Code: 
EC CEH
Duration: 
5 Day(s)
Price: 
1950-2827

Overview

  • Scanning system resources with advanced IP scanner
  • Creating a virus using the JPS Virus Maker tool
  • Detecting phishing with Netcraft and PhishTank
  • Implementing the Burp Suite to test web applications
  • Applying Intrusion Detection Systems (IDS)
  • Encrypting data to prevent unauthorized access

Your Choice

Customize your hands-on Learning Method with your choice of PC usage: Pair Up or Sole Use. Learn More

Audience

Security officers, auditors, security professionals, site administrators and anyone tasked with protecting the integrity of the network infrastructure.

Skills Gained

  • Apply countermeasures to secure your system against threats and attacks
  • Test access to your organizational data using ethical hacking techniques
  • Implement real-world hacking techniques to test the security of your systems
  • Employ complex tools to identify and analyze your company's risks and weaknesses
  • Uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures

Course Specifics

Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking
  • Reviewing the elements of information security
  • The security, functionality and usability triangle
Outlining the role of hackers
  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink-wrap code and misconfiguration
Functions of an ethical hacker
  • Conducting vulnerability research
  • Assessing the methodology of penetration testing

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance
  • Objectives and methods of footprinting
  • Searching for and collecting a company's information
  • Employing footprinting countermeasures
Scanning networks
  • Adopting multiple scanning techniques
  • Identifying IDS-evasion and IP-fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection
Examining enumeration techniques
  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking
  • CEH Hacking Methodology (CHM)
  • Cracking passwords and executing applications
  • Defending against password cracking, keyloggers, spyware and rootkits
Uncovering Trojans and backdoors
  • Detecting a Trojan attack
  • Scanning for suspicious entries, services, programs
Dissecting viruses, worms and sniffers
  • Recognizing key indicators of a virus attack
  • Writing a simple virus program
  • Analyzing worms and malware
Social engineering and Denial of Service (DoS)
  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks
  • Cross-Site Scripting (XSS) and web application DoS attacks
  • Encoding schemes to defend against SQL injection, command injection, web services and other attacks
Hijacking sessions and web servers
  • Spoofing vs. hijacking
  • Protecting against and preventing hijacking by implementing appropriate countermeasures
Evading IDS, firewalls and honeypots
  • Considering varying types of intrusion detection systems (IDS) and tools
  • Bypassing firewalls and blocked sites
Buffer overflow and cryptography
  • Exploiting semantic comments in annotations
  • Cryptography attacks and code breaking methodologies

Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

Upcoming Dates

a Location Cost Days Date  
London 2445519 Mar 18
London 1950519 Mar 18
London 2827512 Feb 18
London 2827512 Feb 18
London 2445522 Jan 18
London 1950522 Jan 18
London 2827511 Dec 17
London 2827511 Dec 17
Manchester 2827511 Dec 17
London 1950520 Nov 17
London 2445520 Nov 17
Glasgow 509 Oct 17
Cardiff 506 Oct 17
Oxford 529 Sep 17
London 2827525 Sep 17
London 2827525 Sep 17
London 1950518 Sep 17
London 2195518 Sep 17
London 2445518 Sep 17
London 515 Sep 17
Leeds 511 Sep 17
Reading 511 Sep 17
Manchester 2827504 Sep 17
Manchester 2827521 Aug 17
Glasgow 2827514 Aug 17
Liverpool 514 Aug 17
Exeter 507 Aug 17
Belfast 502 Aug 17
London 2195517 Jul 17
London 2445517 Jul 17
London 1950510 Jul 17
London 2827503 Jul 17
London 2827503 Jul 17