Netwind Learning Center
netwind netwind

 

 facebook     googleplus   twitter    linkedin

EC Counsil  CEH Certification Training Classes or Online

"If you want to stop hackers from invading your network, first you've got to invade their minds."

ethical hacker training course for certification course online cds cd-rom live boot camp classThe Certified Ethical Hacker CEH training course enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.

This certification is a great compliment to any MCSE or MCITP Certification. An Network Administrator  would be able to handle security initiatives productively rather than restricting the efficiency of the organization. Functionality is expanded instead of lost in the process of securing the organization. For this reason the Certified Ethical Hacker certification compliments any Network Certification in a practical manner. Microsoft's operating systems are the most widely deployed systems and for this reason they are also subjected to the most intrusion attempts

CEH Live Boot Camp Classes Nationally

Training course includes

    instructor based training Instructor led Authorized E-C Council Training

    test preps Practice Tests. Review questions to test your knowledge of the material

    training time More than 60 Hours of training time

    Online Training Book Library Official E-Council book kit

    Proven Success Proven success, with thousands sold to individuals and companies

Course Description

Ethical hacking - this almost seems like a contradiction of words, but it isn't; it is a skill set that is increasingly in demand from year to year. This course examines the differences between hacking and ethical hacking, the stages and phases of ethical hacking, the laws that govern hacking and ethical hacking, and the penetration testing methodology that is used to perform ethical hacking. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv7) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills. At least 2 years of security related experience, and EC-Council approval is required to sit for the CEH exam

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI -based technologies for manipulating IT operating systems

Expected Duration (hours)
60 Hours

CEH Ethical Hacker Certification Exam Requirements

 *You must show 2 years of work experience in security related field. You must also submit a CEH exam eligibility application and obtain authorization from EC-Council before you can attempt the exam. Please visit the EC-Council website for more details.

Ethical Hacker Course Outline

  • Countering IT Security Threats: Ethical Hacking
  • Ethical Hacking and the Need for Penetration Testing
  • Footprinting, Scanning, and Enumeration
  • System Hacking and Malicious Content
  • Social Engineering and Sniffing
  • Deterring Electronic Intrusions
  • Denial of Service and Session Hacking
  • Linux Hacking
  • Cryptography
  • Internet-based and Database-based Attacks
  • Wireless Attacks and Countermeasures
  • Physical Security

You will learn to

     the basic principles of information system security
     the stages of ethical hacking
     common methods ethical hackers can use to test information system security
     analyze attacks made by a malicious hacker, for a given scenario
     recommend a strategy ethical hackers can use to protect themselves, for a given scenario
     how Title 18 of the U.S. Code applies to ethical hackers and the legality of their actions
     situations where privacy laws or principles are breached
     the five hacking classes of attack
     automated vulnerability scanning tools
     calculate the annual loss expectancy of an organization due to hacking, for a given scenario
     determine the applicable law where a computer crime has been committed
     use open source searching to gather information
     the role of RIR
     the purpose of NSlookup
     sequence the TTL process
     how traceroute is used in footprinting
     how e-mail tracking works
     port scanning issues
     how the TCP three-way handshake works
     the types of scans you can perform with Nmap
     differentiate between war driving and war dialing
     differentiate between active and passive fingerprinting
     recommend a reconnaissance and scanning strategy for ethical hacking
     the difference between kernel mode and user mode in Windows NT systems
     how certain Windows elements affect security
     limit NetBIOS null session vulnerabilities
     counter SNMP vulnerabilities
     limit DNS zone transfer vulnerabilities
     use Active Directory enumeration
     recommend a strategy for enumeration and for countering enumeration
     the tools used for password cracking and privilege escalation
     examples of strong passwords
     differentiate between the types of password attacks
     categorize passwords as weak or strong and  the types of attacks they're vulnerable to
     the characteristics of hardware and software keyloggers
     counter rootkits
     sequence the steps to create an alternate data stream in Windows
     the tools used for steganography and erasing evidence
     how trojans work
     the hacking tools used for covert communication, port redirection, and wrapping
     how e-mail can be used as a trojan attack vector
     the countermeasures for trojans
     categorize viruses according to their infection techniques
     the countermeasures for viruses
     key concepts about viruses and trojans
     categorize examples of human-based social engineering
     methods for computer-based social engineering
     examples of insider attacks
     types of phishing attacks
     the countermeasures for social engineering
     analyze social engineering scenarios and recommend countermeasures
     how ARP spoofing works
     how DNS spoofing works
     counter sniffing
     the techniques used for ARP, MAC, and DNS sniffing
     the firewall architectures
     ways to breach and bypass firewalls
     ways in which to evade IDS
     the main IDS detection methods
     how honeypots can be used by IT security professionals
     key concepts about electronic intrusion detection and evasion methods
     categorize some typical DoS attacks
     how DDoS works
     use defense in depth to prevent DoS
     sequence the stages of a botnet attack
     defend computers from bots
     how DoS and DDoS attacks work and  counter them
     how session hijackers can close a client's session with a server and impersonate the client
     the functions of the TCP/IP layers
     sequence the session hijacking steps
     defend against session hijacking
     how session hijacking works and how it can be countered
     sequence the steps to compile a Linux kernel
     assign specific permissions to a file or directory in Linux
     the purposes of Linux hacking tools
     the purpose of Linux security tools
     where information is stored in Linux and basic Linux commands
     the commands for scanning and remote control for certain Linux hacking tools
      assign permissions to users, groups, and others in Linux
     define key cryptographic terms
     distinguish between the most common types of symmetric key algorithms
     select the appropriate message format for a scenario
     distinguish between types of asymmetric algorithms
     determine the appropriate cryptography implementation for a given scenario
     distinguish between hash algorithms
     what's involved in different types of attack against hash algorithms
     the guidelines for key management and distribution
     the characteristics of digital signatures
      implement best practices for e-mail encryption
     distinguish between the security mechanisms for electronic transactions and e-mail
     differentiate between various types of cipher
     the features of common hacking tools used in cryptanalysis
     apply e-mail encryption guidelines and determine the appropriate hash algorithm for a given scenario
      use Telnet for banner grabbing
     the countermeasures you can take against web server attacks
     the IIS server attack types
     web application vulnerabilities
     the countermeasures to web server application attacks
     common methods of authentication
     countermeasures to password-cracking attacks
     recommend countermeasures to Internet-based attacks
     examples of SQL injection attacks
     the steps an attacker may take when preparing to perform a SQL injection attack
     SQL injection countermeasures
      various types of SQL injection attacks
      how buffer overflow attacks occur
     defend off-the-shelf products against buffer overflow attacks
     perform and defend against SQL injections and buffer overflows
     features of the primary modes used for cellular communication
     features of the RF technologies for 2.4 Ghz wireless LANs
     the components of Bluetooth security algorithms
     sequence the steps of the association process
     how wireless systems work
     features of the WEP authentication methods
     the vulnerabilities of WEP
     how wireless networks are vulnerable to DoS attacks
     how the broadcast bubble makes wireless networks vulnerable to eavesdropping
     common wireless hacking tools
      increase the security of wireless LANs
     how wireless security protocols work and  defend a wireless network
     the major sources of physical loss for an organization
     the key objectives of a layered defense solution
     perimeter security mechanisms
     how CPTED strategies are used in loss and crime prevention
     the appropriate physical security mechanisms to implement in a given scenario
     the appropriate controls for securing the inside of a building or facility
     the appropriate fire-protection technique for a scenario
     the most appropriate intrusion detection technology for a scenario
     determine the appropriate intrusion detection system to implement, given a specific scenario
     best practices for securing the data center or server room, for protecting portable equipment, and for ensuring  protection at object level
     the appropriate strategy for securing compartmentalized areas in a given scenario

     

netwind

Call 1.800.617.5586 for pricing

Certified Ethical Hacker Training (Item: kncehon)


Payment Options

1-800-617-5586 (352.404.8866)
All major credit cards (Visa, MasterCard, Amex, and Discover)
Company Purchase Orders may be faxed to 1.877.557.3064

     

netwind

 

Questions? e-mail us at: salesinfo@netwind.com

netwind netwind netwind netwind
Return Policy Netwind Learning Center

Copyright  © 1996-2016 Netwind Learning Center / CDi Communications, Inc.

Privacy Policy       Site-Map Navigation