Upload
others
View
19
Download
0
Embed Size (px)
Citation preview
Page
s 1
Page
s 1
CEH- Certified Ethical Hacker
Duration- 5 days
Course Overview
CEH program is the peak of the most preferred informa-tion security training pro-gram any information se-curity professional will want to be into. This course will enlighten you on how to un-
derstand Information Secu-rity Threats and Attack Vec-tors. It will immerse you into the Hacker Mindset for you to be able to defend against future attack.
The CEH course is which helps you master hacking technologies. You will be-come not just a hacker, but an ethical one!
What you will learn.
• Network scanning• Enumeration• Packet sniffing• Social Engineering• DoS/DDoS attacks• Session hijacking• SQL injection attacks
Page
s 2
sionals involved with informa-tion system security.
• Security officers• Auditors• Security professionals• Site administrators
Prerequisites
There are no specific pre-requi-sites. By the way, some appre-ciation of the ideas and princi-ples of services may be useful.
COURSE OUTLINES
Module 01: Introduction to Ethi-cal HackingModule 02: Footprinting and Re-connaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability Analy-sisModule 06: System HackingModule 07: Malware ThreatsModule 08: Sniffing
• Wireless encryption• Cryptography ciphers• Penetration testing• Footprinting• Webserver and web appli-
cation attacks and counter-measures
• Cloud computing threats
Who is this course for?
The course is for an IT profes-
Page
s 3
Module 09: Social EngineeringModule 10: Denial-of-ServiceModule 11: Session HijackingModule 12: Evading IDS, Firewalls, and HoneypotsModule 13: Hacking Web ServersModule 14: Hacking Web Appli-cations
Module 15: SQL InjectionModule 16: Hacking Wireless Net-worksModule 17: Hacking Mobile Plat-formsModule 18: IoT HackingModule 19: Cloud ComputingModule 20: Cryptography