Course name:
Certified Ethical Hacker (CEH)
Description:
The Certified Ethical Hacker(CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities.
Duration:
40 Hours
Audience:
Information Security Professionals, Auditors
Prerequisites:
Information Security Knowledge
Course outline:
<p class="heading1-text" style="margin: 0in 0in 7.5pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; color: #333333;">The Certified Ethical Hacker(CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.</span></p> <p class="heading1-text" style="margin: 0in 0in 7.5pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; color: #333333;">Learning Objective</span></p> <p><span style="color: #333333; font-family: Verdana, sans-serif;">Students will learn to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities.</span></p> <p>Outline</p> <p>Module 1: Intro to Course</p> <p>Module 2: Foot printing and Reconnaissance</p> <p>Module 3: Scanning Networks</p> <p>Module 4: Enumeration</p> <p>Module 5: System Hacking</p> <p>Module 6: Trojans and Backdoors</p> <p>Module 7: Viruses and Worms</p> <p>Module 8: Denial of Service</p> <p>Module 9: Social Engineering</p> <p>Module 10: Sniffers</p> <p>Module 11: Session Hijacking</p> <p>Module 12: Hacking Webservers</p> <p>Module 13: Hacking Web Applications</p> <p>Module 14: SQL Injection</p> <p>Module 15: Hacking Wireless Networks</p> <p>Module 16: Evading IDS Firewalls and Honeypots</p> <p>Module 17: Buffer Overflow</p> <p>Module 18: Cryptography</p> <p>&nbsp;</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 19: Penetration Testing</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.