Certified Ethical Hacker - CEH v9 Training & Certification

Similar documents
EC-Council C EH. Certified Ethical Hacker. Program Brochure

CompTIA Mobility+ Course Description

CIPP/G (Certified Information Privacy Professional US Government)

CIPT Certified Information Privacy Technologist

MCTS and MCITP: Windows 7 Configuration and Desktop Support Technician

CEH: CERTIFIED ETHICAL HACKER v9

CRAW Security. CRAW Security

PMP (Project Management Professional)

MCTS: SQL Server 2008 Implementation and Maintenance

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.

MCSA: Windows 2012 Server

Certified Network Defender CND

MCITP: Windows Server 2008 R2, Virtualization Administrator

EC-Council. Program Brochure. EC-Council. Page 1

MCTS: Microsoft SQL Server 2008 Database Development

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Certified Ethical Hacker

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Certified Ethical Hacker (CEH)

CCNA Routing & Switching

MCTS:.NET Framework 4, Windows Applications Development

MCTS: Microsoft Exchange Server 2010

Certified Ethical Hacker V9

MCSA / MCSE: Windows 2012 Server Infrastructure

Course 831 Certified Ethical Hacker v9

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Support: HACK (4225)

MCTS:.NET Framework 4, Web Applications

CyberVista Certify cybervista.net

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

DIS10.1 Ethical Hacking and Countermeasures

A Passage to Penetration Testing!

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

CIPP/US (Certified Information Privacy Professional US Private-Sector)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

The CEH exam (312-50) is available at the ECC Exam Centre and Pearson Vue testing centers.

DIS10.1:Ethical Hacking and Countermeasures

Ceh V9 Certified Ethical Hacker Version 9 Kit

SQL Injection. Meganadha Reddy K. Technical Trainer NetCom Learning Meganadha Reddy K., 2015

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

MOS (Microsoft Office Specialist) Word-Excel- PowerPoint 2010

Ethical Hacking and Prevention

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Building the Cybersecurity Workforce. November 2017

Ethical Hacking CERTIFIED ETHICAL HACKER. Xpert Infotech is the registered trademark of Xperia Technologies Pvt. Ltd.

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

The fast track to top skills and top jobs in cyber. Guaranteed.

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

ITSY 2330 Intrusion Detection Course Syllabus

You Can Click at the enclosed Link to check out AATP Authorization:

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

C HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

C HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.

Principles of ICT Systems and Data Security

Ingram Micro Cyber Security Portfolio

Cybersecurity Employment SecureNinja

Instructor: Eric Rettke Phone: (every few days)

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

Ethical Hacking Foundation Exam Syllabus

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

CSWAE Certified Secure Web Application Engineer

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CERTIFICATION TRAINING - ISC2

CPTE: Certified Penetration Testing Engineer

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

A United States Cyber Academy Program

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Streamlined FISMA Compliance For Hosted Information Systems

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Cybersecurity Education for Enterprise Cloud Services

Industrial Control Systems November 18, 2015

Networking Fundamentals Training

Advanced Diploma on Information Security

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

SANS/REN-ISAC Partnership

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM

SY

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

DIS10.3:CYBER FORENSICS AND INVESTIGATION

.NET JAVA C ASE. Certified. Certified. Application Security Engineer.

Ethical Hacking Foundation Certification Training - Brochure

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

A Review Paper on Network Security Attacks and Defences

Transcription:

Certified Ethical Hacker - CEH v9 Training & Certification SecureNinja's CEH v9 (Certified Ethical Hacker) training and certification boot camp in Alexandria, VA, Dulles, VA and San Diego, CA will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. All of this will be done without harming any real network. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker v9 exam 312-50. What is New in the CEH v9? This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. The CEH v9 contains over 140 labs which mimic real time scenarios in the course to help you live through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As a picture tells a thousand words, the developers of the CEH v9 have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information 1 / 5

security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment, This course was desgined to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, To beat a hacker, you need to think like a hacker. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security. Topics Covered 1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Malware Threats 7. Sniffing 8. Social Engineering 9. Denial of Service 10. Session Hijacking 11. Hacking Web Servers 12. Hacking Web Applications 13. SQL Injection 14. Hacking Wireless Networks 15. Hacking Mobile Platforms 16. Evading IDS, Firewalls, and Honeypots 17. Cloud Computing 2 / 5

18. Cryptography Who Would Benefit Security Officers Auditors Network Administrators Firewall Administrators Security Professionals Anyone who is concerned about the integrity of the network infrastructure Prerequisites Strong knowledge of TCP/IP Information systems and security background Minimum of 12 months of experience in networking technologies CEH v9 Exam Info Number of Questions: 125 Passing Score: 70% Test Duration: 4 Hours Test Format: Multiple Choice Test Delivery: Prometric Prime / VUE / ECCEXAM CEH training at SecureNinja will properly prepare you for the following exams: Courseware 312-50 Certified Ethical Hacker (ANSI) Exam Code: 312-50 (ECC EXAM), 312-50 (VUE) 312-99 Certified Network Defense Architect (CNDA) Official Certified Ethical Hacker v9 Courseware Course Length 40 hours Legal Agreement Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. 3 / 5

Not anyone can be a student - the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies. CEH v9 Features 18 Modules 140 Labs 270 Slides Attack Technologies 2200 Hacking Tools Over 2200 graphicaly rich slides DoD Directive 8570.1-M CEH v9 meets Government and DoD agencies compliance with Federal Information Security Management Act (FISMA) and DoD Directive 8570.1-M The CEH v9 (312-50) Certification can only be taken by students who have completed the EC-Council-authorized training. Note also that members of the U.S. Federal Government may also take the Certified Network Defense Architect (CNDA) certification. The CNDA program has been designed especially for the United States Government and military agencies. To achieve the Certified Network Defense Architect Certification, you must pass the CNDA exam 312-99. US DOD Directive 8570 & Certified Ethical Hacker (CEH) The United States of America Department of Defense issued Directive 8570 in 2004 to mandate baseline certifications for all Information Assurance IA positions. In February of 2010, this directive was enhanced to include the Certified Ethical Hacker across its Computer Network Defense Categories CND. DOD Directive 8570 as stated by DIAP: DOD Directive 8570.01M Change 2 provides the basis for an enterprise-wide solution to train, certify, and manage the DoD Information Assurance (IA) workforce. Career Track & Roles Network Administrator Systems Administrator Systems Engineer Systems Architect Network Security Specialist Follow On Courses ECSA Wireless Security Computer Forensics Secure Ninja CEHv9 (Certified Ethical Hacker) now incorporates the latest CEH v9 version of the curriculum and Labs. 4 / 5

Powered by TCPDF (www.tcpdf.org) Web: www.secureninja.com About SecureNinja SecureNinja Training is the DC s Area s #1 Expert IT Training Center. We are conveniently located in beautiful Historic Old Town Alexandria, VA enhancing your training experience and featuring: Metro Accessibility - Short walk from Metro Blue/Yellow Line (leave the car behind) 4 minute Drive to Ronald Reagan Washington, DC National Airport Available Parking World class restaurants and shops at your footsteps Closest Expert IT & IT Security Training Center to Fort Belvoir, Boiling AFB, Fort Myer, Department of Homeland Security, US Department of Navy, US Coast Guard, Fort McNair, Washington Navy Yard and the Pentagon Why Choose SecureNinja for your Washington DC Expert IT Training? Expert Instructors Highest Pass Rates Choose from Day, Evening & Weekend Classes to meet your busy schedule Accelerated Boot Camps Save You Time And Money Paid Internships & Job Referrals! Meet Your DoD 8570-1 Certification Needs. Get Compliant! Secure Ninja is the ONLY Testing Center that offers ALL 5 industry standard test vendors in the DC / Baltimore Metropolitan Area. ( VUE, Kryterion-Online, Certiport and Impact-Testing) Lowest Prices! We are locally based keeping our overhead low so we can pass the savings along to you Washington, DC is our Home. Most training centers set up shop in hotels or rented centers. When you have a need, request or encounter a problem they are not there to answer. Our physical location in Alexandria is open 7 days a week and our staff always there to help. 5 / 5