Ethical Hacking Course overview

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s)

Apply Today

Instructor Led Learning

Duration: 5 Days
Registration Open Now!

Video Learning

Duration: 5 Days
Registration Open Now!

What you will learn

  • Lesson 1: Introduction to Ethical Hacking
  • Lesson 2: Foot printing and Reconnaissance
  • Lesson 3: Scanning Networks
  • Lesson 4: Enumeration
  • Lesson 5: System Hacking
  • Lesson 6: Sniffing
  • Lesson 7: Social Engineering
  • Lesson 8: Denial-of-Service
  • Lesson 9: Session Hijacking
  • Lesson 10:Hacking Web servers
  • Lesson 11:Hacking Web Applications
  • Lesson 12: SQL Injection
  • Lesson 13: Hacking Wireless Networks
  • Lesson 14: Hacking Mobile Platforms
  • Lesson 15:Evading IDS, Firewalls, and Honey pots
  • Lesson 16:Cloud Computing
  • Lesson 17:Cryptography

Basic computer skills

CompTIA A+ (IT Technician)

CompTIA N+ (Network Administration)

CompTIA S+ (Security+)

FULL COURSE OUTLINE

Lesson 1: Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Policies
  • Physical Security
  • Incident Management
  • What is Vulnerability Assessment?
  • Penetration Testing
  • Information Security Laws and Standards

Lesson 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting using Advanced Google Hacking Techniques
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • WHOIS Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools

Lesson 3: Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology
  • Check for Open Ports
  • Scanning Techniques
  • Scanning Tool: NetScan Tools Pro
  • Scanning Tools
  • Scanning Tools for Mobile
  • Port Scanning Countermeasures
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Scanning Pen Testing

Lesson 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • Enumerating User Accounts
  • Enumerating Shared Resources Using Net View
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Lesson 5: System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Cracking Passwords
  • Default Passwords
  • Active Online Attack:
  • Passive Online Attack
  • Offline Attack
  • Elcomsoft Distributed Password Recovery
  • Microsoft Authentication
  • How Hash Passwords Are Stored in Windows SAM?
  • Password Salting
  • pwdump7 and fgdump
  • Password Cracking Tools
  • Escalating Privileges
  • Executing Applications
  • Spyware
  • How to Defend Against Keyloggers
  • How to Defend Against Spyware
  • Hiding Files
  • Detecting Rootkits
  • NTFS Data Stream
  • What Is Steganography?
  • Steganalysis
  • Covering Tracks
  • Penetration Testing

Lesson 6: Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Network Packet Analyzer
  • Counter measures
  • Sniffing Detection Techniques
  • Promiscuous Detection Tool
  • Sniffing Pen Testing

Lesson 7: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Watch these Movies
  • Mobile-based Social Engineering
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

Lesson 8: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

Lesson 9: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Lesson 10: Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Lesson 11: Hacking Web Applications

  • Web App Concepts
  • SQL Injection Attacks
  • How LDAP Injection Works?
  • Cross-Site Request Forgery (CSRF) Attack
  • How Cookie Poisoning Works?
  • Footprint Web Infrastructure
  • Attack Web Servers
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Authorization Attack Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Data Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web Application Security Tool
  • Web Application Pen Testing Framework

Lesson 12: SQL Injection

  • What is SQL Injection?
  • Understanding an SQL Injection Query
  • Example of a Web App Vulnerable to SQL Injection
  • Example of SQL Injection
  • Types of SQL Injection
  • Information Gathering and SQL Injection Vulnerability Detection
  • Perform Double Blind SQL Injection – Classical Exploitation (MySQL)
  • Advanced SQL Injection
  • Evasion Techniques
  • Counter-measures

Lesson 13: Hacking Wireless Networks

  • Wireless Concepts
  • Types of Wireless Antenna
  • Types of Wireless Encryption
  • Wireless Hacking Methodology
  • GPS Mapping
  • Wireless Traffic Analysis
  • Launch Wireless Attacks
  • Crack Wi-Fi Encryption
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures

Lesson 14:Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Mobile Spam
  • Hacking Android OS
  • Android-based Sniffer
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Lesson 15: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • Firewall
  • Honeypot
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • Countermeasures

Lesson 16: Cloud Computing

  • Introduction to Cloud Computing
  • Benefits of Virtualization in Cloud
  • Service Hijacking using Network Sniffing
  • Domain Name System (DNS) Attacks
  • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • Cloud Security

Lesson 17: Cryptography

  • Market Survey 2014: The Year of Encryption
  • Encryption Algorithms
  • Message Digest (One-way Hash) Functions
  • Cryptography Tools
  • Cryptography Tools for Mobile: Secret Space Encryptor, CryptoSymm, and Cipher Sender
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Side Channel Attack – Scenario
  • Cryptanalysis Tools

Join Over 10,000 Students that have studied with MasterGrade IT Now

Become Part of MasterGrade IT to Further Your Career.