Hacking involves creativity and thinking 'outside-of-the-box', that is why vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of 'defence in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.
The goal of the Ethical Hacking & Countermeasures Course is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Delegates should be prepared for action paced course and the sheer size of the course content, however do not be intimidated as we will release e-learning prior to the delegate attending the course and also the instructor will prepare them thoroughly for the Certification Examination, the maunuals can then be taken home and to work and can be used as excellent reference volumes.
EC-Council Certified Ethical Hacker Certification: EC-Council has successfully certified more than a thousand information security professionals. CEH examination is becoming more demanding and more effective in measuring the true skills of a Penetration tester. Students are now required to be able to interpret identify exploits, log files, identify attack signatures, recommend countermeasures, have a firm grasp of the main tools and know standard procedures involved in penetration testing. The student is tested on 150 questions picked randomly from a pool of questions contributed by the security community. Our Pass rate to date is 98%
Who Should Attend? This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network and enterprise security.
Module 1: Introduction to Ethical Hacking
- Why Security?
- The Security, functionality and ease of use Triangle
- Can Hacking be Ethical?
- Defining Footprinting
- Definition of Scanning.
- Types of scanning
- What is Enumeration?
- NetBios Null Sessions
- Administrator Password Guessing
- Manual Password Cracking Algorithm
- Automated Password Cracking
- Effect on Business
- What is a Trojan?
- Definition of sniffing
- How a Sniffer works?
- What is Denial of Service?
- Goal of DoS(Denial of Service)
- What is Social Engineering?
- Art of Manipulation
- Understanding Session Hijacking
- Spoofing vs Hijacking
- How Web Servers Work?
- How are Web Servers Compromised?
- Web Application Set-up
- Web Application Hacking
- Authentication- Definition
- Authentication Mechanisms
- HTTP Authentication
- Attacking SQL Servers
- SQL Server Resolution Service (SSRS)
- Introduction to Wireless Networking
- Business and Wireless Attacks
- Virus Characteristics
- Symptoms of 'virus-like' attack
- Security statistics
- Physical Security breach incidents
- Why Linux?
- Linux basics
- Intrusion Detection Systems
- Ways to Detect Intrusion
- Significance of Buffer Overflow Vulnerability
- Why are Programs/Applications Vulnerable?
- Public-key Cryptography
- Working of Encryption
- Introduction to Penetration Testing (PT)
Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques
Module 26: Advanced Reverse Engineering Techniques