Description
The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems.
You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, noย real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.
When you leave this intensive 5 day boot camp you will have hands on understanding and experience in Ethical Hacking.
The CEHย boot camp incorporates EC Councilย Official Courses:
312-50 ย Certified Ethical Hacker
Topics Covered in this Official Boot Camp:
Introduction to Ethical Hacking
Information security overview
Information security threats and attack vectors
Hacking concepts
Ethical hacking concepts
Information Security Controls
Penetration testing concepts
Information security laws and standards
Footprinting and Reconnaissance
Footprinting concepts
Footprinting through search engines
Footprinting through web services
Footprinting through social networking sites
Website footprinting
Email footprinting
Competitive Intelligence
WHOIS Footprinting
DNS footprinting
Network footprinting
Footprinting through social engineering
Footprinting tools
Countermeasures
Footprinting pen testing
Scanning Networks
Network scanning concepts
Scanning tools
Scanning techniques
Scanning beyond IDS and firewall
Banner grabbing
Draw network diagrams
Scanning pen test
Enumeration
Enumeration concepts
NetBIOS enumeration
SNMP enumeration
LDAP enumeration
NTP enumeration SMTP and DNS enumeration
Other enumeration techniques
Enumeration countermeasures
Enumeration pen testing
Vulnerability Analysis
Vulnerability assessment concepts
Vulnerability assessment solutions
Vulnerability scoring systems
Vulnerability assessment tools
Vulnerability assessment reports
System Hacking
System hacking concepts
Cracking passwords
Escalating privileges
Executing applications
Hiding files
Covering tracks
Penetration testing
Malware Threats
Malware concepts
Trojan concepts
Virus and worm concepts
Malware analysis
Countermeasures
Anti-malware software
Malware penetration testing
Sniffing
Sniffing concepts
Sniffing techniques: MAC attacks
Sniffing techniques: DHCP attacks
Sniffing techniques: ARP Poisoning
Sniffing techniques: Spoofing attacks
Sniffing techniques: DNS poisoning
Sniffing tools
Countermeasures
Sniffing detection techniques
Sniffing pen testing
Social Engineering
Social engineering concepts
Social engineering techniques
Insider threats
Impersonation on social networking sites
Identity theft
Countermeasures
Social engineering pen testing
Denial of Service
DoS/DDos Concepts
DoS/DDoS attack techniques
Botnets
DDoS case study
DoS/DDoS attack tools
Countermeasures
DoS/DDos protection tools
DoS/DDoS penetration testing
Session Hijacking
Session hijacking concepts
Application level session hijacking
Network level session hijacking
Session hijacking tools
Countermeasures
Penetration testing
Evading IDS, Firewalls, and Honeypots
IDS, firewall and honeypot concepts
IDS, firewall and honeypot solutions
Evading IDS
Evading firewalls
IDS/firewall evading tools
Detecting honeypots
IDS/Firewall evasion countermeasures
Penetration testing
Hacking Webservers
Web server operations
Web server attacks
Web server attack methodology
Web server attack tools
Countermeasures
Patch management
Web server security tools
Web server pen testing
Hacking Web Applications
Web app concepts
Web app threats
Hacking methodology
Web app hacking tools
Countermeasures
Web app security testing tools
Web app pen testing
SQL Injection
SQL injection concepts
Types of SQL injection
SQL injection methodology
SQL injection tools
Evasion techniques
Countermeasures
Hacking Wireless Networks
Wireless concepts
Wireless encryption
Wireless threats
Wireless hacking methodology
Wireless hacking tools
Bluetooth hacking
Countermeasures
Wireless security tools
Wireless pen testing
Hacking Mobile Platforms
Mobile platform attack vectors
Hacking Android OS
Hakcing iOS
Mobile spyware
Mobile device management
Mobile security guidelines and tools
Mobile pen testing
IoT and OT Hacking
IoT and OT concepts
IoT and OT attacks
IoT and OT hacking methodology
IoT and OT hacking tools
Countermeasures
IoT and OT pen testing
Cloud Computing
Cloud computing concepts
Cloud computing threats
Cloud computing attacks
Cloud security
Cloud security tools
Cloud penetration testing
Cryptography
Cryptography concepts
Encryption algorithms
Cryptography tools
Public key infrastructure (PKI)
Email encryption
Disk encryption
Cryptanalysis Countermeasures
CEH Training Exam Review
CEH Exam Structure
Exam Registration Process
Time Management
Topics and Concepts
CEH Certification Question Structure
Vendor Interpretation Techniques