Course Code:
ceh
Duration:
35 hours
Prerequisites:
- Basics of Networks TCP/IP
- Basics of operating Systems
Overview:
Audience:
- security officers,
- auditors,
- security professionals,
- site administrators,
- anyone who is involved in the integrity of their network infrastructure
What you will learn:
- Key issues plaguing the information security world, incident management process, and penetration testing
- Various types of footprinting, footprinting tools, and countermeasures
- Enumeration techniques and enumeration countermeasures
- Network scanning techniques and scanning countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware, analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
- Social Engineering techniques, identity theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Different types of webserver attacks, attack methodology, and countermeasures
- Different types of web application attacks, web application hacking methodology, and countermeasures
- SQL injection attacks and injection detection tools
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
- Mobile platform attack vector, android vulnerabilities, jailbreaking
- iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
- Various cloud computing concepts, threats, attacks, and security techniques and tools
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
Exam Details:
If you intend to go through certifiaction then you will need to arrange this exam using a suitable testing facility (eg Pearson Vue).
- Duration - 4 hours
- Questions - 125
- Further informationcan be found here: https://cert.eccouncil.org/faq.html
Course Outline:
- Module 1 : Introduction to Ethical Hacking
- Module 2: Footprinting and Reconnaissance
- Module 3 : Scanning Networks
- Module 4: Enumeration
- Module 5: System Hacking
- Module 6: Malware Threats
- Module 7: Sniffing
- Module 8: Social Engineering
- Module 9: Denial-of-Service
- Module 10: Session Hijacking
- Module 11: Hacking Webservers
- Module 12: Hacking Web Applications
- Module 13: SQL Injection
- Module 14: Hacking Wireless Networks
- Module 15: Hacking Mobile Platforms
- Module 16: Evading IDS, Firewalls, and Honeypots
- Module 17: Cloud Computing
- Module 18: Cryptography