CEH TRAINING COURSE INTRODUCTION:
CEH Training by EC-Council is the most comprehensive course for the network security professionals. Certified Ethical Hacker Credentials an IT security professional as a penetration tester or ethical hacker. Getting trained for CEH reinforces the capabilities of an individual to safeguard enterprise networks against the innumerable vulnerabilities.
Global Online Trainings offers CEH Training with in-depth knowledge and practical experience with the current essentials security systems. Participates will begin by understanding how perimeter defenses work and then will be led into scanning and attacking their own networks. And also learn how intruders operate and the steps to secure a system.
- Attendees should have a working knowledge of Linux and strong Microsoft Windows skills.
CEH ONLINE TRAINING COURSE CONTENT
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Malware Threats
Module 07: Sniffing
Module 08: Social Engineering
Module 09: Denial of Service
Module 10: Session Hijacking
Module 11: Hacking Webservers
Module 12: Hacking Web Applications
Module 13: SQL Injection
Module 14: Hacking Wireless Networks
Module 15: Hacking Mobile Platforms
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Cloud Computing
Module 18: Cryptography
CERTIFIED ETHICAL HACKER TRAINING COURSE CONTENT
Introduction to CEH Training
- Security 101
- Basic Networking
- Security Essentials
- Introduction to Ethical Hacking
- Hacking Terminology
- The Ethical Hacker
Reconnaissance: Information Gathering
- Getting Started
- Vulnerability Research
- Passive Footprinting
- Active Footprinting
- DNS Footprinting
- Determining Network Range
- Google Hacking
- Footprinting Tools
Scanning and Enumeration
- Scanning Fundamentals
- Scanning Methodology
- The TCP Handshake
- Identifying Targets
- Port Scanning
- Windows System Basics
- Enumeration Techniques
Sniffing and Evasion
- How It All Works
- Passive and Active Sniffing
- Sniffing Tools and Techniques
- Other Tools
Attacking a System
- Getting Started
- Windows Security Architecture
- Linux Security Architecture
- Cracking Passwords
- Passwords 101
- Password Attacks
- Privilege Escalation & Executing Applications
- Privilege Escalation
- Executing Applications
- Hiding Files and Activity
- Covering Your Tracks
Web-Based Hacking: Servers & Applications
- Attacking Web Servers
- Web Server Architecture
- Attack Methodology
- Web Server Attacks
- Attacking Web Applications
- Web Application Architecture
- Application Attacks
- SQL Injection
Wireless Network Hacking
- Wireless 101
- Wireless Architecture and Standards
- Finding and Identifying the Wireless Networks
- Wireless Hacking
- Wireless Attacks
- Mobile Platform Attacks
Trojans and Other Attacks
- “Malware” Attacks
- Trojans, Backdoors, Viruses, and Worms
- Remaining Attacks
- Denial of Service
- Session Hijacking
CEH Training Cryptography
- Cryptography & Encryption Overview
- Encryption Algorithms & Techniques
- PKI, the Digital Certificate, and Digital Signatures
- The PKI System
- Digital Certificates
- Digital Signatures
- Encrypted Communication & Cryptography Attacks
- Data Encryption: At Rest and While Communicating
- Cryptography Attacks
Social Engineering & Physical Security
- Social Engineering
- Human Based Attacks
- Computer-Based Attacks
- Mobile Based Attacks
- Physical Security
The Penetration Test
- Methodology and Steps
- Security Assessment
- Security Assessment Deliverables
What is CEH?
The CEH (Certified Ethical Hacker) is an intermediate level credential offered by the International Council of Electronic Commerce Consultants (EC-Council). It’s a must have for IT professionals pursuing careers in ethical hacking. CEH training credentials holders posses skills and knowledge on hacking practices in the areas such as foot printing and reconnaissance , scanning networks, enumeration, system hacking, Trojan, worms and viruses, sniffers, denial of the service attacks, social engineering, session hijacking, hacking web services, wireless networks & web applications, SQL injection, cryptography , penetration testing, evading IDS, firewall , honey pots and more.
Objectives for CEH Training:
- Penetrate into network systems using various to test the strength of a network.
- In this Certified Ethical Hacker training you will learn how to test, hack and secure networks and systems in this CEH training program.
- Get in-depth theoretical knowledge of a certified ethical hacking training and rich practical experience in hacking test networks.
- Learn perimeter defenses to scan & attack own networks.
- Learn various techniques such as intrusion Detection, Social Engineering, Policy Creation , Buffer Overflows , DDoS Attacks, Virtual creation etc.
- Understand a variety of hacking attacks and threats to the computing technology in this ethical hacking course.
- Specify various remedies to encounter cloud computing attacks.
- Understanding in-depth pen testing techniques to identify threats in cloud systems.
- Explore how to hack using mobile phones.
- In this CEH training you will learn about latest virus, Trojan and back-doors.
- Understand information security controls, laws, and standards in this hacking training.
CEH Training Overview:
The Certified Ethical Hacker Training program is the high point of the most preferred information security training program which all information security professional will ever want to be in. In order to be master of the hacking technologies , you will need to become Hacker, but an ethical one with white cap. The CEH accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals aims to break into an organization.
CEH online training course will bring you into the hacker mode so that will be able to defend future IT attacks. The security mind-set in any organization must not be limited to a certain vendor or technologies. This ethical hacking course can puts you with a hands-on environment with a systematic process. In this course you will be taught five phases of ethical hacking and different ways to approach your target system and succeed at breaking in predefined time. These five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access and covering your tracks. The Hacking tools and techniques in each of these five phases are proved in brief you identify when an attack has been used against your own targets.
Encryption Algorithms (CEH Training):
- Encryption algorithms can be divided into symmetric, asymmetric, and hashing algorithms. In CEH training each has different methods, strengths, weaknesses, and uses.
- Algorithms can also be divided into streaming or block ciphers, and are used various applications.
- Some algorithms are considered weak or broken, and are not typically used. These algorithms and their implementation methods are what hacker’s target.
- Encryption strengths is based upon two key factors: key strength and algorithm strength.
- Key strength relates to length and complexity of key.
- Algorithms strength relates to mathematical complexity of algorithm.
- There are also weaknesses and strengths of the various methods algorithms are implemented.
- Algorithms can be divided in symmetric, asymmetric, and hashing, and can also be block or streaming algorithms.
Public Key Cryptography:
- Public Key cryptography uses asymmetric encryption methods and algorithms and requires a pair of related keys.
- In CEH training the Public Key Cryptography used to encrypt, digitally sign, and verify data sent over networks or the internet – users public and private keys to encrypt and digitally sign messages.
- Can also be used to securely send symmetric or session keys – hybrid solutions.
- Public Key: Encryption key that is kept secure and never transmitted.
- Public key encrypts a message, but only private can decrypt anyone can encrypt a message to you, but only you can decrypt it.
- To digitally sign message, the reverse happens:
- Private key encrypts a hash or digest of the message , and the public key decrypts.
- Since only you possess the private key, it is considered “signed” by you and authentic.
- Public keys have to be reliably distributed prove they are tied to a valid private key.
- Distributed certification is issued from a trusted source that verifies the identity of the user and its connection to their private key.