Online Certified Ethical Hacker (CEH v8) Training Course | Southwestern College Professional Studies

Bachelor and Master Degrees from Southwestern College - Professional Studies

Summer Session 1 classes begin May 15 , 2017 Apply Today!

Call Now 1.888.684.5335

Online Certified Ethical Hacker (CEH v8) Training Course

Certified Ethical Hacker (CEH v9)

Course Overview

Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student completes this online training course they will have knowledge and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

Skills Learned

The CEH v9 online training course covers:

  • Footprinting
  • Network Scanning
  • Enumeration
  • Packet sniffing
  • Social engineering
  • Dos/DDos
  • Session hijacking
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing

Who Should Attend This Course

CEH v9 will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.

Prerequisites

A working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies is strongly recommended.

Course Outline

Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Hacking Phases
  • Types of Attacks
  • Information Security Controls

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Threats
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Module 3: Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology

Module 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • UNIX/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Module 5: System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH Hacking Steps

Module 6: Trojans and Backdoors

  • Trojan Concepts
  • Trojan Infection
  • Types of Trojans
  • Trojan Detection
  • Countermeasures
  • Anti-Trojan Software
  • Pen Testing for Trojans and Backdoors

Module 7: Viruses and Worms

  • Virus and Worms Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Counter-Measures
  • Penetration Testing for Virus

Module 8: Sniffers

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Countermeasures

Module 9: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Imperso-nation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Social Engineering Pen Testing

Module 10: Denial of Service

  • DoS/DDoS Concepts
  • DoS Attack Techniques
  • Botnet
  • DoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • Denial-of Service (DoS) Attack Penetration Testing

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Module 12: Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Module 13: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Web App Pen Testing

Module 14: SQL Injection

  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • Advanced SQL Injection
  • Evasion Techniques
  • Countermeasures

Module 15: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

Module 16: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking Blackberry
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Module 17: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evading Tools
  • Countermeasures
  • Penetration Testing

Module 18: Buffer Overflow

  • Buffer Overflow Concepts
  • Buffer Overflow Methodology
  • Buffer Overflow Examples
  • Buffer Overflow Detection
  • Buffer Overflow Countermeasures
  • Buffer Overflow Security Tools
  • Buffer Overflow Pen Testing

Module 19: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

Module 20: Penetration Testing

  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Techniques
  • Pen Testing Phases
  • Pen Testing Roadmap
  • Outsourcing Pen Test

Hands-On Labs

Lab 1: Footprinting and Reconnaissance

  • Discover Network Paths with the Ping Utility
  • Query DNS with nslookup Utility
  • Search for People Using the AnyWho Online Tool
  • Analyze Domain and IP Address Queries Using SmartWhois
  • Trace Network Routes Using Path Analyzer Pro
  • Trace E-Mail Delivery Routes with the eMailTrackerPro Tool
  • Copy a Website with the HTTrack Web Copier Tool
  • Extract Web Data with the Web Data Extractor Tool
  • Search for Web Vulnerabilities with Search Diggity Tool

Lab 2: Scanning Networks

  • Scan System and Network Resources Using Advanced IP Scanner
  • Monitor TCP/IP Connections Using the CurrPorts Tool
  • Scan for Network Vulnerabilities Using the GFI Languard Network Scanner
  • Scan Hosts for Services Using Nmap
  • Scan for Vulnerabilities with the Nessus Tool
  • Map a Network Using Global Network Inventory Tool
  • Create Proxies with Proxy Workbench Tool
  • Perform Tunneling with HTTPort/HTTHost Tool
  • Create Packets Using Colasoft Packet Builder
  • Perform Traffic Analysis with the Dude Sniffer Tool

Lab 3: Enumeration

  • Enumerate Services with Zenmap
  • Enumerate Hosts Using the SuperScan Tool
  • Enumerate Networks with SoftPerfect Network Scanner
  • Enumerate a Network with SolarWinds Toolset

Lab 4: System Hacking

  • Extracting Administrator Passwords Using LCP
  • Hiding Files Using NTFS Streams
  • Search for Alternate Data Streams using the ADS Spy Tool
  • Hide Content with Stealth Files Steganography
  • Extract Passwords with the PWdump7 Tool
  • Generate Rainbow Tables with the Winrtgen Tool
  • Crack Hashed Passwords using the Rainbowcrack Tool
  • Crack Hashed Passwords with the L0phtCrack Tool
  • Execute Files Remotely with the RemoteExec Tool
  • Hide Content with the Snow Steganography Tool
  • Control System Auditing with the Auditpol Utility
  • Reset Passwords with the CHNTPW.iso Tool
  • Monitor Users with the Spytech SpyAgent Tool
  • Hide Content with the QuickStego Tool

Lab 5: Trojans and Backdoors

  • Create a Server Using the ProRat Tool
  • Create a Trojan with the OneFile EXE Maker Tool
  • Create a Server with the Proxy Server Trojan
  • Create a Server with the HTTP Trojan
  • Create a Server with Atelier Web Remote Commander
  • Create a Trojan with Biodox Trojan Creator Tool
  • Create a Backdoor with Metasploit

Lab 6: Viruses and Worms

  • Create a Virus Using the JPS Virus Maker Tool
  • Reverse Engineer Code Using the IDA Pro Analysis Tool
  • Scan for Viruses with Kaspersky Anti-Malware
  • Generate a Worm Using Internet Worm Maker Thing Tool

Lab 7: Sniffers

  • Analyze Packet Captures Using the OmniPeek Network Analyzer
  • Spoof MAC Address Using SMAC
  • Analyze a Network Using the Colasoft Capsa Network Analyzer
  • Sniff Network Traffic with Wireshark
  • Perform ARP Poisoning with Cain
  • Detect Hosts in Promiscuous Mode with PromqryUI

Lab 8: Social Engineering

  • Detect Phishing Using Netcraft
  • Create a Rogue Website with Social Engineering Toolkit (SET)

Lab 9: Denial of Service

  • Use Hping to Create a Denial of Service Attack
  • Use DoSHTTP to Create a Denial of Service Attack

Lab 10: Session Hijacking

  • Hijack and Redirect Web Requests with the Zed Attack Proxy (ZAP)

Lab 11: Hacking Webserver

  • Footprint Webservers with the HTTP Recon Tool
  • Footprint a Webserver Using ID Serve
  • Attack Webservers with Metasploit

Lab 12: Hacking Web Applications

  • Create a Cross-Site Scripting Attack with JavaScript
  • Explore the Vampire Vulnerability Scanner
  • Scan a Website for Vulnerabilities Using Acunetix

Lab 13: SQL Injection

  • Perform SQL Injection Attacks on MS SQL Database
  • Scan an Internet Site with IBM App Scan Vulnerability Scanner
  • Scan a WebServer with N-Stalker Vulnerability Scanner

Lab 14: Hacking Wireless Networks

  • Analyze WiFi Traffic with AirPcap with Wireshark
  • Crack the WEP Key for Captured Traffic with Aircrack-ng
  • UnWEP Bulk Captured Traffic with OmniPeek Once Key is Known

Lab 15: Evading IDS and Firewalls

  • Configure the Snort Intrusion Detection Tool
  • Use the Kiwi Syslog Viewer to Analyze Snort Logs
  • Install, Configure, and Attack the KFSensor Honeypot Tool

Lab 16: Buffer Overflow

  • Code, Compile, and Execute a Buffer Overflow Attack

Lab 17: Cryptography

  • Hash Files and Data Using HashCalc
  • Encrypt Data Using the Advanced Encryption Package
  • Encrypt File Systems with TrueCrypt
  • Encrypt Data with the BCTextEncoder Tool

Cost

  • Expert-facilitated Virtual Live Online Classroom: $2,990
  • Expert-facilitated Virtual Recorded Onine Classroom: $2,990

Contact us for group and bundle pricing