Certified Ethical Hacker (CEH) Training from ICC Teleservices
Duration 40(Hrs)
Buy Now
COURSE OUTLINE
1 - INTRODUCTION TO ETHICAL HACKING
- Overview of Current Security Trends
- Understanding Elements of Information Security
- Understanding Information Security Threats and Attack Vectors
- Overview of hacking concepts, types, and phases
- Understanding ethical hacking concepts and scope
- Overview of information security management and defense-in-depth
- Overview of policies, procedures, and awareness
- Overview of physical security and controls
- Understanding incidence management process
- Overview of vulnerability assessment and penetration testing
- Overview of information security acts and laws
2 - FOOTPRINTING AND RECONNAISSANCE
- Understanding footprinting concepts
- Footprinting through search engines
- Footprint using advance google hacking techniques
- Footprint through social networking sites
- Understanding different techniques for website footprinting
- Understanding different techniques for email footprinting
- Understanding different techniques of competitive intelligence
- Understanding different techniques for WHO IS footprinting
- Understanding different techniques for network footprinting
- Understanding different techniques of footprinting through social engineering
- Footprinting tools
- Footprinting countermeasures
- Overview of footprinting Pen Testing
3 - SCANNING NETWORKS
- Overview of networking scanning
- Understanding different techniques to check for Live Systems
- Understanding different techniques to check for Open Ports
- Understanding various scanning techniques
- Understanding various IDS Evasion Techniques
- Understanding banner grabbing
- Overview of Vulnerability scanning
- Drawing network diagrams
- Using Proxies and Anonymizer for attack
- Understanding IP Spoofing and various detection techniques
- Overview of scanning and Pen Testing
4 - ENUMERATION
- Understanding Enumeration Concepts
- Understanding different techniques for NetBIOS Enumeration
- Understanding different techniques for SNMP enumeration
- Understanding different techniques for LDAP enumeration
- Understanding different techniques for NTP enumeration
- Understanding different techniques for SMTP and DNS enumeration countermeasures
- Overview of enumeration pen testing
5 - VULNERABILITY ANALYSIS
- Vulnerability of the management life cycle
- Understanding various approaches to vulnerability analysis
- Tools used to perform the vulnerability assessments
- Vulnerability analysis tools and techniques
6 - SYSTEM HACKING
- Overview of CEH Hacking Methodology
- Understanding different techniques to gain access to the system
- Understanding privilege escalation techniques
- Understanding different techniques to create and maintain remote access to the system
- Overview of different types of Rootkits
- Overview of Steganograpy and Steganalysis
- Understanding techniques to hide the evidence of compromise
- Overview of system hacking penetration testing
7 - MALWARE THREATS
- Introduction to malware and malware propagation techniques
- Overview of Trojans, their types, and how to infect systems
- Overview of viruses, their types, and how they infect files
- Introduction to computer worm
- Understanding the Malware Analysis Process
- Understanding different techniques to detect malware
- Malware countermeasures
- Overview of Malware penetration testing
8 - SNIFFING
- Overview of sniffing concepts
- Understanding MAC attacks
- Understanding DHCP attacks
- Understanding ARP Poisoning
- Understanding MAC Spoofing attacks
- Understanding DNS poisoning
- Sniffing tools
- Sniffing countermeasures
- Understanding various techniques to detect sniffing
- Overview of sniffing Pen Testing
9 - SOCIAL ENGINEERING
- Overview of social engineering
- Understanding various social engineering techniques
- Understanding insider threats
- Understanding impersonation on social networking sites
- Understanding identity theft
- Social engineering countermeasures
- Identify theft countermeasures
- Overview of Social Engineering Pen Testing
10 - DENIAL-OF-SERVICE
- Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- Overview different DoS/DDoS) attack techniques
- Understanding the botnet network
- Understanding various DoS and DDoS Attack Tools
- DoS/DDoS Countermeasures
- Overview of DoS Attack Penetration Testing
11 - SESSION HIJACKING
- Understanding session hijacking concepts
- Understanding application level session hijacking
- Understanding network level session hijacking
- Session hijacking tools
- Session hijacking countermeasures
- Overview of session hijacking penetration testing
12 - EVADING IDS, FIREWALLS, AND HONEYPOTS
- Understanding IDS, Firewall, and honeypot concepts
- IDS, Firewall and honeypot solutions
- Understanding different techniques to bypass IDS
- Understanding different techniques to bypass firewalls
- IDS/Firewall evading tools
- Understanding different techniques to detect honeypots
- IDS/Firewall evasion countermeasures
- Overview of IDS and firewall Penetration Testing
13 - HACKING WEB SERVERS
- Understanding webserver concepts
- Understanding webserver attacks
- Understanding webserver attack methodology
- Webserver attack tools
- Countermeasures against webserver attacks
- Overview of Patch Management
- Webserver security tools
- Overview of Webserver penetration testing
14 - HACKING WEB APPLICATIONS
- Understanding web application concepts
- Understanding web application threats
- Understanding web application hacking methodology
- Web application hacking tools
- Understanding web application countermeasures
- Web application security tools
- Overview of web application penetration testing
15 - SQL INJECTION
- Understanding SQL injection concepts
- Understanding various types of SQL injection attacks
- Understanding SQL injection methodology
- SQL injection tools
- Understanding different IDS evasion techniques
- SQL injection countermeasures
- SQL injection detection tools
16 - HACKING WIRELESS NETWORKS
- Understanding wireless concepts
- Understanding wireless encryption algorithms
- Understanding wireless threats
- Understanding wireless hacking methodology
- Wireless hacking tools
- Understanding Bluetooth hacking techniques
- Understanding wireless hacking countermeasures
- Wireless security tools
- Overview of wireless penetration testing
17 - HACKING MOBILE PLATFORMS
- Understanding mobile attack platform vectors
- Understanding various android threat and attacks
- Understanding various iOS threats and attacks
- Understanding various Windows Phone OS threats and attacks
- Understanding various blackberry threats and attacks
- Understanding mobile device management (MDM)
- Mobile Security Guidelines and security tools
- Overview of Mobile Penetration Testing
18 - IOT HACKING
- Understanding IoT concepts
- Cryptography tools
- Understanding various IoT threats and attacks
- Understanding IoT Hacking
- Understanding IoT attacks
- IoT security Tools
19 - CLOUD COMPUTING
- Understanding Cloud Computing Concepts
- Understanding Cloud Computing Threats
- Understanding Cloud Computing Attacks
- Understanding Cloud Computing Security
- Cloud computing Security tools
- Overview of Cloud Penetration testing
20 - CRYPTOGRAPHY
- Understanding Cryptography concepts
- Overview of encryption algorithms
- Cryptography tools
- Understanding Public Key Infrastructure (PKI)
- Understanding email encryption
- Understanding disk encryption
- Understanding Cryptography attacks
- Cryptanalysis Tools