CEH Certification Training and Exam Prep

Certified Ethical Hacker

In this award-winning training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH) exam, and an in-depth understanding of how to deploy tools and techniques needed to protect your network. Included in your course tuition is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

COURSE TYPE

Intermediate

NUMBER

0121

DURATION

5 Days

You Will Learn How To

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyze your company’s risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Important Course Information

Recommended Experience:

  • Two years of security-related experience and a strong practical working knowledge of TCP/IP

Exam Information:

  • This course includes a voucher to take the CEH exam via ProctorU
  • You can request your voucher from Learning Tree at any time after you complete the course

Certification Information:

  • This is an EC-Council certification prep course.

Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking

  • Reviewing the elements of information security
  • The security, functionality and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analyzing Trojan activity

Dissecting viruses, worms and sniffers

  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

  • Cross–Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks

Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

How to Attend This Instructor Led Training

Free-Enrollment – No advance payment is required to book your seat for this training. Payment can be made a day before the training.

In the Classroom

Private/Team

0809 210 2900

hi@vsonetedu.com

Training Schedules

January 2018: Jan 22 to Jan 26 – 9 am to 5.30 pm

February 2018: Feb 12 to Feb 16 – 9 am to 5.30 pm

Tuition

Standard: Was ₦ 1,200,000 Now ₦ 700,000

Corporate: Contact Us >>

What You Will Get

  • Course Ware
  • Daily Lunch
  • Free Course Exam