Hackers Are Ready Are you?

Apply now for our Certified Ethical Hacking Course



  • Breaking wireless security via hacking
  • System Hacking
  • Hacking Wireless Networks
  • Protect Your Network from unauthorised users
  • Do you have a security problem?, MasterGrade IT has the perfect solution for you!


Course Details


Instructor Led Learning


  Duration: 5 Days

  Registration Open Now!

Onsite Training


  Duration: 5 Days

  Registration Open Now!

Call us : 0861 111 460

Course overview

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s)


Become a Certified Ethical Hacker!

Our hacking courses takes place in a lab environment, giving you in-depth knowledge of the subject, along with practical experience in the current essential security systems. Topics covered include Ethical Hacking, Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

pastel training course cape town

Why this course?

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed within the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker


.

Is this course for you?

Our CEH courses will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


3 easy steps to become a Certified Ethical Hacker

01

Take a
course

02

Write an
Exam

03

Get
Certified

What you will learn
Certified Ethical Hacker Course

  • Lesson 1: Introduction to Ethical Hacking
  • Lesson 2: Footprinting and Reconnaissance
  • Lesson 3: Scanning Networks
  • Lesson 4: Enumeration
  • Lesson 5: System Hacking
  • Lesson 6: Sniffing
  • Lesson 7: Social Engineering
  • Lesson 8: Denial-of-Service
  • Lesson 9: Session Hijacking
  • Lesson 10:Hacking Webservers
  • Lesson 11:Hacking Web Applications
  • Lesson 12: SQL Injection
  • Lesson 13: Hacking Wireless Networks
  • Lesson 14: Hacking Mobile Platforms
  • Lesson 15:Evading IDS, Firewalls, and Honeypots
  • Lesson 16:Cloud Computing
  • Lesson 17:Cryptography

Full course outline
Certified Ethical Hacking Course

Lesson 1: Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Policies
  • Physical Security
  • Incident Management
  • What is Vulnerability Assessment?
  • Penetration Testing
  • Information Security Laws and Standards

Lesson 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting using Advanced Google Hacking Techniques
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • WHOIS Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools

Lesson 3: Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology
  • Check for Open Ports
  • Scanning Techniques
  • Scanning Tool: NetScan Tools Pro
  • Scanning Tools
  • Scanning Tools for Mobile
  • Port Scanning Countermeasures
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Scanning Pen Testing

Lesson 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • Enumerating User Accounts
  • Enumerating Shared Resources Using Net View
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Lesson 5: System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Cracking Passwords
  • Default Passwords
  • Active Online Attack:
  • Passive Online Attack
  • Offline Attack
  • Elcomsoft Distributed Password Recovery
  • Microsoft Authentication
  • How Hash Passwords Are Stored in Windows SAM?
  • Password Salting
  • pwdump7 and fgdump
  • Password Cracking Tools
  • Escalating Privileges
  • Executing Applications
  • Spyware
  • How to Defend Against Keyloggers
  • How to Defend Against Spyware
  • Hiding Files
  • Detecting Rootkits
  • NTFS Data Stream
  • What Is Steganography?
  • Steganalysis
  • Covering Tracks
  • Penetration Testing

Lesson 6: Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Network Packet Analyzer
  • Counter measures
  • Sniffing Detection Techniques
  • Promiscuous Detection Tool
  • Sniffing Pen Testing

Lesson 7: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Watch these Movies
  • Mobile-based Social Engineering
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

Lesson 8: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

Lesson 9: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Lesson 10: Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Lesson 11: Hacking Web Applications

  • Web App Concepts
  • SQL Injection Attacks
  • How LDAP Injection Works?
  • Cross-Site Request Forgery (CSRF) Attack
  • How Cookie Poisoning Works?
  • Footprint Web Infrastructure
  • Attack Web Servers
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Authorization Attack Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Data Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web Application Security Tool
  • Web Application Pen Testing Framework

Lesson 12: SQL Injection

  • What is SQL Injection?
  • Understanding an SQL Injection Query
  • Example of a Web App Vulnerable to SQL Injection
  • Example of SQL Injection
  • Types of SQL Injection
  • Information Gathering and SQL Injection Vulnerability Detection
  • Perform Double Blind SQL Injection - Classical Exploitation (MySQL)
  • Advanced SQL Injection
  • Evasion Techniques
  • Counter-measures

Lesson 13: Hacking Wireless Networks

  • Wireless Concepts
  • Types of Wireless Antenna
  • Types of Wireless Encryption
  • Wireless Hacking Methodology
  • GPS Mapping
  • Wireless Traffic Analysis
  • Launch Wireless Attacks
  • Crack Wi-Fi Encryption
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures

Lesson 14:Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Mobile Spam
  • Hacking Android OS
  • Android-based Sniffer
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Lesson 15: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • Firewall
  • Honeypot
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • Countermeasures

Lesson 16: Cloud Computing

  • Introduction to Cloud Computing
  • Benefits of Virtualization in Cloud
  • Service Hijacking using Network Sniffing
  • Domain Name System (DNS) Attacks
  • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • Cloud Security

Lesson 17: Cryptography

  • Market Survey 2014: The Year of Encryption
  • Encryption Algorithms
  • Message Digest (One-way Hash) Functions
  • Cryptography Tools
  • Cryptography Tools for Mobile: Secret Space Encryptor, CryptoSymm, and Cipher Sender
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Side Channel Attack - Scenario
  • Cryptanalysis Tools

Related Courses

Are you ready to become a certified ethical hacker?