- Footprinting and Reconnaissance
- Various types of footprinting
- Footprinting tools
- Scanning Networks
- Network scanning techniques
- Scanning countermeasures
- Enumeration techniques
- Enumeration countermeasures
- System Hacking
- System hacking methodology
- Attacks and covering tracks
- Malware Threats
- Different types of Trojans
- Trojan Analysis
- Trojan Countermeasures
- Working of Viruses
- Virus Analysis
- Computer Worms
- Malware Analysis Procedure
- Evading IDS, Firewalls and Honeypots
- IDS and Honeypot Evasion Techniques
- Evasion Tools
- Packet sniffing techniques
- How to defend against sniffing
- Social Engineering
- Social Engineering techniques
- Identify theft
- Social Engineering
- Denial of Service
- DoS/DDoS attack techniques
- DDoS attack tools
- DoS/DDoS Countermeasures
- Session Hijacking
- Session hijacking techniques
- Hacking Web Servers
- Different types of webserver attacks
- Attack methodology
- Hacking Web Applications
- Different types of web application attacks
- Web Application
- Hacking Methodology
- SQL Injection
- SQL injection attacks
- Injection detection tools
- Hacking Wireless Networks
- Wireless Encryption
- Wireless hacking methodology
- Wireless Hacking Tools
- Wi-Fi- Security Tools
- Hacking Mobile Platforms
- Mobile Platform Attack Vector
- Android Vulnerabilities
- iOS, windows phone 8 vulnerabilities
- Mobile Security Guidelines and Tools
- Cloud Computing
- Various Cloud Computing Concepts
- Threats, Attacks, and Security
- Techniques and Tools
- Different types of Cryptography Ciphers
- Public Key Infrastructure (PKI)
- Cryptography Attacks
- Cryptanalysis Tools
- This course can be taken on either a PC or Mac.
- PC: Windows 8 or later.
- Mac: OS X Yosemite 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Flash Player. Click here to download the Flash Player.
- Adobe Acrobat Reader. Click here to download the Acrobat Reader.
- Software must be installed and fully operational before the course begins.
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online.
There are no mandatory prerequisites prior to taking this certified ethical hacker training. However, you must have a very strong knowledge of network infrastructure, computer hardware, software, and security.
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.