Ethical Hacker – CEH V9

Learn via : Virtual Classroom / Online
Duration : 5 Days
  1. Home
  2. /
  3. Ethical Hacker – CEH V9

Description

    A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

    The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You will walk out the door with ethical hacking skills that are in high demand, as well as prepare you for the internationally recognized Certified Ethical Hacker certification!

    This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

     

    What You Will learn

    • Footprinting
    • Network scanning
    • Enumeration
    • Packet sniffing
    • Social Engineering
    • DoS/DDoS
    • Session hijacking
    • Webserver and web application attacks and countermeasures
    • SQL injection attacks
    • Wireless encryption
    • Cloud computing threats
    • Cryptography ciphers
    • Penetration testing

     

    Who Should Attend

    •Security officers

    •Auditors

    •Security professionals

    •Site administrators

    •Penetration testers

    •Individuals concerned about the integrity of the network infrastructure


Outline

Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Cryptography

Prerequisites

A strong working knowledge of TCP/IP