Certified Ethical Hacker v8 - afholdes både i Kbh. og Århus

Print kursus If you're concerned about the integrity of your network's infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v7 to enhance your network's defenses. You'll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you'll learn how intruders operate and the steps you can take to secure a system.
In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, you'll prepare for the latest Certified Ethical Hacker
exam from EC-Council.

Kurset henvender sig til:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration: 5 Days


Prerequisites: At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+
Prep Course is highly recommended

Kursusindhold Praktiske oplysninger

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing


Lab 1: Footprinting and Reconnaissance
Footprinting a Target Network
Basic Network Troubleshooting Using the Ping Utility
Basic Network Troubleshooting Using nslookup Tool
People Search Using the AnyWhere Online Tool
Tracing an E-Mail Using the eMailTrackerPro Tool
Network Route Trace Using Path Analyzer Pro
Analyzing Domain and IP Address Queries Using SmartWhois

This course is part of the following programs or tracks:
CEH - Certified Ethical Hacker

Lab 2: Scanning Networks
Scanning a Target Network
Scanning System and Network Resources Using Advanced IP Scanner
Fingerprinting Open Ports Using the Amap tool
Monitoring TCP/IP Connections Using the CurrPorts Tool
Scanning for Network Vulnerabilities Using the GFI Languard Network Scanner
Exploring and Auditing a Network Using Nmap
Mapping a Network Using the Lansurveyor Tool
Scanning a Network Using the Nessus Tool
Identifying Open Ports Using the Unicornscan Tool
Scanning a Network Using Hping3

Lab 3: Enumeration
Enumerating a Target Network
Enumerating NetBios Using the SuperScan Tool
Enumerating Passwords from "Default Password List"
Enumerating NetBios Using the NetBios EnumeratorTool
Monitoring a Network Using OpUtils Network Monitoring Tools
Enumerating a Network Using SoftPerfect Network Scanner

Lab 4: System Hacking
Extracting Administrator Passwords Using LCP
Hiding Files Using NTFS Streams
Find Hidden Files Using ADS Spy
Hiding Files Using the Masker Stenography Tool
Extracting Administrator Passwords Using L0phtCrack
Recover PST (Outlook) Password Using the Passware Recovery Kit Forensic Tool
Monitoring a System Using the Alchemy Remote Executor
System Monitoring Using RemoteExec
Record Keystrokes and Passwords Using Powered Logger

Lab 5: Trojans and Backdoors
Building a Server Using the Bifrost Tool
Creating a Server Using the ProRat Tool

Lab 6: Viruses and Worms
Creating a Virus Using the JPS Virus Maker Tool
Generating a Worm Using Internet Worm Maker Thing Tool

Lab 7: Sniffers
Sniffing a Network
Sniffing the Network Using the Colasoft Packet Builder
Sniffing the Network Using the OmniPeek Network Analyzer
Spoofing MAC Address Using SMAC
Sniffing a Network Using the WinArpAttacker Tool
Analyzing a Network Using the Colasoft Capsa Network Analyzer
Sniffing Passwords Using Wireshark
Performing Man-in-the-Middle Attack using Cain & Abel

Lab 8: Social Engineering
Detecting Phishing Using Netcraft
Detecting Phishing Using Phish Tank

Lab 9: Denial of Service
Creating a Zombie Using Poison Ivy
SYN Flooding a Target Host Using hping3
Creating Zombies Using Shark

Lab 10: Session Hijacking
Hijacking Sessions
Session Hijacking Using the Paros Proxy
Hijacking an Established Session Using Firesheep

Lab 11: Hacking Webserver
Footprinting Webserver Using the httprecon Tool
Footprinting a Webserver Using ID Serve
Cracking Remote Passwords Using Brutus
Hacking Windows Server 2008 with Metasploit Framework

Lab 12: Hacking Web Applications
Testing Web Applications Using the Burp Suite
Website Vulnerability Scanning Using Acunetix WVS

Lab 13: SQL Injection
SQl Injection Attacks on MS SQL Database
Testing for SQL Injection Using IBM Rational AppScan Tool

Lab 14: Hacking Wireless Networks
Cracking WEP Using AirPcap with Wireshark and Cain and Abel
Detecting the Wireless Networks Using NetSurveyor Tool
Discovering Wireless Networks Using Kismet
Cracking A WEP Network with Aircrack-ng on Backtrack

Lab 15: Buffer Overflow
Buffer Overflow Attack
Enumerating Passwords in "Default Password List"

Lab 16: Cryptography
Basic Data Encrypting Using HashCalc
Basic Data Encrypting Using MD5 Calculator
Basic Data Encrypting Using Advance Encryption Package
Basic Data Encrypting Using TrueCrypt
Basic Data Encrypting Using CryptTool
Yderligere Information


This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Pris kr. 27.500,- (ex. moms)
Varighed 3 dage
Bemærk Kurset udbydes af IDG som kursusfacilitator for en ATO
Virksomhedskursus? Læs nærmere her
Kommende kurser
28 apr Deploying Citrix XenDesktop 7 Solutions

28 apr SQL Server kursus Integration Services (SSIS) 2008 grundlæggende

28 apr Excel VBA kursus - for controllere og analytikere

28 apr Excel kursus 2007/2013 Videregående

05 maj Access 2007/2013 kursus Grundlæggende afholdes både i Kbh. og Århus

07 maj Adobe Illustrator CS4-CS5 Grundlæggende

07 maj Excel for økonomifunktionen

08 maj Publisher 2010 grundlæggende

09 maj Microsoft Visio 2010 kursus Grundlæggende

12 maj Word kursus 2007/2013 Grundlæggende

13 maj Pivottabeller i Excel 2007-2013

14 maj SQL Server 2012 Business Intelligence Whats New

14 maj C# Udvidet

14 maj Adobe Photoshop CS4-CS6 Grundlæggende

19 maj VMware View: Desktop Fast Track 5.1

Hørkær 18, 2730 Herlev - Tlf: 77 300 300 - Email: idgkurser@idg.dk - CVR: 65970414
IDG Kurser - Copyright © 2014 - Computerworld A/S - IDG.dk