EC-Council - CEH - Certified Ethical Hacker v10
8/17/2020 - 8/21/202011/16/2020 - 11/20/2020COURSE LENGTH:
9:00am - 5:00pm
The Certified Ethical Hacker (CEH v10) 5 day course will provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a "Hacker Mindset" in order to teach you how to think like a hacker and better defend against future attacks. It put you in the driver's seat with a hands-on training environment employing a systematic ethical hacking process.
AUDIENCE AND PREREQUISITES
You will learn how to scan, test, hack and secure target systems.
The course covers the Five Phases of Ethical hacking, diving into Reconnaissance. Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Ethical hackers, System Administrators, Network Administrators and Engineering, Webmanagers, Auditors, Security Professionals in general.
Attaining Industry Trusted and Preferred Credentials CEH and CEH (Practical)
CEH (ANSI) Exam Title: Certified Ethical Hacker (ANSI), Exam Code; 312-50 (ECC Exam), 312-50 (VUE), Number of Questions: 125, Duration 4 hours, Availability: ECCExam/VUE, Test Format: Multiple Choice.
Exam Title: Certified Ethical Hacker (Practical) Number of Practical Challenges: 20, Duration 6 hours, Availability: Aspen-iLabs, Test Format: iLabs cyber range, Passing Score: 70%
One year of experience managing Windows/Unix/Linux systems or equivalent knowledge and skills.
Good understanding of TCP/IP. Software
Professionals with basic knowledge of networking services.
*Course Cost listed includes the cost of Courseware, Exam/ECC, and iLabs. Please refer to your Quote/ Invoice for the additional costs. If you have any questions, please contact us (email@example.com or 207-775-0244). This course is subject to a minimum enrollment to run. This course may run as a Live Online if the minimum enrollment is not met. Optional: available Self-Paced.
Top 10 Components of CEH v10 100% Compliance to NICE 2.0 Framework Vulnerability Analysis and IoT Hacking Focus on Emerging Attack Vectors (e.g., Cloud, AL, ML, etc.) Hacking Challenges at the End of Each Module Coverage of latest Malware Inclusion of complete Malware Analysis Process Hands-on Program Lab environment simulates a real-time environment Covers latest hacking tools (Based on Windows, MAC, Linux and Mobile)Course Overview Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration Vulnerability Analysis Malware Threats Sniffing Social Engineering Denial-of-Service Session Hijacking Evading IDS, Firewalls, and Honeypots Hacking Web Servers. Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Mobile Platforms IoT Hacking Cloud Computing CryptographyWhat will you learn? Key issues plaguing the information security world, incident management process, and penetration testing. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures. Enumeration techniques and enumeration countermeasures. System hacking methodology, steganography, steganalysis attacks, and covering tracks. Different types of Trojans, Trojan analysis, and Trojan countermeasures. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures. Packet sniffing techniques and how to defend against sniffing. Social Engineering technique, identify theft, and social engineering countermeasures. Session hijacking techniques and countermeasures. Different types of webserver attacks, web application hacking methodology, and countermeasures. SQL injection attacks and injection detection tools.. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures. Various cloud computing concepts, threats, attacks, and security techniques and tools. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems. Different threats to IoT platforms and learn how to defend IoT devices securely.Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Ethical Hacking Concepts Information Security Controls Penetration Testing Concepts Information Security LawsandStandardsModule 02: Footprinting and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Competitive Intelligence Whois Footprinting, DNS, Networking Footprinting Footprinting through Social Engineering Footprinting Tools Countermeasures Footprinting Pen TestingModule 03: Scanning Networks Network Scanning Concepts Scanning Tools Scanning Techniques Scanning Beyond IDS and Firewall Banner Grabbing Draw Network Diagrams Scanning Pen TestingModule 04: Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures Enumeration Pen TestingModule 05: Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Assessment Solutions Vulnerability Scoring Systems Vulnerability Assessment Tools Vulnerability Assessment ReportsModule 06: System Hacking System Hacking Concepts Cracking Passwords Escalating Privileges Executing Applications Hiding Files Covering Tracks Penetration TestingModule 07: Malware Threats Malware Concepts Trojan Concepts Virus and Worm Concepts Malware Analysis Countermeasures Anti-Malware Software Malware Penetration TestingModule 08: Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques Sniffing Pen TestingModule 09: Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures Social Engineering Pen TestingModule 10: Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools DoS/DDoS Penetration TestingModule 11: Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures Penetration TestingModule 12: Evading IDS, Firewalls, and Honeypots IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures Penetration TestingModule 13: Hacking WebServers WebServer Concepts WebServer Attacks WebServer Attack Methodology WebServer AttackTools Countermeasures Patch Management WebServer Security Tools WebServer Pen TestingModule 14: Hacking Web Applications Web App Concepts Web App Threats Hacking Methodology Web App Hacking Tools Countermeasures Web App Security Testing Tools Web App Pen TestingModule 15: SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion TechniquesModule 16: Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools Wireless Pen TestingModule 17: Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Spyware Mobile Device Management Mobile Security Guidelinesand Tools Mobile Pen TestingModule 18: IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures IoT PenTestingModule 19: Cloud Computing Cloud Computing Concepts Cloud Computing Threats Cloud Computing Attacks Cloud Security Cloud Security Tools Cloud Penetration TestingModule 20: Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools PublicKey Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis