As a Certified Ethical Hacker (CEH) you will learn how to secure your systems by understanding how to scan, test, hack and secure systems in an interactive environment. Learn how intruders escalate privileges and what steps can be taken to secure systems from attacks.
As a Certified Ethical Hacker (CEH) you will learn how to secure your systems by understanding how to scan, test, hack and secure systems in an interactive environment. Learn how intruders escalate privileges and what steps can be taken to secure systems from attacks.
Prerequisite(s):
Familiarity with security concepts such as authentication, authorization, encryption, and network attacks. Strong understanding of TCP/IP, IP Routing, LAN switching. Minimum 12 mo experience in networking or CCNA certification recommended
Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Outline:
Lesson 1: Introduction to Ethical Hacking
Problem Definition. Why Security?
The Security, functionality and ease of use Triangle
Certified Ethical Hacker (CEH)
Dates are listed in Pacific Time Zone
$3,495.00
As a Certified Ethical Hacker (CEH) you will learn how to secure your systems by understanding how to scan, test, hack and secure systems in an interactive environment. Learn how intruders escalate privileges and what steps can be taken to secure systems from attacks.
Description
Overview:
As a Certified Ethical Hacker (CEH) you will learn how to secure your systems by understanding how to scan, test, hack and secure systems in an interactive environment. Learn how intruders escalate privileges and what steps can be taken to secure systems from attacks.
Prerequisite(s):
Familiarity with security concepts such as authentication, authorization, encryption, and network attacks. Strong understanding of TCP/IP, IP Routing, LAN switching. Minimum 12 mo experience in networking or CCNA certification recommended
Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Outline:
Lesson 1: Introduction to Ethical Hacking
Lesson 2: Footprinting
Lesson 3: Scanning
Lesson 4: Enumeration
Lesson 5: System Hacking
Lesson 6: Trojans and Backdoors
Lesson 7: Sniffers
Lesson 8: Denial of Service
Lesson 9: Social Engineering
Lesson 10: Session Hijacking
Lesson 11: Hacking Web Servers
Lesson 12: Web Application Vulnerabilities
Lesson 13: Web Based Password Cracking Techniques
Lesson 14: SQL Injection
Lesson 15: Hacking Wireless Networks
Lesson 16: Virus and Worms
Lesson 17: Physical Security
Lesson 18: Linux Hacking
Lesson 19: Evading Firewalls, IDS and Honeypots
Lesson 20: Buffer Overflows
Lesson 21: Cryptography
Lesson 22: Penetration Testing – Part 1
Lesson 23: Penetration Testing – Part 2
Additional information
5 days
No