Certified Ethical Hacker Certification

CEH At Glance

The Purpose of the CEH credential is to:

  • + Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • + Inform the public that credentialed individuals meet or exceed the minimum standards.
  • + Reinforce ethical hacking as a unique and self-regulating profession.

Course overview

This training offers a quick but rigorous preparation to the Certified Ethical Hacker(CEH®) exam of the EC-Council. Participants will learn how to evaluate, test and penetrate their own systems. With the help of several practical exercises, they will acquire an in-depth knowledge of security systems. Participants will begin by learning how the perimeter defense works and will then learn how to attack in order to validate the security of their own networks without causing any real damage. The training allows participants to analyze the different steps involved in an intrusion, from recognition to privilege escalation, and to identify what steps should be taken to ensure the safety of their environments. Topics include intrusion detection,process creation, social engineering, DDoS attacks, buffer overflow and virus creation. When participants complete the 5-day training,they will have experienced the overall concept of ethical hacking.

 

Objectives

  • + Acquire necessary knowledge to successfully obtain the CEH® certification
    Master the knowledge and concepts of ethical hacking
  • + Acquire a general understanding of environment-related attack types
  • + Provide participants with a global vision of security risks to their systems and master counter-attack methods

Prerequisite

  • + The CEH® candidate should possess at least two years of technical experience in information security and be endorsed by his employer
  • + Good knowledge of TCP/IP
  • + Good basic knowledge of Linux

Who Should Attend

  • + Anyone wishing to obtain the CEH® certification and further their knowledge of ethical hacking
  • + Information Systems Auditors
  • + Information Security Team Members
  • + Web Site Administrators
  • + Expert Consultants in Information Technology

About the Exam

  • + Number of Questions: 125
  • + Test Duration: 4 Hours
  • + Test Format: Multiple Choice
  • + Test Delivery: ECC EXAM, VUE
  • + Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

 

 

Syllabus

DAY 1

  • Module 0 – Introduction to EC-Council
  • Module 1 – Introduction to Ethical Hacking
  • Module 2 – Footprinting and recognition
  • Module 3 – Network Scanning
  • Module 4 – Systems Enumeration

DAY 2

  • Module 5 – Information Systems Hacking
  • Module 6 – Trojans Horses and Backdoors
  • Module 7 – Viruses and Worms
  • Module 8 – Sniffers

DAY 3

  • Module 9 – Social Engineering
  • Module 10 – Denial of Service Attacks (DoS)
  • Module 11 – Session Hacking (Hijacking)
  • Module 12 – Web Server Hijacking

DAY 4

  • Module 13 – Web Application Hacking
  • Module 14 – SQL Injection
  • Module 15 – Wireless Networks Hacking
  • Module 16 – Mobile Platforms Hacking

DAY 5

  • Module 17 – Parade for IDS, firewall and Honeypots
  • Module 18 – Buffer Overflow
  • Module 19 – Cryptography
  • Module 20 – Intrusion tests