Certified Ethical Hacker V10
Classroom exam prep course
Training Deals
Summary
Online
PO Booking
Telephone
E-Commerce
- Exam(s) / assessment(s) not included in price, and must be purchased separately
- Tutor is available to students
Location & dates
Ardwick
MANCHESTER
Lancashire
M124JD
United Kingdom
LONDON
London
E1W1YZ
United Kingdom
Overview
Module 1: Introduction to Ethical Hacking
Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
- Information Security Overview
- Case Studies - eBay Data Breach & Google Play Hack
- Information Security Threats and Attack Vectors
- Hacking Concepts, Types, and Phases
- Ethical Hacking Concepts and Scope
- Motives, Goals and Objectives of IS Attacks
- Information Security Controls
- Physical Security
- Incident Management
- What is Vulnerability Assessment?
- Penetration Testing
- Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts
- What is Footprinting?
- Footprinting Methodology
- Collect Location Information
- Detemrining the Oepratinig System
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Penetration Testing
Module 3 : Scanning Networks
- Overview of Network Scanning
- CEH Scanning Methodology
- TCP Communication Flags
- Creating Custom Packet Using TCP Flags
Module 4: Enumeration
- Enumeration Concepts
- What is Enumeration?
- NetBIOS Enumeration
- SNMP Enumeration
- SNMP Enumeration Tools
- LDAP Enumeration
- NTP Enumeration
- SMTP Enumeration
- Enumeration Countermeasures
- SMB Enumeration Countermeasures
- Enumeration Pen Testing
Module 5: System Hacking
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- CEH Hacking Methodology (CHM)
- CEH System Hacking Steps
- Hiding Files
- Covering Tracks
- Penetration Testing
Module 6: Malware Threats
- Introduction to Malware
- Trojan Concepts
- Types of Trojans
- Virus and Worms Concepts
- Malware Reverse Engineering
- Countermeasures
- Anti-Malware Software
- Penetration Testing
Module 7: Sniffing
- Sniffing Concepts
- MAC Attacks
- DHCP Attacks
- ARPPoisoning
- Spoofing Attack
- DNS Poisoning
- Sniffing Tools
- Sniffing Tool: Wireshark
- Follow TCP Stream in Wireshark
- Display Filters in Wireshark
- Additional Wireshark Filters
- Packet Sniffing Tool: Capsa Network Analyzer
- Network Packet Analyzer
- Counter measures
- Sniffing Detection
- Sniffing Pen Testing
Module 8: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- Penetration Testing
Module 9: Denial-of-Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Tools
- Counter-measures
- DoS/DDoS Protection Tools
- DoS/DDoS Attack Penetration Testing
Module 10: Session Hijacking
- Session Hijacking Concepts
- Application Level Session Hijacking
- Network-level Session Hijacking
- Session Hijacking Tools
- Counter-measures
- Session Hijacking Pen Testing
Module 11: Hacking Webservers
- Webserver Concepts
- Webserver Attacks
- Attack Methodology
- Webserver Attack Tools
- Counter-measures
- Patch Management
- Webserver Security Tools
- Webserver Pen Testing
Module 12: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Web App Hacking Methodology
- Web Application Hacking Tools
- Countermeasures
- Security Tools
- Web App Pen Testing
- Web Application Pen Testing Framework
Module 13: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Counter-measures
Module 14: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Counter-measures
- Wireless Security Tools
- Wi-Fi Pen Testing
Module 15: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Hacking Windows Phone OS
- Hacking BlackBerry
- Mobile Device Management (MDM)
- Mobile Security Guidelines and Tools
Certification
Certified Ethical Hacker (CEH)
Course media
Description
As the world's largest cyber-security training provider, our proven interactive training methods ensure that your business's systems are secure, responsive, and impenetrable.
Our market-leading EC-Council accredited course includes interactive lab testing environments and hands-on system deployments to fully equip skilled professionals to instinctively diagnose and overcome system weaknesses.
System hacks are becoming more and more frequent - hence the requirement for businesses to transform their security platforms has never been more paramount. This detailed, meticulous, and world-leading course educates Certified Ethical Hackers on how to enhance their structural capability to protect against malicious intrusions. Upon the completion of this course, professionals will be fully prepared to adapt vulnerable and weak systems into digital-forensic market leaders.
This Certified Ethical Hacker v10 course transmits the most up-to-date system protection information. CEH v10 is the updated version of CEH v9, providing delegates with the most current and necessary material that allows them to secure against system intrusions and costly breaches. Individuals will be launched into the world of hacking, by applying mechanisms and methods used by illegal hackers for the enhancement of security.
CEH v10 will teach delegates about the different types of hacking, and how to implement ethical hacking techniques to prohibit the assaults of illegal hackers via unauthorised system infrastructures. Delegates will learn how to scan, test, hack, and defend their security systems from infiltration. In addition, individuals will learn about the five domains of ethical hacking, which act as a basis for their activities.
Adopting the mentality of an illegal hacker is valuable in identifying weaknesses within security systems and becoming aware of the areas illegal hackers may target. Certified Ethical Hacker v10 is taught within an interactive environment, to provide individuals with essential practical skills to improve security and prevent intrusions.
Who is this course for?
Certified Ethical Hacker v10 is designed for:
- Security Officers
- Security Professionals
- Auditors, Site Administrators
- Professionals involved in network infrastructure stability
Requirements
No prior certifications are required, but delegates will thrive if they possess experience or knowledge of:
- Network Security Administration,
- MCSE (Microsoft Certified Systems Engineer)
- CCNA (Cisco Certified Network Associate)
Due to the intensity of the Certified Ethical Hacker v10 training course, delegates may need to engage in self-study each evening to ensure they are comfortable with the knowledge they acquire in the day.
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.