Security is a serious issue in the IT industry across the globe, especially with the IT
market booming despite the prevailing economic uncertainties. While following
best practices and security policies are very important, they cannot guarantee that
your data safety will not be compromised. Ethical hacking and countermeasures
serve to test and evaluate the security of the corporate environment in the real
world, using real-world hacking tools and methodologies.
1. KnowledgeHut is an Authorized Training Partner (ATP)
and Accredited Training Center (ATC) for EC-Council.
Duration: 5 Days
Format: Instructor-led Classroom Training
Certied Ethical Hacker
Description
Prerequisites
There are no prerequisites to attend this
training course, and anyone interested in IT
security can attend.
This course prepares you for the
EC-Council Certied Ethical Hacker Exam,
and is a prerequisite to apply for the exam.
Students are required to clear the online
Pro-metric exam to receive the CEH
Certication.
There are 125 Multiple choice Questions on
the test, to be completed in 4 hours, and
candidates must receive a passing score of
70%.
Certication
To learn more about the CEH certification
process, please refer the
Application/Eligibility Process information on
the EC-Council website.
http://cert.eccouncil.org/application-proces
s-eligibility.html
Who can attend?
This Certied Ethical Hacking course will
signicantly benet security ocers,
auditors, security professionals, site
administrators, and anyone who is
concerned about the integrity of the
network infrastructure.
(CEH) V8
Security is a serious issue in the IT industry across the globe, especially with the IT
market booming despite the prevailing economic uncertainties. While following
best practices and security policies are very important, they cannot guarantee that
your data safety will not be compromised. Ethical hacking and countermeasures
serve to test and evaluate the security of the corporate environment in the real
world, using real-world hacking tools and methodologies.
Our comprehensive 5 day program on CEH V8 will address security threats to the
latest operating systems, mobile platforms, tablet computers, and counter mea-sures
to secure all these domains. Concepts are presented in an easily comprehen-sible
manner, with simplied advanced technical courseware that covers vulnera-bility
assessment, risk assessment, penetration testing and system protection.
Learn to think like a hacker, and use it for ethical purposes - gain credibility as a Cer-ti
ed Ethical Hacker with the EC-Council CEH certication under your belt.
Course Structure
โข Introduction to Ethical Hacking
โข Foot Printing Reconnaissance
โข Scanning Networks
โข Enumeration
โข System Hacking
โข Trojans Backdoors
โข Viruses Worms
โข Sniffers
โข Social Engineering
โข Denial of Service
โข Session Hijacking
โข Hijacking Web servers
โข Hacking Web Applications
โข SQL Injection
โข Hacking Wireless Networks
โข Hacking Mobile Platforms
โข Evading IDS, Firewalls Honey pots
โข Buffer Overflow
โข Cryptography
โข Penetration Testing
Course Benets
From the Course:
Students undergoing CEH training will learn:
โข Key issues plaguing the information security world, incident management
process, and penetration testing
โข Various types of footprinting, footprinting tools, and countermeasures
โข Network scanning techniques and scanning countermeasures
โข Enumeration techniques and enumeration countermeasures
โข System hacking methodology, steganography, steganalysis attacks, and
covering tracks
โข Dierent types of Trojans, Trojan analysis, and Trojan countermeasures
โข Working of viruses, virus analysis, computer worms, malware analysis
procedure, and countermeasures
โข Packet sning techniques and how to defend against sning
โข Social Engineering techniques, identify theft, and social engineering
countermeasures
โข DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS
countermeasures
โข Session hijacking techniques and countermeasures
โข Dierent types of webserver attacks, attack methodology, and countermeasures
โข Dierent types of web application attacks, web application hacking
methodology, and countermeasures
โข SQL injection attacks and injection detection tools
โข Wireless Encryption, wireless hacking methodology, wireless hacking tools,
and wi- security tools
โข Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows
phone 8 vulnerabilities, mobile security guidelines, and tools
โข Firewall, IDS and honeypot evasion techniques, evasion tools, and
countermeasures
โข Various types of buer overows, how to mutate a buer overow exploit,
buer overow detection tools, and countermeasures
โข Dierent types of cryptography ciphers, Public Key Infrastructure (PKI),
cryptography attacks, and cryptanalysis tools
โข Various types of penetration testing, security audit, vulnerability assessment,
and penetration testing roadmap
From the Workshop:
โข Instructor -Led Classroom Training (5 Days)by Certified EC-Council expert
instructors
โข Hands-on workshop
โข Course Fee includes Certification Exam Fee
โข Well organized DVD-ROM content - 6 DVD sets of approximately 24GBs of the
latest hacking and security tools
โข A result oriented, descriptive, and analytical lab manual - the labs showcased in
the courseware are tested against the latest Operating Systems (including all
patches and hot fixes applied)
โข Free 6 months CEH V8 iLabs access โ this is a virtual cloud-based Lab
environment
โข Hard copy of the courseware
To know more about the next available workshop in your country, please visit this
link: http://www.knowledgehut.com/short?v=BBJvRzwY
www.knowledgehut.com support@knowledgehut.com