CERTIFIED ETHICAL HACKER V10

Provided by

Enquire about this course

About the course

Description
 

In this award-winning Certified Ethical Hacker (CEH v10) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your CEH certification course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

About This Course
 
Key Features:
 

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course instructor coaching benefit
  • After-course computing sandbox included

 
Learning Objectives:
 

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure
     

Course Content
 
Ethical Hacking Fundamentals
Considering the effects of hacking

  • Reviewing the elements of information security
  • The security, functionality and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code and mis-configuration
  • Functions of an ethical hacker
  • Conducting vulnerability research
  • Identifying elements of information warfare
     

Applying Covert Techniques to Scan and Attack a Network

Foot-printing and reconnaissance

  • Objectives and methods of foot-printing
  • Searching for information with Google Hacking
  • Employing foot-printing countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analysing Trojan activity

Dissecting viruses, worms and sniffers

  • Distributing malware on the web
  • Recognising key indicators of a virus attack
  • Analysing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognising symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

 
Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

  • Cross–Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks

 
Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

 
Exam Information
This course includes a voucher to take the CEH exam via ProctorU
You can request your voucher at any time after you complete the course
Prerequisites
 

It is recommended that delegates have two years of security-related experience and a strong practical working knowledge of TCP/IP

 

What's Included?
 

Breakfast, Lunch, mid-morning coffees/teas, etc
5-day instructor-led training course
One-on-one after-course instructor coaching
After-course computing sandbox

Enquire

Start date Location / delivery
02 Nov 2020 London Book now
07 Dec 2020 London Book now

Related article

Addressing The Weakest link John McGlone at The Training Centre outlines how you can address the weakest link in cybersecurity. Companies spend a s...