OneSource Professional Training Solutions, Inc.
presents
Certified Ethical Hacker v7 On-Site Training
Certified Ethical Hacker v7
Course Description/Agenda
If you're concerned about the integrity of your network's infrastructure, you
need the ethical hacking tools and techniques you will learn in Certified
Ethical Hacker (CEH) v7 to enhance your network's defenses. You'll begin by
learning how perimeter defenses work. Then, by scanning and attacking your own
network (no real networks will be harmed), you'll learn how intruders operate
and the steps you can take to secure a system.
In the interactive, lab-filled environment of this ethical hacking course,
you will gain in-depth knowledge and practical experience with current,
essential security systems. You will explore common ethical hacking topics, such
as intrusion detection, policy creation, social engineering, DDoS attacks,
buffer overflows, and virus creation.
In addition to learning how to scan, test, hack, and secure a system, you'll prepare for the latest Certified Ethical Hacker exam from EC-Council. A VUE exam voucher is included with your course registration; however, the exam will not be administered in class to allow for maximum discussion opportunities and hands-on activities.
Highlights of CEH v7 include:
- A DVD packed with the latest hacking and security tools and more than 1000
minutes of videos demonstrating hacking techniques
- Diagrams of concepts and attacks for clarity and easier interpretation
- Key industry-standard tools covered in detail
- Exclusive section for countermeasures against different attacks
- Time dedicated to penetration testing
- Results-oriented, descriptive, and analytical lab manual
What You'll Learn
- Footprinting and reconnaissance
-
Hacking web servers, web applications, and wireless networks
-
Cryptography
-
Penetration testing
-
Social engineering
-
Trojans, viruses, and worms
-
Evading IDS, firewalls, and honeypots
-
Enumeration
-
Buffer overflows
Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Course Prerequisites At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+ Prep Course is highly recommended. Course Outline 1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffers
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Web Servers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Evading IDS, Firewalls, and Honeypots
17. Buffer Overflows
18. Cryptography
19. Penetration Testing Labs Lab 1: Footprinting and Reconnaissance
-
Footprinting a Target Network
-
Basic Network Troubleshooting Using the Ping Utility
-
Basic Network Troubleshooting Using nslookup Tool
-
People Search Using the AnyWhere Online Tool
-
Tracing an E-Mail Using the eMailTrackerPro Tool
-
Network Route Trace Using Path Analyzer Pro
-
Analyzing Domain and IP Address Queries Using SmartWhois
Lab 2: Scanning Networks
-
Scanning a Target Network
-
Scanning System and Network Resources Using Advanced IP Scanner
-
Fingerprinting Open Ports Using the Amap tool
-
Monitoring TCP/IP Connections Using the CurrPorts Tool
-
Scanning for Network Vulnerabilities Using the GFI Languard Network
Scanner
-
Exploring and Auditing a Network Using Nmap
-
Mapping a Network Using the Lansurveyor Tool
-
Scanning a Network Using the Nessus Tool
-
Identifying Open Ports Using the Unicornscan Tool
-
Scanning a Network Using Hping3
Lab 3: Enumeration
-
Enumerating a Target Network
-
Enumerating NetBios Using the SuperScan Tool
-
Enumerating Passwords from "Default Password List"
-
Enumerating NetBios Using the NetBios EnumeratorTool
-
Monitoring a Network Using OpUtils Network Monitoring Tools
-
Enumerating a Network Using SoftPerfect Network Scanner
Lab 4: System Hacking
-
Extracting Administrator Passwords Using LCP
-
Hiding Files Using NTFS Streams
-
Find Hidden Files Using ADS Spy
-
Hiding Files Using the Masker Stenography Tool
-
Extracting Administrator Passwords Using L0phtCrack
-
Recover PST (Outlook) Password Using the Passware Recovery Kit Forensic
Tool
-
Monitoring a System Using the Alchemy Remote Executor
-
System Monitoring Using RemoteExec
-
Record Keystrokes and Passwords Using Powered Logger
Lab 5: Trojans and Backdoors
-
Building a Server Using the Bifrost Tool
-
Creating a Server Using the ProRat Tool
Lab 6: Viruses and Worms
-
Creating a Virus Using the JPS Virus Maker Tool
-
Generating a Worm Using Internet Worm Maker Thing Tool
Lab 7: Sniffers
-
Sniffing a Network
-
Sniffing the Network Using the Colasoft Packet Builder
-
Sniffing the Network Using the OmniPeek Network Analyzer
-
Spoofing MAC Address Using SMAC
-
Sniffing a Network Using the WinArpAttacker Tool
-
Analyzing a Network Using the Colasoft Capsa Network Analyzer
-
Sniffing Passwords Using Wireshark
-
Performing Man-in-the-Middle Attack using Cain & Abel
Lab 8: Social Engineering
-
Detecting Phishing Using Netcraft
-
Detecting Phishing Using Phish Tank
Lab 9: Denial of Service
-
Creating a Zombie Using Poison Ivy
-
SYN Flooding a Target Host Using hping3
-
Creating Zombies Using Shark
Lab 10: Session Hijacking
-
Hijacking Sessions
-
Session Hijacking Using the Paros Proxy
-
Hijacking an Established Session Using Firesheep
Lab 11: Hacking Webserver
-
Footprinting Webserver Using the httprecon Tool
-
Footprinting a Webserver Using ID Serve
-
Cracking Remote Passwords Using Brutus
-
Hacking Windows Server 2008 with Metasploit Framework
Lab 12: Hacking Web Applications
-
Testing Web Applications Using the Burp Suite
-
Website Vulnerability Scanning Using Acunetix WVS
Lab 13: SQL Injection
-
SQl Injection Attacks on MS SQL Database
-
Testing for SQL Injection Using IBM Rational AppScan Tool
Lab 14: Hacking Wireless Networks
-
Cracking WEP Using AirPcap with Wireshark and Cain and Abel
-
Detecting the Wireless Networks Using NetSurveyor Tool
-
Discovering Wireless Networks Using Kismet
-
Cracking A WEP Network with Aircrack-ng on Backtrack
Lab 15: Buffer Overflow
-
Buffer Overflow Attack
-
Enumerating Passwords in "Default Password List"
Lab 16: Cryptography
|
Add to favorites
Email this page
|