Course Details
Course Outline
1 - Introduction to Ethical Hacking
Overview of Current Security TrendsUnderstanding Elements of Information SecurityUnderstanding Information Security Threats and Attack VectorsOverview of hacking concepts, types, and phasesUnderstanding ethical hacking concepts and scopeOverview of information security management and defense-in-depthOverview of policies, procedures, and awarenessOverview of physical security and controlsUnderstanding incidence management processOverview of vulnerability assessment and penetration testingOverview of information security acts and laws
2 - Footprinting and Reconnaissance
Understanding footprinting conceptsFootprinting through search enginesFootprint using advance google hacking techniquesFootprint through social networking sitesUnderstanding different techniques for website footprintingUnderstanding different techniques for email footprintingUnderstanding different techniques of competitive intelligenceUnderstanding different techniques for WHO IS footprintingUnderstanding different techniques for network footprintingUnderstanding different techniques of footprinting through social engineeringFootprinting toolsFootprinting countermeasuresOverview of footprinting Pen Testing
3 - Scanning Networks
Overview of networking scanning Understanding different techniques to check for Live SystemsUnderstanding different techniques to check for Open PortsUnderstanding various scanning techniquesUnderstanding various IDS Evasion TechniquesUnderstanding banner grabbingOverview of Vulnerability scanningDrawing network diagramsUsing Proxies and Anonymizer for attackUnderstanding IP Spoofing and various detection techniquesOverview of scanning and Pen Testing
4 - Enumeration
Understanding Enumeration ConceptsUnderstanding different techniques for NetBIOS EnumerationUnderstanding different techniques for SNMP enumerationUnderstanding different techniques for LDAP enumerationUnderstanding different techniques for NTP enumerationUnderstanding different techniques for SMTP and DNS enumeration countermeasuresOverview of enumeration pen testing
5 - Vulnerability Analysis
Vulnerability of the management life cycle Understanding various approaches to vulnerability analysis Tools used to perform the vulnerability assessmentsVulnerability analysis tools and techniques
6 - System Hacking
Overview of CEH Hacking MethodologyUnderstanding different techniques to gain access to the systemUnderstanding privilege escalation techniquesUnderstanding different techniques to create and maintain remote access to the systemOverview of different types of RootkitsOverview of Steganograpy and Steganalysis Understanding techniques to hide the evidence of compromiseOverview of system hacking penetration testing
7 - Malware Threats
Introduction to malware and malware propagation techniquesOverview of Trojans, their types, and how to infect systemsOverview of viruses, their types, and how they infect filesIntroduction to computer wormUnderstanding the Malware Analysis ProcessUnderstanding different techniques to detect malwareMalware countermeasuresOverview of Malware penetration testing
8 - Sniffing
Overview of sniffing conceptsUnderstanding MAC attacksUnderstanding DHCP attacksUnderstanding ARP PoisoningUnderstanding MAC Spoofing attacksUnderstanding DNS poisoningSniffing toolsSniffing countermeasuresUnderstanding various techniques to detect sniffingOverview of sniffing Pen Testing
9 - Social Engineering
Overview of social engineeringUnderstanding various social engineering techniquesUnderstanding insider threatsUnderstanding impersonation on social networking sitesUnderstanding identity theftSocial engineering countermeasuresIdentify theft countermeasuresOverview of Social Engineering Pen Testing
10 - Denial-of-Service
Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks Overview different DoS/DDoS) attack techniquesUnderstanding the botnet networkUnderstanding various DoS and DDoS Attack ToolsDoS/DDoS CountermeasuresOverview of DoS Attack Penetration Testing
11 - Session Hijacking
Understanding session hijacking conceptsUnderstanding application level session hijackingUnderstanding network level session hijacking Session hijacking toolsSession hijacking countermeasuresOverview of session hijacking penetration testing
12 - Evading IDS, Firewalls, and Honeypots
Understanding IDS, Firewall, and honeypot conceptsIDS, Firewall and honeypot solutionsUnderstanding different techniques to bypass IDSUnderstanding different techniques to bypass firewallsIDS/Firewall evading toolsUnderstanding different techniques to detect honeypotsIDS/Firewall evasion countermeasuresOverview of IDS and firewall Penetration Testing
13 - Hacking Web Servers
Understanding webserver conceptsUnderstanding webserver attacksUnderstanding webserver attack methodologyWebserver attack toolsCountermeasures against webserver attacksOverview of Patch ManagementWebserver security toolsOverview of Webserver penetration testing
14 - Hacking Web Applications
Understanding web application conceptsUnderstanding web application threatsUnderstanding web application hacking methodologyWeb application hacking toolsUnderstanding web application countermeasuresWeb application security toolsOverview of web application penetration testing
15 - SQL Injection
Understanding SQL injection conceptsUnderstanding various types of SQL injection attacksUnderstanding SQL injection methodologySQL injection toolsUnderstanding different IDS evasion techniquesSQL injection countermeasuresSQL injection detection tools
16 - Hacking Wireless Networks
Understanding wireless conceptsUnderstanding wireless encryption algorithmsUnderstanding wireless threatsUnderstanding wireless hacking methodologyWireless hacking toolsUnderstanding Bluetooth hacking techniquesUnderstanding wireless hacking countermeasuresWireless security toolsOverview of wireless penetration testing
17 - Hacking Mobile Platforms
Understanding mobile attack platform vectorsUnderstanding various android threat and attacksUnderstanding various iOS threats and attacksUnderstanding various Windows Phone OS threats and attacksUnderstanding various blackberry threats and attacksUnderstanding mobile device management (MDM)Mobile Security Guidelines and security toolsOverview of Mobile Penetration Testing
18 - IoT Hacking
Understanding IoT conceptsCryptography toolsUnderstanding various IoT threats and attacksUnderstanding IoT HackingUnderstanding IoT attacksIoT security Tools
19 - Cloud Computing
Understanding Cloud Computing ConceptsUnderstanding Cloud Computing ThreatsUnderstanding Cloud Computing AttacksUnderstanding Cloud Computing SecurityCloud computing Security toolsOverview of Cloud Penetration testing
20 - Cryptography
Understanding Cryptography conceptsOverview of encryption algorithmsCryptography toolsUnderstanding Public Key Infrastructure (PKI)Understanding email encryptionUnderstanding disk encryptionUnderstanding Cryptography attacksCryptanalysis Tools
Actual course outline may vary depending on offering center. Contact your sales representative for more information.