CEH (V9) – Certified Ethical Hacker

Image

CEH (V9) - Certified Ethical Hacker

EC-Council's CEHv9 credential validates an IT security professional as a Penetration Tester or Ethical Hacker. Getting trained for CEHv9 reinforces the capabilities of an individual to safeguard enterprise networks against the innumerable vulnerabilities and threats of a network as well as thwart all attempts of illegal hacking by intruders.CEH V9 Certification is gaining popularity owing to an urgent need to secure information and networks from hackers. Loss of crucial business data has cost millions of dollars to enterprises worldwide. Therefore, in order to make networks safe, security professionals must be able to understand how unethical hackers cause security breaches by entering into a network.

Target Audience

Prior to attending our Certified Ethical Hacking(CEHv9) Course Training in Delhi, students should be familiar with:Strong knowledge of TCP/IPInformation systems and security backgroundMinimum of 12 months of experience in networking technology

Course Objectives

Understand a variety of hacking attacks and threats to the cloud computing technologySpecify various remedies to encounter cloud computing attacksUnderstand in-depth pen testing techniques to identify threats in cloud systemsExplore Heart bleed CVE-2014-0160, Shellshock CVE-2014-6271 and Poodle CVE-2014-3566Explore how to hack using mobile phonesLearn about latest virus, Trojan and Back doorsUnderstand information security controls, laws and standards  

Course Curriculum

Section 1: Introduction to Ethical Hacking
Information Security OverviewInformation Security Threats and Attack VectorsHacking Concepts, Types, and PhasesEthical Hacking Concepts and ScopeInformation Security Laws and Standards
Section 2: Foot printing and Reconnaissance
Footprinting ConceptsFootprinting MethodologyFootprinting ToolsFootprinting CountermeasuresFootprinting Penetration Testing
Section 3: Scanning Networks
Overview of Network ScanningCEH Scanning Methodology
Section 4: Enumeration
Enumeration ConceptsNetBIOS EnumerationSNMP EnumerationLDAP EnumerationNTP EnumerationSMTP EnumerationEnumeration CountermeasuresSMB Enumeration CountermeasuresEnumeration Pen Testing
Section 5: System Hacking
System Hacking: GoalsCEH Hacking Methodology (CHM)CEH System Hacking StepsCovering TracksPenetration Testing
Section 6: Malware Threats
Introduction to MalwareTrojan ConceptsTypes of TrojansVirus and Worms ConceptsMalware Reverse EngineeringCountermeasuresAnti-Malware SoftwarePenetration Testing
Section 7: Sniffing
Sniffing ConceptsMAC AttacksDHCP AttacksARP PoisoningSpoofing AttackDNS PoisoningSniffing ToolsCounter measuresNetwork Packet AnalyzerSniffing Pen Testing
Section 8: Social Engineering
Sniffing ConceptsMAC AttacksDHCP AttacksARP PoisoningSpoofing AttackDNS PoisoningSniffing ToolsCounter measuresNetwork Packet AnalyzerSniffing Pen Testing
[/su_spoiler]
Section 9: Denial-of-Service
DoS/DDoS ConceptsDoS/DDoS Attack TechniquesBotnetsDDoS Case StudyDoS/DDoS Attack ToolsCounter-measuresDoS/DDoS Protection ToolsDoS/DDoS Attack Penetration Testing
Section 10: Session Hijacking
Session Hijacking ConceptsApplication Level Session HijackingNetwork-level Session HijackingSession Hijacking ToolsCounter-measuresSession Hijacking Pen Testing
Section 11: Hacking Webservers
Webserver ConceptsWebserver AttacksAttack MethodologyWebserver Attack ToolsCounter-measuresPatch ManagementWebserver Security ToolsWebserver Pen Testing
Section 12: Hacking Web Applications
Web App ConceptsWeb App ThreatsWeb App Hacking MethodologyWeb Application Hacking ToolsCountermeasuresSecurity ToolsWeb App Pen Testing
Section 13: SQL Injection
SQL Injection ConceptsTypes of SQL InjectionSQL Injection MethodologySQL Injection ToolsEvasion TechniquesCounter-measures
Section 14: Hacking Wireless Networks
Wireless ConceptsWireless EncryptionWireless ThreatsWireless Hacking MethodologyWireless Hacking ToolsBluetooth HackingCounter-measuresWireless Security ToolsWi-Fi Pen Testing
Section 15: Hacking Mobile Platforms
Mobile Platform Attack VectorsHacking Android OSHacking iOSHacking Windows Phone OSHacking BlackBerryMobile Device Management (MDM)Mobile Security Guidelines and ToolsMobile Pen Testing
Section 16: Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot ConceptsIDS, Firewall and Honeypot SystemEvading IDSEvading FirewallsIDS/Firewall Evading ToolsDetecting HoneypotsIDS/Firewall Evasion Counter-measuresPenetration Testing
Section 17: Cloud Computing
Introduction to Cloud ComputingCloud Computing ThreatsCloud Computing AttacksCloud SecurityCloud Security ToolsCloud Penetration Testing 
Section 18: Cryptography
Market Survey 2014: The Year of EncryptionCase Study: HeartbleedCase Study: PoodlebleedCryptography ConceptsEncryption AlgorithmsCryptography ToolsPublic Key Infrastructure(PKI)Email EncryptionDisk EncryptionCryptography AttacksCryptanalysis Tools