Certified Ethical Hacker

Course Code: IT23

►Course Objective

  • Describe how perimeter defenses function by ethically scanning and attacking networks
  • Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
  • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
  • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
  • Create policies and apply countermeasures against social engineering, Distributed Denial-of Service (DDoS) attacks, buffer overflows, and virus creation
  • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computer

 

►Target Audience

  • IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

 

►Course Outline

Day 1

  • Introduction to Ethical Hacking
  • Short History of hacking
  • Current developments
  • Evolution and growth
  • What is an “Ethical” Hacker
  • Types of hackers

Day 2

  • Hacking methodologies
  • Key issues plaguing the information security world
  • Penetration testing
  • System fundamentals
  • Incident management processes
  • Identifying the systems at risk
  • Wireless networking
  • Mobile platform security guidelines
  • Mobile platform security tools

Day 3

  • Web servers
  • Web applications
  • Footprinting tools
  • Footprinting reconnaissance
  • Scanning networks
  • Enumeration of services
  • System hacking techniques and countermeasures
  • Types of Trojans
  • Working of viruses
  • Computer worms
  • Covert channels
  • Sniffers
  • Social engineering

Day 4

  • Denial of Service (DoS)
  • Cryptography
  • Public Key Infrastructure (PKI)
  • Cryptanalysis tools
  • Hacking your own system
  • Gaining access to a system
  • Session hijacking
  • Wireless hacking tools

Day 5

  • Hacking mobile platforms
  • Structured Query Language (SQL) injection
  • Evading an Intrusion Detection System (IDS)
  • Firewalls
  • Honeypots
  • Penetration testing
  • Types of penetration testing
  • Vulnerability assessment
  • Penetration testing roadmap


Register for this course


Date & Location

Date : 17 February 2019

Duration : 5 days

Place : Dubai

Join This Course Now

Date : 21 July 2019

Duration : 5 days

Place : Istanbul

Join This Course Now

Date : 27 October 2019

Duration : 5 days

Place : Kuala Lumpur

Join This Course Now

download the Course file