Certified Ethical Hacking Training Course

Certified Ethical Hacker (CEH)

Course Title: EC Council – Ethical Hacking and Countermeasures.
Duration:

5 Days
Contact Us for price

The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)

Feedback from our EC-Council – Ethical Hacker course’s students:

“The Certified Ethical Hacker course took me through aspects of hands-on-hacking in a combination with CEH theory in the most understandable way. Excellent instructor. ” David , Certified Ethical Hacking training January 2013

“After attending the Certified Ethical Hacking course I have to say I really feel more overall confident with Hacking tools. The CEH course was definitely worth the trip to London.” Said, CEH course February 2013

“My best recommendations for your CEH course. The Instructor of the CEH course is excellent.” Lanka, CEH April 2009“Great instructor led course, insightful and enjoyable.” Phillip, CEH course September 2012

“I have to mention that this was a first time when I have attended a Certified Ethical Hacker  course and I have left feeling I understood it. I have enjoyed the CEH course and I’m happy to recommend it to everyone ” Jude, CEH training March 2013

“Well prepared Certified Ethical Hacking course, only 10 people in a group, the CEH instructor is knowledgeable and answers in an  easy to understand way” Vladimir, CEH course April 2013

“ This CEH training has good practical methods and that is important to someone who have to go back and actually perform penetration testing” Fred, Certified Ethical Hacker Course May 2012

“The Certified Ethical Hacking training was good , organised and well prepared, you can feel that it is a well build programme” Patrick, Certified Ethical Hacking course April 2013

“I will recommend this CEH course to everyone who needs a ethical hacking course or knowledge.” Andrew, Certified Ethical Hacker training June 2013


CEH Description:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

 

CEH Objectives:

To prepare the student to sit the examination Ethical Hacking and Countermeasures. On successful completion of this examination you will be awarded the Certified Ethical Hacker certification awarded by the EC-Council (The International Council of Electronic Commerce Consultants).

 

CEH Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


Course Outline Version 8:

CEH v 8 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students at the beginning of the class.

Course Synopsis:

  • 1. Internet Crime Current Report: IC3
  • 2. Data Breach Investigations Report
  • 3. Types of Data Stolen From the Organizations
  • 4. Essential Terminologies
  • 5. Elements of Information Security
  • 6. Authenticity and Non-Repudiation
  • 7. The Security, Functionality, and Usability Triangle
  • 8. Security Challenges
  • 9. Effects of Hacking
  • 10. Who is a Hacker?
  • 11. Hacker Classes
  • 12. Hacktivism
  • 13. What Does a Hacker Do?
  • 14. Phase 1 – Reconnaissance
  • 15. Phase 2 – Scanning
  • 16. Phase 3 – Gaining Access
  • 17. Phase 4 – Maintaining Access
  • 18. Phase 5 – Covering Tracks
  • 19. Types of Attacks on a System
  • 20. Why Ethical Hacking is Necessary?
  • 21. Defence in Depth
  • 22. Scope and Limitations of Ethical Hacking
  • 23. What Do Ethical Hackers Do?
  • 24. Skills of an Ethical Hacker
  • 25. Vulnerability Research
  • 26. Vulnerability Research Websites
  • 27. What is Penetration Testing?
  • 28. Why Penetration Testing?
  • 29. Penetration Testing Methodology

Our Pass rate to date is 98% – CEH Course

Who Should Attend Certified Ethical Hacker | CEH Course?


This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.

Certified Ethical Hacking (CEH) certification

CEH course involves creativity and thinking ‘outside-of-the-box’, that is why vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of ‘defence in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

Certified Ethical Hacking (CEH) graphic pathThe goal of the Certified Ethical Hacking Course is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Delegates should be prepared for action paced course and the sheer size of the CEH training content, however do not be intimidated as we will release e-learning prior to the delegate attending the course and also the instructor will prepare them thoroughly for the Certification Examination, the maunuals can then be taken home and to work and can be used as excellent reference volumes.

Certified Ethical Hacking (CEH) pathStudents of the Certified Ethical Hacker course will be encouraged to experiment and explore in our State-of-the-art Labs knowing that they will not compromise their Organisations network.

Ec-Coucil -Certified Ethical Hacker Course Modules

 Certified Ethical Hacker (CEH) CEH Module 1: Introduction to Ethical Hacking Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 2: Footprinting
Why Security?
The Security, functionality and ease of use Triangle
Can Hacking be Ethical?
Defining Footprinting
 Certified Ethical Hacker (CEH) CEH Module 3: Scanning Certified Ethical Hacker (CEH) CEH Module 4: Enumeration
Definition of Scanning.
Types of scanning
What is Enumeration?
NetBios Null Sessions
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 5: System Hacking Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 6: Trojans and Backdoors
Administrator Password Guessing
Manual Password Cracking Algorithm
Automated Password Cracking
Effect on Business
What is a Trojan?
 Certified Ethical Hacker (CEH) CEH Module 7: Sniffers Certified Ethical Hacker (CEH) CEH Module 8: Denial of Service
Definition of sniffing
How a Sniffer works?
What is Denial of Service?
Goal of DoS(Denial of Service)
 Certified Ethical Hacker (CEH) CEH Module 9: Social Engineering Certified Ethical Hacker (CEH) CEH Module 10: Session Hijacking
What is Social Engineering?
Art of Manipulation
Understanding Session Hijacking
Spoofing vs Hijacking
How Web Servers Work?
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 11: Hacking Web Servers Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 12: Web Application Vulnerabilities
How are Web Servers Compromised?Web Application Set-up
Web Application Hacking
 Certified Ethical Hacker (CEH) CEH Module 13: Web Based Password Cracking Techniques Certified Ethical Hacker (CEH) CEH Module 14: SQL Injection
Authentication- Definition
Authentication Mechanisms
HTTP Authentication
Attacking SQL Servers
SQL Server Resolution Service (SSRS)
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 15: Hacking Wireless Networks Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 16: Virus
Introduction to Wireless Networking
Business and Wireless Attacks
Virus Characteristics
Symptoms of ‘virus-like’ attack
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 17: Physical Security Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 18: Linux Hacking
Security statistics
Physical Security breach incidents
Why Linux?
Linux basics
 Certified Ethical Hacker (CEH) CEH Module 19: Evading Firewalls, IDS and Honeypots Certified Ethical Hacker (CEH) CEH Module 20: Buffer Overflows
Intrusion Detection Systems
Ways to Detect Intrusion
Significance of Buffer Overflow Vulnerability
Why are Programs/Applications Vulnerable?
 Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 21: Cryptography Certified Ethical Hacker (CEH) Certified Ethical Hacker Module 22: Penetration Testing Course
Public-key Cryptography
Working of Encryption
Introduction to Penetration Testing (PT)
 Certified Ethical Hacker (CEH) CEH Module 23: Advanced Exploit Writing Certified Ethical Hacker (CEH) Module 24: Advanced Covert Hacking Techniques
Certified Ethical Hacker Module 25: Advanced Virus Writing TechniquesModule 26: Advanced Reverse Engineering Techniques