Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

Similar documents
Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

CompTIA A Exam 2. Course Outline. CompTIA A Exam Oct

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

LO CompTIA A+ : (Exam ) Course Outline Sep 2018

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

Pearson: Practical Guide to Advanced Networking. Course Outline. Pearson: Practical Guide to Advanced Networking. 17 Oct

Enterprise support technician (Vista) Course Outline. Enterprise support technician (Vista) 15 Apr

CompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CompTIA Network+ (2012) Course Outline. CompTIA Network+ (2012) 15 Jul 2018

Course Outline. CompTIA A+: A Comprehensive Approach (Exams and )

& CompTIA A+ Complete Study Guide. Course Outline. CompTIA A+ Complete Study Guide.

CompTIA A+ Complete Study Guide. Course Outline. CompTIA A+ Complete Study Guide. 18 Oct

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

CIW: Network Technology Associate. Course Outline. CIW: Network Technology Associate. 17 Oct ( Add-On )

Course Outline. Upgrading Your Skills to MCSA Windows Server 2012 R2. Upgrading Your Skills to MCSA Windows Server 2012 R2

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

MCSA Windows 10 (Course & Lab) Course Outline. MCSA Windows 10 (Course & Lab) 22 Apr 2018

Course Outline. ICND1 - Interconnecting Cisco Networking Devices Part 1. ICND1 - Interconnecting Cisco Networking Devices Part 1

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar

Course Outline. Installing and Configuring Windows Server 2012 R2 (Course & Lab)

Supporting Windows 8.1 (Course & Labs) Course Outline. Supporting Windows 8.1 (Course & Labs) 12 Nov

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) 04 Apr 2018

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) ( Add-On ) 15 Jul 2018

Course Outline. MCSA/MCSE - Querying Microsoft SQL Server 2012 (Course & Lab) ( Add-On )

Course Outline. CISSP - Certified Information Systems Security Professional

Interconnecting Cisco Networking Devices Part 1. Course Outline. Interconnecting Cisco Networking Devices Part 1.

MTA: Networking Fundamentals (Course & Labs) Course Outline. MTA: Networking Fundamentals (Course & Labs) 02 Oct

Course Outline. [ORACLE PRESS] OCA Java SE 8 Programmer Course for Exam 1Z

Course Outline. Oracle Database 12c: Installation and Administration. ( Add-On ) Oracle Database 12c: Installation and Administration

Pearson: CCNP TSHOOT. Course Outline. Pearson: CCNP TSHOOT. 26 Dec

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan

Pearson: CCNP TSHOOT. Course Outline. Pearson: CCNP TSHOOT Jun 2018

MCTS/MCSE - Windows Server 2008 R2. Course Outline. MCTS/MCSE - Windows Server 2008 R Jun 2018

Cisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct

LO CompTIA A+ : (Exam ) Course Outline Aug 2018

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr

Course Outline. Pearson: CCNP Routing and Switching SWITCH May 2018

Administering Microsoft SQL Server 2012 Databases. Course Outline. Administering Microsoft SQL Server 2012 Databases.

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018

LO CompTIA A+ : (Exam ) Course Outline. 04 Apr

Course Outline. Pearson: CCNP Routing and Switching ROUTE

MCSA - Windows 7, Configuring (Course & Lab) Course Outline. MCSA - Windows 7, Configuring (Course & Lab) ( Add-On ) 11 Jul 2018

CIW: JavaScript Specialist v2.0. Course Outline. CIW: JavaScript Specialist v Jun 2018

Course Outline. CCNA Cisco Certified Network Associate Routing and Switching Study Guide.

Course Outline. MCSA Configuring Windows 10 Devices (Course & Lab) ( Add-On ) MCSA Configuring Windows 10 Devices (Course & Lab)

Course Outline. CCNA Cisco Certified Network Associate Routing and Switching Study Guide.

Oracle Java SE 7 Programmer II. Course Outline. Oracle Java SE 7 Programmer II. 30 Apr 2018

Pearson: CCNP Routing and Switching ROUTE Course Outline. Pearson: CCNP Routing and Switching ROUTE

Course Outline. LPIC-1 Exam 1 - Linux Server Professional Certification V4.0 (Course & Labs)

Course Outline. CWTS Certified Wireless Technology Specialist. CWTS Certified Wireless Technology Specialist

Course Outline. CCNA - Interconnecting Cisco Networking Devices Part 1 and 2.

CompTIA A Exam 1 (Course & Labs) Course Outline. CompTIA A Exam 1 (Course & Labs) 15 Nov

Course Outline. CCNA - Interconnecting Cisco Networking Devices Part 1 and 2.

Course Outline. ICND2 - Interconnecting Cisco Networking Devices Part 2. ICND2 - Interconnecting Cisco Networking Devices Part 2

Course Outline. MCSA: Windows 8.1 Complete Study Guide Exam & (Course & Labs)

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

Course Outline. Interconnecting Cisco Networking Devices Part 1 and 2. Interconnecting Cisco Networking Devices Part 1 and 2

Pearson CISCO: CCENT/CCNA (ICND ) Course Outline. Pearson CISCO: CCENT/CCNA (ICND ) 07 Jun 2018

CIW: Advanced HTML5 and CSS3 Specialist. Course Outline. CIW: Advanced HTML5 and CSS3 Specialist. ( Add-On ) 16 Sep 2018

Course Outline. Pearson CISCO: CCNA Routing and Switching (ICND ) Pearson CISCO: CCNA Routing and Switching (ICND )

CompTIA Network+ N ucertify Labs. Course Outline. CompTIA Network+ N ucertify Labs. 10 Oct

Course Outline. [ORACLE PRESS] OCE Oracle Database SQL Certified Expert Course for Exam 1Z

Beginning jquery. Course Outline. Beginning jquery. 09 Mar

Course Outline. Pearson CISCO: CCENT/CCNA (ICND ) official cert guide.

Course Outline. MCSA/MCSE - SQL Server 2008 Administration and MCSA/MCSE - SQL Server 2008 Administration

Course Outline. Pearson CISCO: CCENT/CCNA (ICND ) official cert guide.

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs)

Windows 7, Enterprise Desktop Administrator (Course & Lab) Windows 7, Enterprise Desktop Administrator (Course & Lab)

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

CIW: JavaScript Specialist. Course Outline. CIW: JavaScript Specialist. 30 Dec

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server 2016 (Course & Lab)

CompTIA A Lab. Course Outline. CompTIA A Lab. 30 Nov

Course Outline. Pearson: CCNP Routing and Switching TSHOOT

Course Outline. Pearson: CCNP Routing and Switching TSHOOT Sep 2018

CCNA - Cisco Certified Network Associate. Course Outline. CCNA - Cisco Certified Network Associate. 09 Nov

Course Outline. Pearson: Networking Essentials, 4/E (Course & Lab)

CIW: Site Development Associate. Course Outline. CIW: Site Development Associate. ( Add-On ) 26 Aug 2018

Pearson: Networking Essentials, 4/E (Course & Lab) Course Outline. Pearson: Networking Essentials, 4/E (Course & Lab) 18 Oct

Course Outline. Upgrading Your Skills to MCSA Windows Server 2012 R2 (Course & Lab)

Course Outline. Administering Microsoft SQL Server 2012 Databases (Course & Lab) ( Add-On )

Course Outline. Pearson: CompTIA A Cert Guide (Course & Labs) Pearson: CompTIA A Cert Guide (Course & Labs)

Course Outline. Pearson: CompTIA A Cert Guide (Course & Labs) Pearson: CompTIA A Cert Guide (Course & Labs)

Oracle Database 10g: Administration I. Course Outline. Oracle Database 10g: Administration I. 20 Jul 2018

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

Course Outline. Pearson: MCSA Cert Guide: Networking with Windows Server

Course Outline. Cloud Essentials (CompTIA Authorized Courseware) Labs. Cloud Essentials (CompTIA Authorized Courseware) Labs

Course Outline. Pearson: MCSA Cert Guide: Networking with Windows Server 2016 (Course & Lab)

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec

MCSA Windows 10 Lab (70698 Lab) Course Outline. 20 Jun 2018

Transcription:

Course Outline Certified Ethical Hacker Version 9 05 Nov 2018

Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible Platform 6. State of the Art Educator Tools 7. Award Winning Learning Platform (LMS) 8. Chapter & Lessons Syllabus Chapter 1: Introduction Chapter 2: Introduction to Ethical Hacking Chapter 3: System Fundamentals Chapter 4: Cryptography Chapter 5: Footprinting Chapter 6: Scanning Chapter 7: Enumeration Chapter 8: System Hacking Chapter 9: Malware Chapter 10: Sniffers Chapter 11: Social Engineering Chapter 12: Denial of Service Chapter 13: Session Hijacking

Chapter 14: Web Servers and Applications Chapter 15: SQL Injection Chapter 16: Hacking Wi-Fi and Bluetooth Chapter 17: Mobile Device Security Chapter 18: Evasion Chapter 19: Cloud Technologies and Security Chapter 20: Physical Security Chapter 21: Appendix A: Penetration Testing Frameworks Chapter 22: Appendix B: Building a Lab Videos and How To 9. Practice Test Here's what you get Features 10. Performance Based Labs Lab Tasks Here's what you get 11. Post-Assessment 1. Course Objective

Gain hands-on expertise in Certified Ethical Hacker 312-50 Exam with Certified Ethical Hacker Version 9 course. In this ethical hacking course, you will be presented to a totally unique method for accomplishing ideal information security posture in your association; by hacking it! You will test, scan, hack and secure their own systems. The course provides complete coverage of 312-50 exam and covers topics such as ethical hacking, network topologies, cryptography, system hacking, and much more. The course also makes you understand the tools and techniques used by hackers to break into an organization and helps you read the hacker mindset so that you can defend against future attacks. This course in addition to building your intellectual affinity likewise provides practical exposure to execute the different modules of cybersecurity and networking in your standard routine operations. 2. Pre-Assessment Pre-Assessment lets you identify the areas for improvement before you start your prep. It determines what students know about a topic before it is taught and identifies areas for improvement with question assessment before beginning the course. 3. Exercises, Quizzes, Flashcards & Glossary Each lesson comes with Exercises, Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts while Glossary defines the key terms. Number of Questions 800 Questions

Over 800 unique questions including pre-assessment, quizzes, exercises, and post assessment. 4. Expert Instructor-Led Training ucertify uses the content from the finest publishers and only the IT industry s finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can study at your own pace. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. 5. ADA Compliant & JAWS Compatible Platform ucertify course and labs are ADA (Americans with Disability Act) compliant. It is now more accessible to students with features such as: Change the font, size, and color of the content of the course Text-to-speech, reads the text into spoken words Interactive videos, how-tos videos come with transcripts and voice-over Interactive transcripts, each word is clickable. Students can clip a specific part of the video by clicking on a word or a portion of the text. JAWS (Job Access with Speech) is a computer screen reader program for Microsoft Windows that reads the screen either with a text-to-speech output or by a Refreshable Braille display. Student can easily navigate ucertify course using JAWS shortcut keys. 6. State of the Art Educator Tools ucertify knows the importance of instructors and provide tools to help them do their job effectively. Instructors are able to clone and customize course. Do ability grouping. Create sections. Design grade scale and grade formula. Create and schedule assignments. Educators can also move a student from self-paced to mentor-guided to instructor-led mode in three clicks.

7. Award Winning Learning Platform (LMS) ucertify has developed an award winning, highly interactive yet simple to use platform. The SIIA CODiE Awards is the only peer-reviewed program to showcase business and education technology s finest products and services. Since 1986, thousands of products, services and solutions have been recognized for achieving excellence. ucertify has won CODiE awards consecutively for last 5 years: 2014 1. Best Postsecondary Learning Solution 2015 1. Best Education Solution 2. Best Virtual Learning Solution 3. Best Student Assessment Solution 4. Best Postsecondary Learning Solution 5. Best Career and Workforce Readiness Solution 6. Best Instructional Solution in Other Curriculum Areas 7. Best Corporate Learning/Workforce Development Solution 2016 1. Best Virtual Learning Solution 2. Best Education Cloud-based Solution 3. Best College and Career Readiness Solution 4. Best Corporate / Workforce Learning Solution 5. Best Postsecondary Learning Content Solution 6. Best Postsecondary LMS or Learning Platform 7. Best Learning Relationship Management Solution

2017 1. Best Overall Education Solution 2. Best Student Assessment Solution 3. Best Corporate/Workforce Learning Solution 4. Best Higher Education LMS or Learning Platform 2018 1. Best Higher Education LMS or Learning Platform 2. Best Instructional Solution in Other Curriculum Areas 3. Best Learning Relationship Management Solution 8. Chapter & Lessons ucertify brings these textbooks to life. It is full of interactive activities that keeps the learner engaged. ucertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. Learners can do Flashcards, Exercises, Quizzes and Labs related to each chapter. At the end of every lesson, ucertify courses guide the learners on the path they should follow. Syllabus Chapter 1: Introduction Exam 312-50 Exam Objectives

Chapter 2: Introduction to Ethical Hacking Hacking: the Evolution So, What Is an Ethical Hacker? Chapter 3: System Fundamentals Exploring Network Topologies Working with the Open Systems Interconnection Model Dissecting the TCP/IP Suite IP Subnetting Hexadecimal vs. Binary Exploring TCP/IP Ports Understanding Network Devices Working with MAC Addresses Intrusion Prevention and Intrusion Detection Systems Network Security

Knowing Operating Systems Backups and Archiving Chapter 4: Cryptography Cryptography: Early Applications and Examples Cryptography in Action Understanding Hashing Issues with Cryptography Applications of Cryptography Chapter 5: Footprinting Understanding the Steps of Ethical Hacking What Is Footprinting? Terminology in Footprinting

Threats Introduced by Footprinting The Footprinting Process Chapter 6: Scanning What Is Scanning? Checking for Live Systems Checking the Status of Ports The Family Tree of Scans OS Fingerprinting Countermeasures Vulnerability Scanning Mapping the Network Using Proxies

Chapter 7: Enumeration A Quick Review What Is Enumeration? About Windows Enumeration Linux Basic Enumeration with SNMP Unix and Linux Enumeration LDAP and Directory Service Enumeration Enumeration Using NTP SMTP Enumeration Chapter 8: System Hacking Up to This Point System Hacking

Chapter 9: Malware Malware Overt and Covert Channels Chapter 10: Sniffers Understanding Sniffers Using a Sniffer Switched Network Sniffing Chapter 11: Social Engineering What Is Social Engineering?

Social Networking to Gather Information? Commonly Employed Threats Identity Theft Chapter 12: Denial of Service Understanding DoS Understanding DDoS DoS Tools DDoS Tools DoS Defensive Strategies DoS Pen-Testing Considerations Chapter 13: Session Hijacking Understanding Session Hijacking

Exploring Defensive Strategies Chapter 14: Web Servers and Applications Exploring the Client-Server Relationship Chapter 15: SQL Injection Introducing SQL Injection Chapter 16: Hacking Wi-Fi and Bluetooth What Is a Wireless Network?

Chapter 17: Mobile Device Security Mobile OS Models and Architectures Goals of Mobile Security Device Security Models Countermeasures Chapter 18: Evasion Honeypots, IDSs, and Firewalls Chapter 19: Cloud Technologies and Security What Is the Cloud?

Chapter 20: Physical Security Introducing Physical Security Chapter 21: Appendix A: Penetration Testing Frameworks Overview of Alternative Methods Penetration Testing Execution Standard Chapter 22: Appendix B: Building a Lab Why Build a Lab? Creating a Test Setup The Installation Process 9. Practice Test

ucertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam. Here's what you get 100 2 PRE-ASSESSMENTS QUESTIONS FULL LENGTH TESTS 125 POST-ASSESSMENTS QUESTIONS Features Full Remediation Each question comes with detailed remediation explaining not only why an answer option is correct but also why it is incorrect. Unlimited Practice Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available. Learn, Test and Review Mode Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

10. Performance Based Labs ucertify s performance-based labs are simulators that provides virtual environment. Labs deliver hands on experience with minimal risk and thus replace expensive physical labs. ucertify Labs are cloud-based, device-enabled and can be easily integrated with an LMS. Features of ucertify labs: Provide hands-on experience in a safe, online environment Labs simulate real world, hardware, software & CLI environment Flexible and inexpensive alternative to physical Labs Comes with well-organized component library for every task Highly interactive - learn by doing Explanations and remediation available Videos on how to perform Lab Tasks Complete Chain of Custody Explore Electronic Evidence Examiner (E3) Checking IP/Subnet mask Changing mac Address with macchanger Fragmenting Large Ping Packets Examining Security Policies Checking Internet Access Availability Checking System Reference for Common Port/Name Assignments Checking DNS IP Address Examining an SSL Certificate Observing MD5 Hash Using Openssl to Create a Public/Private Keypair

Encrypting and Decrypting a Message Using PGP Footprinting using traceroute Using Maltego Using System Monitor Performing Banner Grabbing Scanning Network using nbtscan Scanning Target Hosts for their Open Ports Viewing Which Ports are Up and Responding on the Local Host Performing OS Detection of the Localhost Performing OS Fingerprinting Determining Webserver Version Adding Netcraft Extension Launching OpenVas and Running a Scan Using Netcraft to Determine Server Version of fork.com Performing a Ping Sweep with nmap Performing nmap Traceroute Using ettercap for ARP Spoofing Viewing Web Server Enumeration Enumerating Data Using enum4linux Observing State of NTP on the Localhost Hiding Text File in Image by Steganography Covering Tracks Detecting Rootkits Capturing Screenshot using Metasploit Cracking Password using Hydra Disassembling: Convert Hexpair to Opcodes Observing the Current Running Processes Observing the Listening Services Finding Active Network Connection Using NetCat to Access a Shell Over the Network Analyzing Protocols with Wireshark Analyzing Captured Packets using Sniffer

Performing Passive OS Fingerprinting Using tcpdump to View Network Traffic Using tcpdump to View Data in tcp Traffic Using Wireshark to Sniff the Network Using Social Engineering Techniques to Plan an Attack Hacking Web Browsers using BeEF Searching people using AnyWho Searching with Google Advance Search Operators Using Google Hacking Database (GHDB) to Search Mirroring the Entire Website Viewing A Records Viewing Mail Servers Viewing Full Zone Transfer Using whois.icann.org Searching People using Pipl, Spokeo, Zabasearch Using LinkedIn to Find Details of an Employee Performing active reconnaissance Using Whois Performing Information Gathering Using arin.net to Find IP Ranges Assigned to Amazon Simulating a DoS Attack Reviewing CVEs and Buffer Overflows Performing an MITM Attack using Websploit Session Hijacking using burpsuite Dos Attack using Smurf Attack Conducting Buffer Overflow Attack Using Burpsuite Exploiting SQL Injection Setup Honeypot on Kali Linux Using WPScan Detecting Web Application Firewall using WAF00F Cross-Site Request Forgery with low complexity Browsing SSL Certificates

Managing Disk Partitions Scanning a Network using nmap Here's what you get 80 PERFORMANCE BASED LAB 11. Post-Assessment After completion of the ucertify course Post-Assessments are given to students and often used in conjunction with a Pre-Assessment to measure their achievement and the effectiveness of the exam. Have Any Query? We Are Happy To Help! GET IN TOUCH: Call: +1-415-763-6300 Email: sales@ucertify.com