SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Similar documents
Certified Ethical Hacker (CEH)

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Curso: Ethical Hacking and Countermeasures

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Certified Ethical Hacker

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

Ethical Hacking and Prevention

Course 831 Certified Ethical Hacker v9

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

CEH: CERTIFIED ETHICAL HACKER v9

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council. Program Brochure. EC-Council. Page 1

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

Advanced Diploma on Information Security

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

CETPA INFOTECH PVT. LTD. Curriculum of CYBER SECURITY DURATION: 6 MONTHS

DIS10.1:Ethical Hacking and Countermeasures

Certified Ethical Hacker - CEH v9 Training & Certification

Certified Secure Web Application Engineer

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

CRAW Security. CRAW Security

DIS10.1 Ethical Hacking and Countermeasures

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

CSWAE Certified Secure Web Application Engineer

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

CPTE: Certified Penetration Testing Engineer

POST GRADUATE DIPLOMA IN CYBER SECURITY (PGDCS)

Chapter 4. Network Security. Part I

ITSY 2330 Intrusion Detection Course Syllabus

Practice Labs Ethical Hacker

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering

SQL Injection. Meganadha Reddy K. Technical Trainer NetCom Learning Meganadha Reddy K., 2015

Strategic Infrastructure Security

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

Certified Ethical Hacker V9

Certified Cyber Security Analyst VS-1160

Securing Information Systems

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

The Security Problem

CERTIFIED ETHICAL HACKER V.6 TRAINING (DVD-ROM, SINGLE USER)

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Audience. Pre-Requisites

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

The GenCyber Program. By Chris Ralph

CS System Security 2nd-Half Semester Review

Course. Curriculum ADVANCED ETHICAL HACKING

COMPUTER NETWORK SECURITY

GCIH. GIAC Certified Incident Handler.

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

ECCouncil Certified Ethical Hacker. Download Full Version :

"Charting the Course... Certified Professional Ethical Hacker. Course Summary

Copyright

Access Controls. CISSP Guide to Security Essentials Chapter 2

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Certified Professional Ethical Hacker

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Hackveda Training - Ethical Hacking, Networking & Security

Instructor: Eric Rettke Phone: (every few days)

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

Corso: Certified Ethical Hacker Codice PCSNET: ECCC-1 Cod. Vendor: CEH Durata: 5

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

SharkFest 17 Europe. #35 Sneaking in The Backdoor. Hacking the Non-Standard Layers. Phill Sherlock Shade. Merlion s Keep Consulting.

CYBERSECURITY PROFESSIONAL PENETRATION TESTER

Syllabus: The syllabus is broadly structured as follows:

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

CompTIA Cybersecurity Analyst+

Security in Computing

The Protocols that run the Internet

CHAPTER 8 SECURING INFORMATION SYSTEMS

Endpoint Security - what-if analysis 1

SANS Exam SEC504 Hacker Tools, Techniques, Exploits and Incident Handling Version: 7.1 [ Total Questions: 328 ]

CPEH Certified Professional Ethical Hacker

Certified Professional Ethical Hacker

Security and Authentication

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Understanding Cisco Cybersecurity Fundamentals

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Cybersecurity Foundations

Standard Categories for Incident Response (definitions) V2.1. Standard Categories for Incident Response Teams. Definitions V2.1.

Ethical Hacking CERTIFIED ETHICAL HACKER. Xpert Infotech is the registered trademark of Xperia Technologies Pvt. Ltd.

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Standard Course Outline IS 656 Information Systems Security and Assurance

Certified Vulnerability Assessor

Computer Hacking Forensics Investigator

3. Which of the following is a weakness in a system, application, network or process? A. Threat B. Exploit C. Vulnerability D.

Transcription:

NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. COURSE OBJECTIVES: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional strategies include theory, demonstration, discussion, practical application, simulation and presentations. COURSE OUTLINE: Module 01: Introduction to Ethical Hacking Internet Crime Current Report: IC3 Data Breach Investigations Report Types of Data Stolen From the Organizations Essential Terminologies Elements of Information Security Module 02: Footprinting and Reconnaissance Footprinting Terminologies What is Footprinting? Objectives of Footprinting Footprinting Threats Finding a Company s URL Locate Internal URLs Module 03: Scanning Networks Network Scanning Types of Scanning Checking for Live Systems - ICMP Scanning

Ping Sweep Ping Sweep Tools Module 04: Enumeration What is Enumeration? Techniques for Enumeration Netbios Enumeration NetBIOS Enumeration Tool: SuperScan NetBIOS Enumeration Tool: NetBIOS Enumerator Enumerating User Accounts Enumerate Systems Using Default Passwords Module 05: System Hacking Information at Hand Before System Hacking Stage System Hacking: Goals CEH Hacking Methodology (CHM) Password Cracking Password Complexity Password Cracking Techniques Types of Password Attacks Module 06: Trojans and Backdoors What is a Trojan? Overt and Covert Channels Purpose of Trojans What Do Trojan Creators Look For? Indications of a Trojan Attack Common Ports used by Trojans How to Infect Systems Using a Trojan? Wrappers Wrapper Covert Programs Different Ways a Trojan can Get into a System How to Deploy a Trojan? Module 07: Viruses and Worms Introduction to Viruses Virus and Worm Statistics 2010 Stages of Virus Life Working of Viruses: Infection Phase Working of Viruses: Attack Phase Why Do People Create Computer Viruses?

Indications of Virus Attack How does a Computer get Infected by Viruses? Virus Hoaxes Virus Analysis Module 08: Sniffers Lawful Intercept Benefits of Lawful Intercept Network Components Used for Lawful Intercept Wiretapping Sniffing Threats Module 09: Social Engineering What is Social Engineering? Behaviors Vulnerable to Attacks Factors that Make Companies Vulnerable to Attacks Why is Social Engineering Effective? Warning Signs of an Attack Module 10: Denial of Service What is a Denial of Service Attack? What is Distributed Denial of Service Attacks? How Distributed Denial of Service Attacks Work? Symptoms of a DoS Attack Cyber Criminals Organized Cyber Crime: Organizational Chart Internet Chat Query (ICQ) Module 11: Session Hijacking What is Session Hijacking? Dangers Posed by Hijacking Why Session Hijacking is Successful? Key Session Hijacking Techniques Brute Forcing Brute Forcing Attack HTTP Referrer Attack Spoofing vs. Hijackin Module 12: Hijacking Webservers Webserver Market Shares

Open Source Webserver Architecture IIS Webserver Architecture Website Defacement Case Study Why Web Servers are Compromised? Impact of Webserver Attacks Webserver Misconfiguration Module 13: Hacking Web Applications Web Application Security Statistics Introduction to Web Applications Web Application Components How Web Applications Work? Web Application Architecture Web 2.0 Applications Module 14: SQL Injection SQL Injection is the Most Prevalent Vulnerability in 2010 SQL Injection Threats What is SQL Injection? SQL Injection Attacks How Web Applications Work? Server Side Technologies Module 15: Hacking Wireless Networks Wireless Networks Wi-Fi Usage Statistics in the US Wi-Fi Hotspots at Public Places Wi-Fi Networks at Home Types of Wireless Networks Wireless Standards Service Set Identifier (SSID) Wi-Fi Authentication Modes Module 16: Evading IDS, Firewalls, and Honeypots Intrusion Detection Systems (IDS) and its Placement How IDS Works? Ways to Detect an Intrusion Types of Intrusion Detection Systems System Integrity Verifiers (SIV) General Indications of Intrusions

General Indications of System Intrusions Module 17: Buffer Overflow Buffer Overflows Why are Programs And Applications Vulnerable? Understanding Stacks Stack-Based Buffer Overflow Understanding Heap Heap-Based Buffer Overflow Stack Operations Shellcode Module 18: Cryptography Cryptography Types of Cryptography Government Access to Keys (GAK) Ciphers Advanced Encryption Standard (AES) Data Encryption Standard (DES) RC4, RC5, RC6 Algorithms The DSA and Related Signature Schemes RSA (Rivest Shamir Adleman) Module 19: Penetration Testing Introduction to Penetration Testing Security Assessments Vulnerability Assessment LAB: Review exercises *Session Course Outlines may change as needed, and shall be determined by the instructor. Content shall not change, and if so, students shall be given prior notice. However, the course breakout in sessions per week may vary, but all contact hours shall be met within the term, and within the class schedule parameters.