Certified Ethical Hacker (CEH)
Course Overview
EC-Council’s Certified Ethical Hacker training certifies a security professional as an Ethical Hacker and Penetration Tester. CEH training fortifies the abilities to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking.
A CEH certification becomes imperative with the increasing security threats to computer networks and web servers and there is a great need to make networks “hacker-proof”. The best way to do this is by understanding the methods employed by hackers to intrude into systems. A Certified Ethical Hacker starts thinking in a way an “illegal hacker” does but uses the EC-Council’s ethical hacking certification and tools to legally penetrate and test networks and computer systems.
This ethical hacking training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab’s intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then will be led into scanning and attacking their own networks (no real network is harmed). During this ethical hacking course, students learn how intruders escalate privileges and what steps can be taken to secure a system.
CEH Version 9 is the most recent and progressive course covering 270 attack technologies within 18 extensive modules- an ethical hacker should be aware of. This ethical hacking certification helps in mastering the methodology to be used in ethical hacking scenarios or penetration testing. The course also helps cracking the EC-Council Certified Ethical Hacker certification exam 312-50.
Course Details
– Introduction to Ethical Hacking
– Footprinting and Reconnaissance
– Scanning Networks
– Enumeration
– System Hacking
– Sniffing
– MalwareThreats
– SocialEngineering
– Denial of Service
– Session Hijacking
– Hacking Web Applications
– SQL Injection
– Hacking Wireless Networks
– Hacking Web servers
– Hacking Mobile Platforms
– Evading IDS,Firewalls, and Honeypot
– Cloud Computing
– Cryptography
Prerequisites
Basic knowledge of Networking
Basic Knowledge of server and network components.