A
Certified Ethical Hacker is a skilled professional who understands and knows
how to look for weaknesses and vulnerabilities in target systems and uses the
same knowledge and tools as a malicious hacker, but in a lawful and legitimate
manner to assess the security posture of a target system(s). The CEH credential
certifies individuals in the specific network security discipline of Ethical
Hacking from a vendor-neutral perspective.
The
Certified Ethical Hacker program is the most desired information security
training program any information security professional will ever want to be in.
To master the hacking technologies, you will need to become one, but an ethical
one! The accredited course provides the advanced hacking tools and techniques
used by hackers and information security professionals alike to break into an
organization. As we put it, “To beat a hacker, you need to think like a
hacker”.
This course will immerse you into the Hacker Mindset so that
you will be able to defend against future attacks. The security mindset in any
organization must not be limited to the silos of a certain vendor, technologies
or pieces of equipment.
This ethical hacking course puts you
in the driver’s seat of a hands-on environment with a systematic process. Here,
you will be exposed to an entirely different way of achieving optimal
information security posture in their organization; by hacking it! You will
scan, test, hack and secure your own systems. You will be taught the five
phases of ethical hacking and the ways to approach your target and succeed at
breaking in every time! The five phases include Reconnaissance, Gaining Access,
Enumeration, Maintaining Access, and covering your tracks.
Course
Outline:
- Introduction to Ethical Hacking
- Foot printing and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Cryptography
- Penetration Testing
Who Is It For?
The Certified Ethical Hacking training course will significantly
benefit security officers, auditors, security professionals, site
administrators, and anyone who is concerned about the integrity of the network
infrastructure.
Prerequisite:
There is no prerequisite for the Ethical Hacking Course. Whether you are
a student with or without computer science background or working professionally
in the security domain, Ethical Hacking Course lays the foundation of
hackingconcepts which enable you to move ahead both in the field of your
research or profession. It is recommended to have good knowledge in Operating
systems and Networking and Strong knowledge of TCP / IP