Login

Register

Ethical Hacking Course

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

Ethical Hacker Training Course Details

Ethical Hacker Training Introduction

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
Now comes the “certified ethical hacker”, whose primary job is to attack his own organization’s system to weed out vulnerabilities before “real hackers” do.

The adrenaline rush of being an ethical hacker is unparalleled.Though an ethical hacker’s role is similar to that of a “penetration tester”, it involves broader duties.

“The term ethical hacking is said to have been coined by IBM”

Certified Ethical Hacker Training Curriculum

Introduction to Ethical Hacking

• Information Security Overview
• Information Security Threats and Attack Vectors
• Hacking Concepts, Types, and Phases
• Ethical Hacking Concepts and Scope
• Information Security Controls
• Physical Security
• Incident Management
• What is Vulnerability Assessment?
• Penetration Testing
• Information Security Laws and Standards

Footprinting and Reconnaissance

• Footprinting Concepts
• Footprinting Methodology
• Footprinting Tools
• Footprinting Countermeasures
• Footprinting Penetration Testing

Scanning Networks

• Overview of Network Scanning
• CEH Scanning Methodology

Enumeration

• Enumeration Concepts
• NetBIOS Enumeration
• SNMP Enumeration
• SNMP Enumeration Tools
• LDAP Enumeration
• NTP Enumeration
• SMTP Enumeration
• Enumeration Countermeasures
• SMB Enumeration Countermeasures
• Enumeration Pen Testing

System Hacking

• Information at Hand Before System Hacking Stage
• System Hacking: Goals
• CEH Hacking Methodology (CHM)
• CEH System Hacking Steps
• Hiding Files
• Covering Tracks
• Penetration Testing

Malware Threats

• Introduction to Malware
• Trojan Concepts
• Types of Trojans
• Virus and Worms Concepts
• Malware Reverse Engineering
• Countermeasures
• Anti-Malware Software
• Penetration Testing

Sniffing

• Sniffing Concepts
• MAC Attacks
• DHCP Attacks
• ARPPoisoning
• Spoofing Attack
• DNS Poisoning
• Sniffing Tools
• Sniffing Tool: Wireshark
• Follow TCP Stream in Wireshark
• Display Filters in Wireshark
• Additional Wireshark Filters

Social Engineering

• Social Engineering Concepts
• Social Engineering Techniques
• Impersonation on Social Networking Sites
• Identity Theft
• Social Engineering Countermeasures
• Penetration Testing

Denial-of-Service

• DoS/DDoS Concepts
• DoS/DDoS Attack Techniques
• Botnets
• DDoS Case Study
• DoS/DDoS Attack Tools
• Counter-measures
• DoS/DDoS Protection Tools
• DoS/DDoS Attack Penetration Testing

Session Hijacking

• Session Hijacking Concepts
• Application Level Session Hijacking
• Network-level Session Hijacking
• Session Hijacking Tools
• Counter-measures
• Session Hijacking Pen Testing

Hacking Webservers

• Webserver Concepts
• Webserver Attacks
• Attack Methodology
• Webserver Attack Tools
• Counter-measures
• Patch Management
• Webserver Security Tools
• Webserver Pen Testing

Hacking Web Applications

• Web App Concepts
• Web App Threats
• Web App Hacking Methodology
• Web Application Hacking Tools
• Countermeasures
• Security Tools
• Web App Pen Testing
• Web Application Pen Testing Framework

SQL Injection

• SQL Injection Concepts
• Types of SQL Injection
• SQL Injection Methodology
• SQL Injection Tools
• Evasion Techniques
• Counter-measures

Hacking Wireless Networks

• Wireless Concepts
• Wireless Encryption
• Wireless Threats
• Wireless Hacking Methodology
• Wireless Hacking Tools
• Bluetooth Hacking
• Counter-measures
• Wireless Security Tools
• Wi-Fi Pen Testing

Hacking Mobile Platforms

• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking iOS
• Hacking Windows Phone OS
• Hacking BlackBerry
• Mobile Device Management (MDM)
• Mobile Security Guidelines and Tools
• Mobile Pen Testing

Cloud Computing

• Introduction to Cloud Computing
• Cloud Computing Threats
• Cloud Computing Attacks
• Cloud Security
• Cloud Security Tools
• Cloud Penetration Testing

Want to have a course urgently or on Fast track. We can arrange you for a specialised training aimed only for you. Please get in touch with us with your requirements by mail or just fill in the Batch Enquiry form. We will get in touch with you with the slot times and other details with in 24 hours

For Priority Training contact below
  • eITCafe: trainings@eitcafe.com
  • India: 040 6678 6677
  • US: 630-636-0198

Support services

We know how hard it can be to find and keep a job when there are so many other things to worry about. Our support team is here to help break down the barriers which are blocking your road to employment.
If you are a Working Chance candidate, please don’t hesitate to ask for advice or support on any issues which are affecting your chances of finding a job.
For further information, please email jobsupport@eitcafe.com our Support and Training Manager.

Job Preparation

• Assistance with learning job seeking skills
• Resume creation
• Master application completion
• Dressing for success
• Job interview preparation

Job Development

• Assistance with completing applications online or in person
• Job development online, on foot, networking events, job fairs and established employer relationships to locate available positions in your job goal
• Job leads and information on attending hiring events
• Follow-ups on applications placed to request interviews.

Who is a hacker?

Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer’s software and hardware.

What is footprinting ?

Footprinting refers to uncovering and collecting as much information as possible about a target network.

Definition and types of scanning

Scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Scanning is one of the components of intelligence gathering for an attacker to create a profile of the target organization.

Scanning types :

  • Port Scanning
  • Vulnerability Scanning
  • Network Scanning

What is Enumeration ?

Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an Intranet Environment.

What is SNMP( Simple Network Management Protocol ) ?

Simple Network Management Protocol ( SNMP ) is a TCP/IP protocol used for remote monitoring and managing hosts, routers, and other devices on a network.

Key Features

metricsnew-75x75

Overview of Course and Learning analytic’s

teacher-75x75

Learn from Certified and Expert Trainers

Customized Course as per your requirement

24/7 online support for the course learners

High Quality E-learning Content for learning

videos

Access to the Recorded Sessions and classes

Flexible Course timing and Payment terms

Live Practical Oriented Approach for learners

Course Curriculam

Ethical Hacker Course Module

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
Now comes the “certified ethical hacker”, whose primary job is to attack his own organization’s system to weed out vulnerabilities before “real hackers” do. The adrenaline rush of being an ethical hacker is unparalleled. Though an ethical hacker’s role is similar to that of a “penetration tester”, it involves broader duties. “The term ethical hacking is said to have been coined by IBM”

Duration: 45 Days

Support: 24×7

Video: Yes

Ethical Hacker Certified Professional