Course Code: 5677

EC-Council - CEH - Certified Ethical Hacker v10

Class Dates:
1/28/2019
12/17/2018
3/4/2019
Length:
5 Days
Cost:
$2995.00
Class Time:
Technology:
EC-Council, Security
Delivery:
Virtual Instructor-Led Training, Instructor-Led Training

Overview

  • Course Overview
  • The Certified Ethical Hacker (CEH v10) 5 day course will provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a "Hacker Mindset" in order to teach you how to think like a hacker and better defend against future attacks. It put you in the driver's seat with a hands-on training environment employing a systematic ethical hacking process.

    You will learn how to scan, test, hack and secure target systems.

    The course covers the Five Phases of Ethical hacking, diving into Reconnaissance. Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

  • Audience
  • Ethical hackers, System Administrators, Network Administrators and Engineering, Webmanagers, Auditors, Security Professionals in general.


    Attaining Industry Trusted and Preferred Credentials CEH and CEH (Practical)

    CEH (ANSI) Exam Title: Certified Ethical Hacker (ANSI), Exam Code; 312-50 (ECC Exam), 312-50 (VUE), Number of Questions: 125, Duration 4 hours, Availability: ECCExam/VUE, Test Format: Multiple Choice.

    Exam Title: Certified Ethical Hacker (Practical) Number of Practical Challenges: 20, Duration 6 hours, Availability: Aspen-iLabs, Test Format: iLabs cyber range, Passing Score: 70%

Prerequisites

  • One year of experience managing Windows/Unix/Linux systems or equivalent knowledge and skills.
    Good understanding of TCP/IP. Software

    Professionals with basic knowledge of networking services.

  • Recommended Courses:

Course Details

  • Top 10 Components of CEH v10
  • 100% Compliance to NICE 2.0 Framework
  • Vulnerability Analysis and IoT Hacking
  • Focus on Emerging Attack Vectors (e.g., Cloud, AL, ML, etc.)
  • Hacking Challenges at the End of Each Module
  • Coverage of latest Malware
  • Inclusion of complete Malware Analysis Process
  • Hands-on Program
  • Lab environment simulates a real-time environment
  • Covers latest hacking tools (Based on Windows, MAC, Linux and Mobile)
  • Course Overview
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • .
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
  • What will you learn?
  • Key issues plaguing the information security world, incident management process, and penetration testing.
  • Various types of footprinting, footprinting tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering technique, identify theft, and social engineering countermeasures.
  • Session hijacking techniques and countermeasures.
  • Different types of webserver attacks, web application hacking methodology, and countermeasures.
  • SQL injection attacks and injection detection tools.
  • .
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely.
  • Module 01: Introduction to Ethical Hacking
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security LawsandStandards
  • Module 02: Footprinting and Reconnaissance
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting, DNS, Networking Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Countermeasures
  • Footprinting Pen Testing
  • Module 03: Scanning Networks
  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing
  • Module 04: Enumeration
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing
  • Module 05: Vulnerability Analysis
  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • Module 06: System Hacking
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing
  • Module 07: Malware Threats
  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing
  • Module 08: Sniffing
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing
  • Module 09: Social Engineering
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing
  • Module 10: Denial-of-Service
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing
  • Module 11: Session Hijacking
  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Penetration Testing
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing
  • Module 13: Hacking WebServers
  • WebServer Concepts
  • WebServer Attacks
  • WebServer Attack Methodology
  • WebServer AttackTools
  • Countermeasures
  • Patch Management
  • WebServer Security Tools
  • WebServer Pen Testing
  • Module 14: Hacking Web Applications
  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing
  • Module 15: SQL Injection
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Module 16: Hacking Wireless Networks
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing
  • Module 17: Hacking Mobile Platforms
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Spyware
  • Mobile Device Management
  • Mobile Security Guidelinesand Tools
  • Mobile Pen Testing
  • Module 18: IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • IoT PenTesting
  • Module 19: Cloud Computing
  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing
  • Module 20: Cryptography
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • PublicKey Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis