print
Course Name
Certified Ethical Hacker (CEH)

Contact Hours: 40

Course Description
The training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Please note: Course of study may be completed earlier than indicated and students retain access for one year from the date of enrollment.


Outcome
CEH training Objectives:
  • Students are able to apply countermeasure to secure organization’s system against threats and attacks
  • Students are able to test the access to organizational data using ethical hacking techniques
  • Students are able to implement real-world hacking techniques to test the security of organization’s system
  • Students are able to employ complex tools to identify and analyze your company’s risks and weaknesses
  • Students are able to uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures


Assessment
Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Required Book(s)
All training is delivered online; no additional purchase required.

Outline
Module 1: Intro

        1.1 Intro - Part 1
        1.2 Intro - Part 2
        1.3 Intro - Part 3
        1.4 Intro - Part 4
        1.5 Intro - Part 5
        1.6 Intro - Part 6
        1.7 Intro - Part 7
        1.8 Intro - Part 8
        1.9 Intro - Part 9
        1.10 Intro - Part 10
        1.11 Pretest - Intro
        1.12 Questions
        1.13 Pretest - Summary
        1.14 Intro to Ethical Hacking - Part 1
        1.15 Intro to Ethical Hacking - Part 2
        1.16 Intro to Ethical Hacking - Part 3
        1.17 Intro to Ethical Hacking - Part 4
        1.18 Intro to Ethical Hacking - Part 5
        1.19 Intro to Ethical Hacking - Part 6
        1.20 Intro to Ethical Hacking - Part 7
        1.21 Intro to Ethical Hacking - Part 8
        1.22 Intro to Ethical Hacking - Part 9

Module 2: Foot printing & Reconnaissance
       
        2.1 Foot printing & Reconnaissance - Part 1
        2.2 Foot printing & Reconnaissance - Part 2
        2.3 Foot printing & Reconnaissance - Part 3
        2.4 Foot printing & Reconnaissance - Part 4
        2.5 Foot printing & Reconnaissance - Part 5
        2.6 Foot printing & Reconnaissance - Part 6
        2.7 Foot printing & Reconnaissance - Part 7
        2.8 Foot printing & Reconnaissance - Part 8
        2.9 Foot printing & Reconnaissance - Part 9

Module 3: Scanning Networks
       
        3.1 Scanning Networks - Part 1
        3.2 Scanning Networks - Part 2
        3.3 Scanning Networks - Part 3
        3.4 Scanning Networks - Part 4

Module 4: Enumeration
       
        4.1 Enumeration - Part 1
        4.2 Enumeration - Part 2
        4.3 Enumeration - Part 3
        4.4 Enumeration - Part 4
        4.5 Enumeration - Part 5

Module 5: System Hacking

        5.1 System Hacking - Part 1
        5.2 System Hacking - Part 2
        5.3 System Hacking - Part 3
        5.4 System Hacking - Part 4
        5.5 System Hacking - Part 5

Module 6: Trojans & Backdoors

        6.1 Trojans & Backdoors - Part 1
        6.2 Trojans & Backdoors - Part 2
        6.3 Trojans & Backdoors - Part 3

Module 7: Viruses & Worms

        7.1 Viruses & Worms - Part 1
        7.2 Viruses & Worms - Part 2
        7.3 Viruses & Worms - Part 3
        7.4 Viruses & Worms - Part 4
        7.5 Viruses & Worms - Part 5
        7.6 Viruses & Worms - Part 6

Module 8: Denial of Service

        8.1 Denial of Service - Part 1
        8.2 Denial of Service - Part 2
        8.3 Denial of Service - Part 3
        8.4 Denial of Service - Part 4

Module 9: Social Engineering

        9.1 Social Engineering - Part 1
        9.2 Social Engineering - Part 2
        9.3 Social Engineering - Part 3
        9.4 Social Engineering - Part 4

Module 10: Snffers

        10.1 Snffers - Part 1
        10.2 Snffers - Part 2
        10.3 Snffers - Part 3
        10.4 Snffers - Part 4
        10.5 Snffers - Part 5
        10.6 Snffers - Part 6

Module 11: Session Hijacking

        11.1 Session Hijacking - Part 1
        11.2 Session Hijacking - Part 2
        11.3 Session Hijacking - Part 3
        11.4 Session Hijacking - Part 4
        11.5 Session Hijacking - Part 5
        11.6 Session Hijacking - Part 6
        11.7 Session Hijacking - Part 7

Module 12: Hacking Web Servers

        12.1 Hacking Web Servers - Part 1
        12.2 Hacking Web Servers - Part 2
        12.3 Hacking Web Servers - Part 3
        12.4 Hacking Web Servers - Part 4
        12.5 Hacking Web Servers - Part 5

Module 13: Web Application Vulnerabilities

        13.1 Web Application Vulnerabilities - Part 1
        13.2 Web Application Vulnerabilities - Part 2
        13.3 Web Application Vulnerabilities - Part 3
        13.4 Web Application Vulnerabilities - Part 4

Module 14: SQL Injection

        14.1 SQL Injection - Part 1
        14.2 SQL Injection - Part 2
        14.3 SQL Injection - Part 3

Module 15: Hacking Wireless Networks

        15.1 Hacking Wireless Networks - Part 1
        15.2 Hacking Wireless Networks - Part 2
        15.3 Hacking Wireless Networks - Part 3
        15.4 Hacking Wireless Networks - Part 4
        15.5 Hacking Wireless Networks - Part 5

Module 16: Evading IDS, Firewalls & Honeypots

        16.1 Evading IDS, Firewalls & Honeypots - Part 1
        16.2 Evading IDS, Firewalls & Honeypots - Part 2
        16.3 Evading IDS, Firewalls & Honeypots - Part 3

Module 17: Buffer Overflows

        17.1 Buffer Overflows - Part 1
        17.2 Buffer Overflows - Part 2
        17.3 Buffer Overflows - Part 3
        17.4 Buffer Overflows - Part 4
        17.5 Buffer Overflows - Part 5

Module 18: Cryptography & Steganography

        18.1 Cryptography & Steganography - Part 1
        18.2 Cryptography & Steganography - Part 2
        18.3 Cryptography & Steganography - Part 3
        18.4 Cryptography & Steganography - Part 4
        18.5 Cryptography & Steganography - Part 5
        18.6 Cryptography & Steganography - Part 6
        18.7 Cryptography & Steganography - Part 7

Module 19: Metasploit for Penetration Testing

        19.1 Metasploit for Penetration Testing - Part 1
        19.2 Metasploit for Penetration Testing - Part 2
        19.3 Metasploit for Penetration Testing - Part 3
        19.4 Metasploit for Penetration Testing - Part 4
        19.5 Metasploit for Penetration Testing - Part 5
        19.6 Metasploit for Penetration Testing - Part 6
        19.7 Metasploit for Penetration Testing - Part 7
        19.8 Business Process - Part 1
        19.9 Business Process - Part 2
        19.10 Business Process - Part 3
        19.11 Business Process - Part 4
        19.12 Business Process - Part 5
        19.13 Business Process - Part 6
        19.14 Lab Suggestions