CEH-Certified Ethical Hacker: Required Prerequisites

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CEH-Certified Ethical Hacker

Required Prerequisites: Firm understanding of the Windows Operating System Exposure to the Linux Operating System or other Unix-based OS Grasp of the TCP/IP protocols Desire to learn about the hacking and network security profession, stay ethical, and get great security training!

The CEH Program : Ethical Hacking and Countermeasurers The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Course Description:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Course Objectives: Developing the hacker's mind. Network surveying. Port scanning. System identification/OS fingerprinting. Vulnerability research and verification. Service identification. Internet application testing. Document grinding. Recognizing security issues within an organization. Performing legal assessments on remote/foreign networks. Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor. Implementing the right tools for each task of the Methodology Competitive Intelligence. Exploiting vulnerabilities remotely. Examining appropriate countermeasures to thwart malicious hacking.

Course Outlines: Module 1: Introduction to Ethical Hacking Module 2: Foot printing Module 3: Google Hacking Module 4: Scanning Module 5: Enumeration Module 6: System Hacking Module 7: Trojans and Backdoors Module 8: Viruses and Worms Module 9: Sniffers Module 10: Social Engineering Module 11: Phishing Module 12: Hacking Email Accounts Module 13: Denial-of-Service Module 14: Session Hijacking Module 15: Hacking Web Servers Module 16: Web Application Vulnerabilities Module 17: Web-Based Password Cracking Techniques Module 18: SQL Injection

Module 19: Hacking Wireless Networks Module 20: Physical Security Module 21: Linux Hacking Module 22: Evading IDS, Firewalls and Detecting Honey Pots Module 23: Buffer Overflows Module 24: Cryptography

You might also like