Vision for future                                         CEHCourse Description:This class will immerse the student into a...
Vision for futureModule 4: Enumeration   What is Enumeration?   NetBios Null SessionsModule 5: System Hacking   Adminis...
Vision for future   Spoofing vs Hijacking   How Web Servers Work?Module 11: Hacking Web Servers   How are Web Servers C...
Vision for futureModule 17: Physical Security   Security statistics   Physical Security breach incidentsModule 18: Linux...
Upcoming SlideShare
Loading in …5
×

Ceh

471 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
471
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ceh

  1. 1. Vision for future CEHCourse Description:This class will immerse the student into an interactive environment where they willbe shown how to scan, test, hack and secure their own systems. Students will beginby understanding how perimeter defenses work and then be lead into scanning andattacking their own networks, no real network is harmed. Students then learn howintruders escalate privileges and what steps can be taken to secure a system.Who Should Take This Course?This course will significantly benefit security officers, auditors, securityprofessionals, site administrators, and anyone who is concerned about the integrityof the network infrastructure.CurriculumModule 1: Introduction to Ethical Hacking  Why Security?  The Security, functionality and ease of use Triangle  Can Hacking be Ethical?Module 2: Foot printing  Defining Foot printingModule 3: Scanning  Definition of Scanning.  Types of scanning Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  2. 2. Vision for futureModule 4: Enumeration  What is Enumeration?  NetBios Null SessionsModule 5: System Hacking  Administrator Password Guessing  Manual Password Cracking Algorithm  Automated Password CrackingModule 6: Trojans and Backdoors  Effect on Business  What is a Trojan?Module 7: Sniffers  Definition of sniffing  How a Sniffer works?Module 8: Denial of Service  What is Denial of Service?  Goal of DoS (Denial of Service)Module 9: Social Engineering  What is Social Engineering?  Art of ManipulationModule 10: Session Hijacking  Understanding Session Hijacking Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  3. 3. Vision for future  Spoofing vs Hijacking  How Web Servers Work?Module 11: Hacking Web Servers  How are Web Servers Compromised?Module 12: Web Application Vulnerabilities  Web Application Set-up  Web Application HackingModule 13: Web Based Password Cracking Techniques  Authentication ( Definition – Mechanisms )  HTTP AuthenticationModule 14: SQL Injection  Attacking SQL Servers  SQL Server Resolution Service (SSRS)Module 15: Hacking Wireless Networks  Introduction to Wireless Networking  Business and Wireless AttacksModule 16: Virus  Virus Characteristics  Symptoms of ‘virus-like’ attack Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  4. 4. Vision for futureModule 17: Physical Security  Security statistics  Physical Security breach incidentsModule 18: Linux Hacking  Why Linux?  Linux basicsModule 19: Evading Firewalls, IDS and Honeypots  Intrusion Detection Systems  Ways to Detect IntrusionModule 20: Buffer Overflows  Significance of Buffer Overflow Vulnerability  Why are Programs/Applications Vulnerable?Module 21: Cryptography  Public-key Cryptography  Working of EncryptionModule 22: Penetration Testing Course  Introduction to Penetration Testing (PT)Module 23: Advanced Exploit WritingModule 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com

×