SlideShare a Scribd company logo
1 of 14
Download to read offline
www.scodenetwork.com
Cyber Security Course
Ethical Hacking course :-
Table of Contents:
Program Overview
Program Features
Delivery Mode
Prerequisites
Target Audience
Key Learning Outcomes
Certification Alignment
Certification Details and Criteria
Course Curriculum
Customer Reviews
About Us
www.scodenetwork.com
Program Overview:
Simplilearn’s CEH certification training course provides you with the hands-on training
required to master the techniques hackers use to penetrate network systems, helping you
fortify your system against it. This ethical hacking course is aligned with the latest version
of CEH (v11)by the EC-Council and adequately prepares you to increase your blue team
skills.
Program Features:
40 hours of instructor-led training
Accredited training partner of EC-Council
Six months free access to CEH v11 iLabs
Study material by EC-Council (e-kit)
20 current security domains
Covers 340 attack technologies
Exam pass guarantee (For the US only)
Delivery Mode:
Blended Learning
Prerequisites:
There is no specific eligibility criteria for Certified Ethical Hacker (CEH) training and
certification, but we recommend a basic knowledge of TCP/IP.
Target Audience:
Network security officers and
practitioners
Site administrators
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
IT security specialist, analyst, manager,
architect, or administrator
IT security officer, auditor, or engineer
Network specialist, analyst, manager,
architect, consultant, or administrator
Technical support engineer
Senior systems engineer
Systems analyst or administrator
Key Learning Outcomes:
This ethical hacking course will help you:
Grasp the step-by-step methodology and tactics that hackers use to penetrate network
systems
Understand the finer nuances of trojans, backdoors, and countermeasures
Get a better understanding of IDS, firewalls, honeypots, and wireless hacking
Master advanced hacking concepts, including mobile device and smartphone hacking, writing
virus codes, exploit writing and reverse engineering, and corporate espionage
Gain expertise on advanced concepts such as advanced network packet analysis, securing IIS
and Apache web servers, Windows system administration using Powershell, and hacking SQL and
Oracle databases
Cover the latest developments in mobile and web technologies, including Android, iOS,
BlackBerry, Windows Phone, and HTML 5
Learn advanced log management for information assurance and manage information security
with more clarity
Certification Alignment:
Our Certified Ethical Hacker course is accredited by the EC-Council. We are the registered
training provider for this course.
Certification Details and Criteria:
Certification Details -
To become CEH certified, you must pass the CEH examination after either attending CEH training
at an accredited training center like Simplilearn or through self-study. If you choose self-study, you
must fill out an application and submit proof of at least two years of experience in the network
security domain. The purpose of the CEH credential is to:
Establish and govern minimum standards for credentialing professional information security
specialists in ethical hacking measures
Inform the public that credentialed individuals meet or exceed the minimum standards
Reinforce ethical hacking as a unique and self-regulating profession
About the Exam
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50
(VUE)
www.scodenetwork.com
Simplilearn Certification Criteria:
www.scodenetwork.com
Attend one complete class
Course Curriculum:
Module 01 - Introduction to Ethical Hacking
Lesson 01- Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 06 - Penetration Testing Concepts
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 07 - Information Security Laws and Standards
Lesson 02 - Footprinting and Reconnaissance
Lesson 01- Footprinting Concepts
Lesson 02 - Footprinting through Search Engines
Lesson 03 - Footprinting through Web Services
Lesson 04 - Footprinting through Social Networking Sites
Lesson 05 - Website Footprinting
Lesson 06 - Email Footprinting
Lesson 07 - Competitive Intelligence
Lesson 08 - W hois Footprinting
Lesson 09 - DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11-Footprinting through Social Engineering
Lesson 12- Footprinting Tools
Lesson 13 - Countermeasures
Lesson 14- Footprinting Pen Testing
Module 03 - Scanning Networks
Lesson 01- Network Scanning Concepts
Lesson 02 - Scanning Tools
Lesson 03 - Scanning Techniques
Lesson 04 - Scanning Beyond IDS and Firewall
Lesson 05 - Banner Grabbing
Lesson 06 - Draw Network Diagrams
Lesson 07 - Scanning Pen Testing
Module 04 - Enumeration
www.scodenetwork.com
Lesson 01- Enumeration Concepts
Lesson 02 - NetBIOS Enumeration
Lesson 03 - SNMP Enumeration
Lesson 04 - LDAP Enumeration
Lesson 05 - NTP Enumeration
Lesson 06 - SMTP Enumeration and DNS Enumeration
Lesson 07 - Enumeration Countermeasures
Lesson 08 - Other Enumeration Techniques
Lesson 09 - Enumeration Pen Testing
Module 05 - Vulnerability Analysis
Lesson 01- Vulnerability Assessment Concepts
Lesson 02 - Vulnerability Assessment Solutions
Lesson 03 - Vulnerability Scoring Systems
Lesson 04 - Vulnerability Assessment Tools
Lesson 05 - Vulnerability Assessment Reports
Module 06 - System Hacking
Lesson 01- System Hacking Concepts
Lesson 02 - Cracking Passwords
Lesson 03 - Escalating Privileges
Lesson 04 - Executing Applications
Lesson 05 - Hiding Files
Lesson 06 - Covering Tracks
Lesson 07 - Penetration Testing
Module 07 - Malware Threats
Lesson 01- Malware Concepts
Lesson 02 - Trojan Concepts
Lesson 03 - Virus and Worm Concepts
Lesson 04 - Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware Software
Lesson 07- Malware Penetration Testing
Module 08 - Sniffing
www.scodenetwork.com
Lesson 01-Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing Attacks
Lesson 06- Sniffing Technique: DNS Poisoning
Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing
Module 09- Social Engineering
Lesson 01- Social Engineering Concepts
Lesson 02 - Social Engineering Techniques
Lesson 03- Insider Threats
Lesson 04 - Impersonation on Social Networking Sites
Lesson 05 - Identity Theft
Lesson 06 - Countermeasures
Lesson 07 - Social Engineering Penetration Testing
Module 10- Denial-of-Service
Lesson 01- DoS/DDoS Concepts
Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets
Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools
Lesson 06 - Countermeasures
Lesson 07 - DoS/DDoS Protection Tools
Lesson 08 - DoS/DDoS Attack Penetration Testing
Module 11- Session Hijacking
Lesson 01-Session Hijacking Concepts
Lesson 02- Application Level Session Hijacking
Lesson 03- Network Level Session Hijacking
Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration Testing
Module 12 - Evading IDS, Firewalls, and Honeypots
www.scodenetwork.com
Lesson 01- IDS, Firewall, and Honeypot Concepts
Lesson 02- IDS, Firewall, and Honeypot Solutions
Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading Tools
Lesson 06- Detecting Honeypots
Lesson 07- IDS/Firewall Evasion Countermeasures
Lesson 08- Penetration Testing
Module 13- Hacking Web Servers
Lesson 01-Web Server Concepts
Lesson 02- Web Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security Tools
Lesson 08- Web Server Pen Testing
Module 14- Hacking Web Applications
Lesson 01- Web App Concepts
Lesson 02 - Web App Threats
Lesson 03 - Hacking Methodology
Lesson 04 - Web Application Hacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Web App Security Testing Tools
Lesson 07 - Web App Pen Testing
Module 15- SQL Injection
Lesson 01- SQL Injection Concepts
Lesson 02 - Types of SQL Injection
Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools
Lesson 05 - Evasion Techniques
Lesson 06 - Countermeasures
Module 16- Hacking Wireless Networks
www.scodenetwork.com
Lesson 01- Wireless Concepts
Lesson 02 - Wireless Encryption
Lesson 03 - Wireless Threats
Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools
Lesson 06 - Bluetooth Hacking
Lesson 07 - Countermeasures
Lesson 08 - Wireless Security Tools
Lesson 09 - Wi-Fi Pen Testing
Module 17- Hacking Mobile Platforms
Lesson 01- Mobile Platform Attack Vectors
Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and Tools
Lesson 07- Mobile Pen Testing
Module 18- IoT Hacking
Lesson 01-IoT Concepts
Lesson 02- IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05- Countermeasures
Lesson 06- IoT Pen Testing
Module 19- Cloud Computing
Lesson 01 - Cloud Computing Concepts
Lesson 02 - Cloud Computing Threats
Lesson 03 - Cloud Computing Attacks
Lesson 04 - Cloud Security
Lesson 05 - Cloud Security Tools
Lesson 06 - Cloud Penetration Testing
Module 16- Hacking Wireless Networks
www.scodenetwork.com
Lesson 01-Cryptography ConceptsLesson
02- Encryption Algorithms Lesson 03-
Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)Lesson
05- Email Encryption
Lesson 06- Disk EncryptionLesson
07- Cryptanalysis
Lesson 08- Countermeasures
COURSE CURRICULUM
Network Fundamentals
 Explain the role and function of network components
 Routers
 L2 and L3 switches
 Next-generation firewalls and IPS
 Access points
 Controllers (Cisco DNA Center and WLC)
 Endpoints
 Servers
Describe characteristics of network topology architectures
 2 tier
 3 tier
 Spine-leaf
 WAN
 Small office/home office (SOHO)
 On-premises and cloud
Compare physical interface and cabling types
 Single-mode fiber, multimode fiber, copper
 Connections (Ethernet shared media and point-to-point)
 Concepts of PoE
Identify interface and cable issues (collisions, errors,
mismatch duplex, and/or speed)Compare TCP to UDP
Configure and verify IPv4 addressing and subnetting
Describe the need for private IPv4 addressing
Configure and verify IPv6 addressing and prefix
Module 16- Hacking Wireless Networks
www.scodenetwork.com
Compare IPv6 address types 1.9.a Global unicast
 Unique local
 Link local
 Anycast
 Multicast
 Modified EUI 64
Verify IP parameters for Client OS (Windows, Mac OS, Linux)
Describe wireless principles
 Nonoverlapping Wi-Fi channels
 SSID
 RF
 Encryption
Module 16- Hacking Wireless Networks
www.scodenetwork.com
Explain virtualization fundamentals (virtual machines)
Describe switching concepts
 MAC learning and aging
 Frame switching
 Frame flooding
 MAC address table
2.0 Network Access
 Configure and verify VLANs (normal range) spanning multiple switches
 Access ports (data and voice)
 Default VLAN
 Connectivity
Configure and verify interswitch connectivity
 Trunk ports
 802.1Q
 Native VLAN
Configure and verify Layer 2 discovery protocols (Cisco
Discovery Protocol and LLDP) Configure and verify (Layer
2/Layer 3) EtherChannel (LACP)
Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify
basic operations
 Root port, root bridge (primary/secondary), and other port names
 Port states (forwarding/blocking)
 PortFast benefits
Compare Cisco Wireless Architectures and AP modes
Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk
ports, and LAG)
Describe AP and WLC management access connections (Telnet,
SSH, HTTP, HTTPS, console,and TACACS+/RADIUS)
Configure the components of a wireless LAN access for client connectivity using GUI only
such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
3.0 IP Connectivity
Interpret the components of routing table
 Routing protocol code
 Prefix
 Network mask
 Next hop
 Administrative distance
 Metric
 Gateway of last resort
Module 16- Hacking Wireless Networks
www.scodenetwork.com
Determine how a router makes a forwarding decision by default
 Longest match
 Administrative distance
 Routing protocol metric
Configure and verify IPv4 and IPv6 static routing
 Default route
 Network route
 Host route
 Floating static
Module 20- Cryptography
www.scodenetwork.com
Configure and verify single area OSPFv2 3.4.a Neighbor
adjacencies
 Point-to-point
 Broadcast (DR/BDR selection)
 Router ID
Describe the purpose of first hop redundancy protocol
4.0 IP Services
 Configure and verify inside source NAT using static and pools
 Configure and verify NTP operating in a client and server mode
 Explain the role of DHCP and DNS within the network
 Explain the function of SNMP in network operations
 Describe the use of syslog features including facilities and levels
 Configure and verify DHCP client and relay
 Explain the forwarding per-hop behavior (PHB) for QoS such as classification,
marking, queuing,congestion, policing, shaping
 Configure network devices for remote access using SSH
 Describe the capabilities and function of TFTP/FTP in the network
5.0 Security Fundamentals
 Define key security concepts (threats, vulnerabilities, exploits, and mitigation
techniques)
 Describe security program elements (user awareness, training, and physical access
control)
 Configure device access control using local passwords
 Describe security password policies elements, such as management,
complexity, and passwordalternatives (multifactor authentication, certificates,
and biometrics)
 Describe remote access and site-to-site VPNs
 Configure and verify access control lists
 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and
port security)
 Differentiate authentication, authorization, and accounting concepts
 Describe wireless security protocols (WPA, WPA2, and WPA3)
 Configure WLAN using WPA2 PSK using the GUI
6.0 Automation and Programmability
 Explain how automation impacts network management
 Compare traditional networks with controller-based networking
 Describe controller-based and software defined architectures (overlay, underlay,
and fabric)
 Separation of control plane and data plane
 North-bound and south-bound APIs
Module 20- Cryptography
www.scodenetwork.com
Compare traditional campus device management with
Cisco DNA Center enabled devicemanagement
Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
Recognize the capabilities of configuration management mechanisms Puppet, Chef, and
AnsibleInterpret JSON encoded data

More Related Content

Similar to cyber_security_syllabus .pdf | scode network institute

certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfinfosec train
 
certified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentcertified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentpriyanshamadhwal2
 
12 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 201812 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 2018Paula Januszkiewicz
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams AcademyAdams Academy
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introductionVi Tính Hoàng Nam
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdfAliza Oscar
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaShivamSharma909
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineerShivamSharma909
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Amaaira Johns
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...Susan Hannan
 
Upgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skillsUpgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skillseshartns25
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 

Similar to cyber_security_syllabus .pdf | scode network institute (20)

certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
certified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentcertified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_content
 
12 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 201812 Crucial Windows Security Skills for 2018
12 Crucial Windows Security Skills for 2018
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introduction
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
 
Ce hv8 module 00
Ce hv8 module 00Ce hv8 module 00
Ce hv8 module 00
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
 
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
 
Upgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skillsUpgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skills
 
Security Essentials Certification
Security Essentials CertificationSecurity Essentials Certification
Security Essentials Certification
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 

More from Scode Network Institute

More from Scode Network Institute (7)

What is Computer network
What is Computer networkWhat is Computer network
What is Computer network
 
digital marketing ppt.pptx
digital marketing ppt.pptxdigital marketing ppt.pptx
digital marketing ppt.pptx
 
What is a Computer Network
What is a Computer NetworkWhat is a Computer Network
What is a Computer Network
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
python course ppt pdf
python course ppt pdfpython course ppt pdf
python course ppt pdf
 
python ppt | Python Course In Ghaziabad | Scode Network Institute
python ppt | Python Course In Ghaziabad | Scode Network Institutepython ppt | Python Course In Ghaziabad | Scode Network Institute
python ppt | Python Course In Ghaziabad | Scode Network Institute
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

cyber_security_syllabus .pdf | scode network institute

  • 1. www.scodenetwork.com Cyber Security Course Ethical Hacking course :- Table of Contents: Program Overview Program Features Delivery Mode Prerequisites Target Audience Key Learning Outcomes Certification Alignment Certification Details and Criteria Course Curriculum Customer Reviews About Us
  • 2. www.scodenetwork.com Program Overview: Simplilearn’s CEH certification training course provides you with the hands-on training required to master the techniques hackers use to penetrate network systems, helping you fortify your system against it. This ethical hacking course is aligned with the latest version of CEH (v11)by the EC-Council and adequately prepares you to increase your blue team skills. Program Features: 40 hours of instructor-led training Accredited training partner of EC-Council Six months free access to CEH v11 iLabs Study material by EC-Council (e-kit) 20 current security domains Covers 340 attack technologies Exam pass guarantee (For the US only) Delivery Mode: Blended Learning Prerequisites: There is no specific eligibility criteria for Certified Ethical Hacker (CEH) training and certification, but we recommend a basic knowledge of TCP/IP. Target Audience: Network security officers and practitioners Site administrators IS/IT specialist, analyst, or manager IS/IT auditor or consultant IT operations manager IT security specialist, analyst, manager, architect, or administrator IT security officer, auditor, or engineer Network specialist, analyst, manager, architect, consultant, or administrator Technical support engineer Senior systems engineer Systems analyst or administrator
  • 3. Key Learning Outcomes: This ethical hacking course will help you: Grasp the step-by-step methodology and tactics that hackers use to penetrate network systems Understand the finer nuances of trojans, backdoors, and countermeasures Get a better understanding of IDS, firewalls, honeypots, and wireless hacking Master advanced hacking concepts, including mobile device and smartphone hacking, writing virus codes, exploit writing and reverse engineering, and corporate espionage Gain expertise on advanced concepts such as advanced network packet analysis, securing IIS and Apache web servers, Windows system administration using Powershell, and hacking SQL and Oracle databases Cover the latest developments in mobile and web technologies, including Android, iOS, BlackBerry, Windows Phone, and HTML 5 Learn advanced log management for information assurance and manage information security with more clarity Certification Alignment: Our Certified Ethical Hacker course is accredited by the EC-Council. We are the registered training provider for this course. Certification Details and Criteria: Certification Details - To become CEH certified, you must pass the CEH examination after either attending CEH training at an accredited training center like Simplilearn or through self-study. If you choose self-study, you must fill out an application and submit proof of at least two years of experience in the network security domain. The purpose of the CEH credential is to: Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures Inform the public that credentialed individuals meet or exceed the minimum standards Reinforce ethical hacking as a unique and self-regulating profession About the Exam Number of Questions: 125 Test Duration: 4 Hours Test Format: Multiple Choice Test Delivery: ECC EXAM, VUE Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE) www.scodenetwork.com
  • 4. Simplilearn Certification Criteria: www.scodenetwork.com Attend one complete class Course Curriculum: Module 01 - Introduction to Ethical Hacking Lesson 01- Information Security Overview Lesson 02 - Information Security Threats and Attack Vectors Lesson 06 - Penetration Testing Concepts Lesson 03 - Hacking Concepts Lesson 04 - Ethical Hacking Concepts Lesson 05 - Information Security Controls Lesson 07 - Information Security Laws and Standards Lesson 02 - Footprinting and Reconnaissance Lesson 01- Footprinting Concepts Lesson 02 - Footprinting through Search Engines Lesson 03 - Footprinting through Web Services Lesson 04 - Footprinting through Social Networking Sites Lesson 05 - Website Footprinting Lesson 06 - Email Footprinting Lesson 07 - Competitive Intelligence Lesson 08 - W hois Footprinting Lesson 09 - DNS Footprinting Lesson 10- Network Footprinting Lesson 11-Footprinting through Social Engineering Lesson 12- Footprinting Tools Lesson 13 - Countermeasures Lesson 14- Footprinting Pen Testing Module 03 - Scanning Networks Lesson 01- Network Scanning Concepts Lesson 02 - Scanning Tools Lesson 03 - Scanning Techniques Lesson 04 - Scanning Beyond IDS and Firewall Lesson 05 - Banner Grabbing Lesson 06 - Draw Network Diagrams Lesson 07 - Scanning Pen Testing
  • 5. Module 04 - Enumeration www.scodenetwork.com Lesson 01- Enumeration Concepts Lesson 02 - NetBIOS Enumeration Lesson 03 - SNMP Enumeration Lesson 04 - LDAP Enumeration Lesson 05 - NTP Enumeration Lesson 06 - SMTP Enumeration and DNS Enumeration Lesson 07 - Enumeration Countermeasures Lesson 08 - Other Enumeration Techniques Lesson 09 - Enumeration Pen Testing Module 05 - Vulnerability Analysis Lesson 01- Vulnerability Assessment Concepts Lesson 02 - Vulnerability Assessment Solutions Lesson 03 - Vulnerability Scoring Systems Lesson 04 - Vulnerability Assessment Tools Lesson 05 - Vulnerability Assessment Reports Module 06 - System Hacking Lesson 01- System Hacking Concepts Lesson 02 - Cracking Passwords Lesson 03 - Escalating Privileges Lesson 04 - Executing Applications Lesson 05 - Hiding Files Lesson 06 - Covering Tracks Lesson 07 - Penetration Testing Module 07 - Malware Threats Lesson 01- Malware Concepts Lesson 02 - Trojan Concepts Lesson 03 - Virus and Worm Concepts Lesson 04 - Malware Analysis Lesson 05- Countermeasures Lesson 06- Anti-Malware Software Lesson 07- Malware Penetration Testing
  • 6. Module 08 - Sniffing www.scodenetwork.com Lesson 01-Sniffing Concepts Lesson 02- Sniffing Technique: MAC Attacks Lesson 03- Sniffing Technique: DHCP Attacks Lesson 04- Sniffing Technique: ARP Poisoning Lesson 05- Sniffing Technique: Spoofing Attacks Lesson 06- Sniffing Technique: DNS Poisoning Lesson 07- Sniffing Tools Lesson 08- Countermeasures Lesson 09- Sniffing Detection Techniques Lesson 10- Sniffing Pen Testing Module 09- Social Engineering Lesson 01- Social Engineering Concepts Lesson 02 - Social Engineering Techniques Lesson 03- Insider Threats Lesson 04 - Impersonation on Social Networking Sites Lesson 05 - Identity Theft Lesson 06 - Countermeasures Lesson 07 - Social Engineering Penetration Testing Module 10- Denial-of-Service Lesson 01- DoS/DDoS Concepts Lesson 02 - DoS/DDoS Attack Techniques Lesson 03 - Botnets Lesson 04 - DDoS Case Study Lesson 05 - DoS/DDoS Attack Tools Lesson 06 - Countermeasures Lesson 07 - DoS/DDoS Protection Tools Lesson 08 - DoS/DDoS Attack Penetration Testing Module 11- Session Hijacking Lesson 01-Session Hijacking Concepts Lesson 02- Application Level Session Hijacking Lesson 03- Network Level Session Hijacking Lesson 04- Session Hijacking Tools Lesson 05- Countermeasures Lesson 06- Penetration Testing
  • 7. Module 12 - Evading IDS, Firewalls, and Honeypots www.scodenetwork.com Lesson 01- IDS, Firewall, and Honeypot Concepts Lesson 02- IDS, Firewall, and Honeypot Solutions Lesson 03- Evading IDS Lesson 04- Evading Firewalls Lesson 05- IDS/Firewall Evading Tools Lesson 06- Detecting Honeypots Lesson 07- IDS/Firewall Evasion Countermeasures Lesson 08- Penetration Testing Module 13- Hacking Web Servers Lesson 01-Web Server Concepts Lesson 02- Web Server Attacks Lesson 03- Web Server Attack Methodology Lesson 04- Web Server Attack Tools Lesson 05- Countermeasures Lesson 06- Patch Management Lesson 07- Web Server Security Tools Lesson 08- Web Server Pen Testing Module 14- Hacking Web Applications Lesson 01- Web App Concepts Lesson 02 - Web App Threats Lesson 03 - Hacking Methodology Lesson 04 - Web Application Hacking Tools Lesson 05 - Countermeasures Lesson 06 - Web App Security Testing Tools Lesson 07 - Web App Pen Testing Module 15- SQL Injection Lesson 01- SQL Injection Concepts Lesson 02 - Types of SQL Injection Lesson 03 - SQL Injection Methodology Lesson 04 - SQL Injection Tools Lesson 05 - Evasion Techniques Lesson 06 - Countermeasures
  • 8. Module 16- Hacking Wireless Networks www.scodenetwork.com Lesson 01- Wireless Concepts Lesson 02 - Wireless Encryption Lesson 03 - Wireless Threats Lesson 04 - Wireless Hacking Methodology Lesson 05 - Wireless Hacking Tools Lesson 06 - Bluetooth Hacking Lesson 07 - Countermeasures Lesson 08 - Wireless Security Tools Lesson 09 - Wi-Fi Pen Testing Module 17- Hacking Mobile Platforms Lesson 01- Mobile Platform Attack Vectors Lesson 02- Hacking Android OS Lesson 03- Hacking iOS Lesson 04- Mobile Spyware Lesson 05- Mobile Device Management Lesson 06- Mobile Security Guidelines and Tools Lesson 07- Mobile Pen Testing Module 18- IoT Hacking Lesson 01-IoT Concepts Lesson 02- IoT Attacks Lesson 03- IoT Hacking Methodology Lesson 04- IoT Hacking Tools Lesson 05- Countermeasures Lesson 06- IoT Pen Testing Module 19- Cloud Computing Lesson 01 - Cloud Computing Concepts Lesson 02 - Cloud Computing Threats Lesson 03 - Cloud Computing Attacks Lesson 04 - Cloud Security Lesson 05 - Cloud Security Tools Lesson 06 - Cloud Penetration Testing
  • 9. Module 16- Hacking Wireless Networks www.scodenetwork.com Lesson 01-Cryptography ConceptsLesson 02- Encryption Algorithms Lesson 03- Cryptography Tools Lesson 04- Public Key Infrastructure (PKI)Lesson 05- Email Encryption Lesson 06- Disk EncryptionLesson 07- Cryptanalysis Lesson 08- Countermeasures COURSE CURRICULUM Network Fundamentals  Explain the role and function of network components  Routers  L2 and L3 switches  Next-generation firewalls and IPS  Access points  Controllers (Cisco DNA Center and WLC)  Endpoints  Servers Describe characteristics of network topology architectures  2 tier  3 tier  Spine-leaf  WAN  Small office/home office (SOHO)  On-premises and cloud Compare physical interface and cabling types  Single-mode fiber, multimode fiber, copper  Connections (Ethernet shared media and point-to-point)  Concepts of PoE Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)Compare TCP to UDP Configure and verify IPv4 addressing and subnetting Describe the need for private IPv4 addressing Configure and verify IPv6 addressing and prefix
  • 10. Module 16- Hacking Wireless Networks www.scodenetwork.com Compare IPv6 address types 1.9.a Global unicast  Unique local  Link local  Anycast  Multicast  Modified EUI 64 Verify IP parameters for Client OS (Windows, Mac OS, Linux) Describe wireless principles  Nonoverlapping Wi-Fi channels  SSID  RF  Encryption
  • 11. Module 16- Hacking Wireless Networks www.scodenetwork.com Explain virtualization fundamentals (virtual machines) Describe switching concepts  MAC learning and aging  Frame switching  Frame flooding  MAC address table 2.0 Network Access  Configure and verify VLANs (normal range) spanning multiple switches  Access ports (data and voice)  Default VLAN  Connectivity Configure and verify interswitch connectivity  Trunk ports  802.1Q  Native VLAN Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP) Configure and verify (Layer 2/Layer 3) EtherChannel (LACP) Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations  Root port, root bridge (primary/secondary), and other port names  Port states (forwarding/blocking)  PortFast benefits Compare Cisco Wireless Architectures and AP modes Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG) Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console,and TACACS+/RADIUS) Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings 3.0 IP Connectivity Interpret the components of routing table  Routing protocol code  Prefix  Network mask  Next hop  Administrative distance  Metric  Gateway of last resort
  • 12. Module 16- Hacking Wireless Networks www.scodenetwork.com Determine how a router makes a forwarding decision by default  Longest match  Administrative distance  Routing protocol metric Configure and verify IPv4 and IPv6 static routing  Default route  Network route  Host route  Floating static
  • 13. Module 20- Cryptography www.scodenetwork.com Configure and verify single area OSPFv2 3.4.a Neighbor adjacencies  Point-to-point  Broadcast (DR/BDR selection)  Router ID Describe the purpose of first hop redundancy protocol 4.0 IP Services  Configure and verify inside source NAT using static and pools  Configure and verify NTP operating in a client and server mode  Explain the role of DHCP and DNS within the network  Explain the function of SNMP in network operations  Describe the use of syslog features including facilities and levels  Configure and verify DHCP client and relay  Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing,congestion, policing, shaping  Configure network devices for remote access using SSH  Describe the capabilities and function of TFTP/FTP in the network 5.0 Security Fundamentals  Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)  Describe security program elements (user awareness, training, and physical access control)  Configure device access control using local passwords  Describe security password policies elements, such as management, complexity, and passwordalternatives (multifactor authentication, certificates, and biometrics)  Describe remote access and site-to-site VPNs  Configure and verify access control lists  Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)  Differentiate authentication, authorization, and accounting concepts  Describe wireless security protocols (WPA, WPA2, and WPA3)  Configure WLAN using WPA2 PSK using the GUI 6.0 Automation and Programmability  Explain how automation impacts network management  Compare traditional networks with controller-based networking  Describe controller-based and software defined architectures (overlay, underlay, and fabric)  Separation of control plane and data plane  North-bound and south-bound APIs
  • 14. Module 20- Cryptography www.scodenetwork.com Compare traditional campus device management with Cisco DNA Center enabled devicemanagement Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding) Recognize the capabilities of configuration management mechanisms Puppet, Chef, and AnsibleInterpret JSON encoded data