Certified Ethical Hacker V7 Full Course
What is an ethical hacking?
To beat a hacker, you need to think like one!Ethical Hacking is often referred to as the process of penetrating one’s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place.
Become a Certified Ethical Hacker
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.The purpose of the CEH credential is to:
· Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.· Inform the public that credentialed individuals meet or exceed the minimum standards.· Reinforce ethical hacking as a unique and self-regulating profession.
Certification Target Audience
The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Course Description
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Who Should Attend
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Certification
The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional).Students need to pass the online Prometric exam to receive CEH certification.
Legal Agreement
Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this Course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use.
Course Outline Version 7 (15GB Useful Data)
CEHv7 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of selfstudy modules to the students beginning of the class.
#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*#*
Miscellaneous
DVD1:
CEHv7 Lab Prerequisites
CEHv7 Module 02 Footprinting and Reconnaissance
CEHv7 Module 03 Scanning Networks
CEHv7 Module 04 Enumeration
CEHv7 Module 05 System Hacking
DVD2:
CEHv7 Module 06 Trojans and Backdoors
CEHv7 Module 07 Viruses and Worms
CEHv7 Module 08 Sniffers
CEHv7 Module 09 Social Engineering
CEHv7 Module 10 Denial of Service
CEHv7 Module 11 Session Hijacking
DVD3:
CEHv7 Module 12 Hacking Webserver
CEHv7 Module 13 Hacking Web Applications
CEHv7 Module 14 SQL Injection
DVD4:
CEHv7 Module 15 Hacking Wireless Networks
CEHv7 Module 16 Evading IDS, Firewalls and Honeypots
CEHv7 Module 17 Buffer Overflows
CEHv7 Module 18 Cryptography
CEHv7 Module 19 Penetration Testing
No comments:
Post a Comment