Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
-
Online, Instructor-Led
Course Description
Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student completes this online training course they will have knowledge and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
Learning Objectives
Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
Different types of footprinting, footprinting tools, and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Different types of vulnerability assessment and vulnerability assessment tools
System hacking methodology
Different types of malware, malware analysis procedure, and malware countermeasures
Various packet sniffing techniques and sniffing countermeasures
Social engineering techniques, insider threats, identity theft, and countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
Different types of web server and web application attacks, hacking methodology, and countermeasures
SQL injection attacks, evasion techniques, and SQL injection countermeasure
Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
Mobile platform attack vector, andriod and iOS hacking, mobile device management, mobile security guidelines, and security tools
Different IoT attacks, IoT hacking methodology, IoT hacking tools, and countermeasures
Various cloud computing threats, attacks, and security techniques and tools
Different types of encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools
Framework Connections
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.