Certified Ethical Hacker v8

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in To master the hacking technologies, you will need to become one.

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand.



Kurset henvender sig til

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration: 4 Days

Forudsætninger

Prerequisites: At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+
Prep Course is highly recommended


Kursusindhold

Emner

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Indhold

Lab 1: Footprinting and Reconnaissance
Footprinting a Target Network
Basic Network Troubleshooting Using the Ping Utility
Basic Network Troubleshooting Using nslookup Tool
People Search Using the AnyWhere Online Tool
Tracing an E-Mail Using the eMailTrackerPro Tool
Network Route Trace Using Path Analyzer Pro
Analyzing Domain and IP Address Queries Using SmartWhois

This course is part of the following programs or tracks:
CEH - Certified Ethical Hacker

Lab 2: Scanning Networks
Scanning a Target Network
Scanning System and Network Resources Using Advanced IP Scanner
Fingerprinting Open Ports Using the Amap tool
Monitoring TCP/IP Connections Using the CurrPorts Tool
Scanning for Network Vulnerabilities Using the GFI Languard Network Scanner
Exploring and Auditing a Network Using Nmap
Mapping a Network Using the Lansurveyor Tool
Scanning a Network Using the Nessus Tool
Identifying Open Ports Using the Unicornscan Tool
Scanning a Network Using Hping3

Lab 3: Enumeration
Enumerating a Target Network
Enumerating NetBios Using the SuperScan Tool
Enumerating Passwords from "Default Password List"
Enumerating NetBios Using the NetBios EnumeratorTool
Monitoring a Network Using OpUtils Network Monitoring Tools
Enumerating a Network Using SoftPerfect Network Scanner

Lab 4: System Hacking
Extracting Administrator Passwords Using LCP
Hiding Files Using NTFS Streams
Find Hidden Files Using ADS Spy
Hiding Files Using the Masker Stenography Tool
Extracting Administrator Passwords Using L0phtCrack
Recover PST (Outlook) Password Using the Passware Recovery Kit Forensic Tool
Monitoring a System Using the Alchemy Remote Executor
System Monitoring Using RemoteExec
Record Keystrokes and Passwords Using Powered Logger

Lab 5: Trojans and Backdoors
Building a Server Using the Bifrost Tool
Creating a Server Using the ProRat Tool

Lab 6: Viruses and Worms
Creating a Virus Using the JPS Virus Maker Tool
Generating a Worm Using Internet Worm Maker Thing Tool

Lab 7: Sniffers
Sniffing a Network
Sniffing the Network Using the Colasoft Packet Builder
Sniffing the Network Using the OmniPeek Network Analyzer
Spoofing MAC Address Using SMAC
Sniffing a Network Using the WinArpAttacker Tool
Analyzing a Network Using the Colasoft Capsa Network Analyzer
Sniffing Passwords Using Wireshark
Performing Man-in-the-Middle Attack using Cain & Abel

Lab 8: Social Engineering
Detecting Phishing Using Netcraft
Detecting Phishing Using Phish Tank

Lab 9: Denial of Service
Creating a Zombie Using Poison Ivy
SYN Flooding a Target Host Using hping3
Creating Zombies Using Shark

Lab 10: Session Hijacking
Hijacking Sessions
Session Hijacking Using the Paros Proxy
Hijacking an Established Session Using Firesheep

Lab 11: Hacking Webserver
Footprinting Webserver Using the httprecon Tool
Footprinting a Webserver Using ID Serve
Cracking Remote Passwords Using Brutus
Hacking Windows Server 2008 with Metasploit Framework

Lab 12: Hacking Web Applications
Testing Web Applications Using the Burp Suite
Website Vulnerability Scanning Using Acunetix WVS

Lab 13: SQL Injection
SQl Injection Attacks on MS SQL Database
Testing for SQL Injection Using IBM Rational AppScan Tool

Lab 14: Hacking Wireless Networks
Cracking WEP Using AirPcap with Wireshark and Cain and Abel
Detecting the Wireless Networks Using NetSurveyor Tool
Discovering Wireless Networks Using Kismet
Cracking A WEP Network with Aircrack-ng on Backtrack

Lab 15: Buffer Overflow
Buffer Overflow Attack
Enumerating Passwords in "Default Password List"

Lab 16: Cryptography
Basic Data Encrypting Using HashCalc
Basic Data Encrypting Using MD5 Calculator
Basic Data Encrypting Using Advance Encryption Package
Basic Data Encrypting Using TrueCrypt
Basic Data Encrypting Using CryptTool
Certificering
Yderligere Information

Certificering

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Kursusdato


Hørkær 18
2730 Herlev
Tlf: 77 300 300
Email: kursus@idg.dk
CVR: 65970414