This course is a comprehensive ethical hacking and information systems security assessment program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.
The course also focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure. It addresses latest development in mobile and web technologies including Android OS and Apps, iOS and Apps, BlackBerry, Windows Phone and HTML 5.
When a student leaves this intensive 5-day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam.
This course is recognized by National Security Agency (NSA) and the Committee on National Security Systems (CNSS). The course is also accredited by ANSI and is compliant with National Initiative For Cybersecurity Education (NICE).
Target Audience:
This course will significantly benefit security officers, IT officers, IT Managers, auditors, security professionals, site administrators, penetration testers, and anyone who is concerned about the integrity of the information systems.
Pre-requisites:
The participants are required to have some good understanding of information security principles.
Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired advanced hacking skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system.
Value Proposition
This course delivered through our partnership with the EC-Council – the architects of the Ethical Hacking certification, promises to create ethical hackers who understand all security vulnerabilities and how to mitigate the associated risks. This training is delivered by certified Ethical Hackers who are also qualified CISA-ISACA auditors and CCNP certified.
Pain Point
With the proliferation of attacks even on highly secure systems, today, there is no single system that is 100% secure. This is made possible by the availability of the myriad number of tools and applications that can be used to launch an attack without requiring much sophistication.
For security professionals to be in a position to mitigate and counter these attacks and reduce the associated business risks, they need a deep understanding of how these attacks are launched. This course arms the learner with the skills needed to turn them into ethical hackers who can guard the business organization against external and internal attacks.
Training Methodology:
The curriculum consists of instructor-led training covering both theory and practical lessons. Students will be provided with security related resources and all tools required to perform a successful ethical hacking.
It is conducted using courseware developed by subject matter experts from all over the world and constantly updated to ensure that the students are exposed to the latest advances in the hacking/security space. Students practice various hacking techniques in a real time and simulated environment.
Students will receive the following:
- Official EC-Council Course Materials
- Exam Voucher for the CEH Certification – Exam code 312-50
- Gigabytes of the most effective Hacking and Security tools
LAB ACTIVITIES
More than 40 percent of class time is dedicated to the learning of practical skills and this is achieved through EC-Council labs. Theory to practice ratio for C|EH program is 60:40 providing students with a hands-on experience of the latest hacking techniques, methodologies, tools, tricks, etc.
The C|EH v11 course includes a library of tools that is required by security practitioners and pen-testers to find and uncover vulnerabilities across different operation platforms. This provides a wider option to students than any other programs in the market.
Key Focus Areas
- Hacking IoT Systems
- Vulnerability Analysis
- New Attack Vectors
- Mobile Platforms and Tablet Computers Hacking
- State of the Art Integrated Labs
- Advanced Lab Environment
- Latest Operating Environment includes Windows Server 2016, Windows 8/10, Linux OS, Kali Linux OS, Visual Content Technology
Expert Instructors and Accreditation
The course in conducted by experienced information system security specialists who possess the Certified EC-Council Instructor (CEI) certification and are also Certified CEH and ECSA Certified Instructors.
- Introduction to Ethical Hacking – Key issues plaguing the information security world, incident management process, and penetration testing
- Footprinting and Reconnaissance – Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Vulnerability Analysis – identify security loopholes in the target organization’s network, communication infrastructure, and end systems. This module covers the vulnerability management life cycle, and various approaches and tools.
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Malware Threats
- Packet sniffing techniques and how to defend against sniffing
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Evading Firewall, IDSs, and Honeypots – evasion techniques, evasion tools, and countermeasures
- Different types of webserver attacks, attack methodology, and countermeasures
- Hacking Web Applications
- SQL injection attacks and injection detection tools
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
-