CEH Training CEH Certification | CEH Courses

October 13, 2010

CEH Training | Ethical Hacker Training

Filed under: CEH Training,Ethical Hacker Training — admin @ 2:49 pm

CEH Training Title: EC Council – Ethical Hacker and Countermeasures.

This instructor-led training is  held in London, UK.

CEH Training Code: EHCM/112

CEH Training Course Duration: 5 Days

Ethical Hacker Training Fee: Contact us for current prices

The Certified Ethical Hacker (CEH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)

Feedbacks from our CEH Training students:

“The Certified Ethical Hacker training was excellent, will definitely recommend to everyone” Marmick , Certified Ethical Hacker September 2011.

“Everything was perfect, and the CEH instructor was knowledgeable” Nick, August 2011.
“Excellent service, would recommend friends to come. The CEH therapist was very friendly and professional” Colin, April 2011.

“Everything was excellent. The CEH instructor was just great – put you at ease straight away. The CEH instructor was very informative, understanding and supportive. “ Jodie, Certified Ethical Hacker May 2011.

“The Certified Ethical Hacker training was excellent” Jack, Certified Ethical Hacker March 2011.

“I really enjoyed this CEH training. My therapist had a very pleasant way with her and I really enjoyed the session” Adam, April 2011.

“I would like to say many thanks for the excellent Penetration testing & Ethical hacker training last week.” Patrick, CEH May 2011.
“The Certified Ethical Hacker training content and materials were excellent and I truly appreciated the obvious wealth of knowledge and experience that you clearly demonstrated during the week” Hussein, Certified Ethical Hacker April 2011

Hacker involves creativity and thinking ‘outside-of-the-box’, that is why vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of ‘defence in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

The goal of the Ethical Hacker & Countermeasures training is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Delegates should be prepared for action paced training and the sheer size of the course content, however do not be intimidated as we will release e-learning prior to the delegate attending the training and also the instructor will prepare them thoroughly for the Certification Examination, the maunuals can then be taken home and to work and can be used as excellent reference volumes.

Students will be encouraged to experiment and explore in our State-of-the-art Labs knowing that they will not compromise their Organisations network.

EC-Council – Certified Ethical Hacker (C|EH) Training Course – Overview

EC-Council Certified Ethical Hacker Certification: EC-Council has successfully certified more than a thousand information security professionals. CEH examination is becoming more demanding and more effective in measuring the true skills of a Penetration tester. Students are now required to be able to interpret identify exploits, log files, identify attack signatures, recommend countermeasures, have a firm grasp of the main tools and know standard procedures involved in penetration testing. The student is tested on 150 questions picked randomly from a pool of questions contributed by the security community. Our Pass rate to date is 98% Who Should Attend? This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.

Module 1: Introduction to Ethical Hacking
Why Security?
The Security, functionality and ease of use Triangle
Can Hacking be Ethical?

Module 2: Footprinting
Defining Footprinting

Module 3: Scanning
Definition of Scanning.
Types of scanning

Module 4: Enumeration
What is Enumeration?
NetBios Null Sessions

Module 5: System Hacking
Administrator Password Guessing
Manual Password Cracking Algorithm
Automated Password Cracking

Module 6: Trojans and Backdoors
Effect on Business
What is a Trojan?

Module 7: Sniffers
Definition of sniffing
How a Sniffer works?

Module 8: Denial of Service
What is Denial of Service?
Goal of DoS(Denial of Service)

Module 9: Social Engineering
What is Social Engineering?
Art of Manipulation

Module 10: Session Hijacking
Understanding Session Hijacking
Spoofing vs Hijacking
How Web Servers Work?

Module 11: Hacking Web Servers
How are Web Servers Compromised?

Module 12: Web Application Vulnerabilities
Web Application Set-up
Web Application Hacking

Module 13: Web Based Password Cracking Techniques
Authentication- Definition
Authentication Mechanisms
HTTP Authentication

Module 14: SQL Injection
Attacking SQL Servers
SQL Server Resolution Service (SSRS)

Module 15: Hacking Wireless Networks
Introduction to Wireless Networking
Business and Wireless Attacks

Module 16: Virus
Virus Characteristics
Symptoms of ‘virus-like’ attack

Module 17: Physical Security
Security statistics
Physical Security breach incidents

Module 18: Linux Hacking
Why Linux?
Linux basics

Module 19: Evading Firewalls, IDS and Honeypots
Intrusion Detection Systems
Ways to Detect Intrusion

Module 20: Buffer Overflows
Significance of Buffer Overflow Vulnerability
Why are Programs/Applications Vulnerable?

Module 21: Cryptography
Public-key Cryptography
Working of Encryption

Module 22: Penetration Testing Course
Introduction to Penetration Testing (PT)

Module 23: Advanced Exploit Writing
Module 24: Advanced Covert Hacking Techniques

Module 25: Advanced Virus Writing Techniques

Module 26: Advanced Reverse Engineering Techniques

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

Powered by WordPress