Certified Ethical Hacker afholdes både i Kbh. og Århus
If you're concerned about the integrity of your network's infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v7 to enhance your network's defenses. You'll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you'll learn how intruders operate and the steps you can take to secure a system. In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.
In addition to learning how to scan, test, hack, and secure a system, you'll prepare for the latest Certified Ethical Hacker exam from EC-Council.
Kurset henvender sig til:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Prerequisites: At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+ Prep Course is highly recommended
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Trojans and Backdoors
Viruses and Worms
Denial of Service
Hacking Web Servers
Hacking Web Applications
Hacking Wireless Networks
Evading IDS, Firewalls, and Honeypots
Lab 1: Footprinting and Reconnaissance Footprinting a Target Network Basic Network Troubleshooting Using the Ping Utility Basic Network Troubleshooting Using nslookup Tool People Search Using the AnyWhere Online Tool Tracing an E-Mail Using the eMailTrackerPro Tool Network Route Trace Using Path Analyzer Pro Analyzing Domain and IP Address Queries Using SmartWhois
This course is part of the following programs or tracks: CEH - Certified Ethical Hacker
Lab 2: Scanning Networks Scanning a Target Network Scanning System and Network Resources Using Advanced IP Scanner Fingerprinting Open Ports Using the Amap tool Monitoring TCP/IP Connections Using the CurrPorts Tool Scanning for Network Vulnerabilities Using the GFI Languard Network Scanner Exploring and Auditing a Network Using Nmap Mapping a Network Using the Lansurveyor Tool Scanning a Network Using the Nessus Tool Identifying Open Ports Using the Unicornscan Tool Scanning a Network Using Hping3
Lab 3: Enumeration Enumerating a Target Network Enumerating NetBios Using the SuperScan Tool Enumerating Passwords from "Default Password List" Enumerating NetBios Using the NetBios EnumeratorTool Monitoring a Network Using OpUtils Network Monitoring Tools Enumerating a Network Using SoftPerfect Network Scanner
Lab 4: System Hacking Extracting Administrator Passwords Using LCP Hiding Files Using NTFS Streams Find Hidden Files Using ADS Spy Hiding Files Using the Masker Stenography Tool Extracting Administrator Passwords Using L0phtCrack Recover PST (Outlook) Password Using the Passware Recovery Kit Forensic Tool Monitoring a System Using the Alchemy Remote Executor System Monitoring Using RemoteExec Record Keystrokes and Passwords Using Powered Logger
Lab 5: Trojans and Backdoors Building a Server Using the Bifrost Tool Creating a Server Using the ProRat Tool
Lab 6: Viruses and Worms Creating a Virus Using the JPS Virus Maker Tool Generating a Worm Using Internet Worm Maker Thing Tool
Lab 7: Sniffers Sniffing a Network Sniffing the Network Using the Colasoft Packet Builder Sniffing the Network Using the OmniPeek Network Analyzer Spoofing MAC Address Using SMAC Sniffing a Network Using the WinArpAttacker Tool Analyzing a Network Using the Colasoft Capsa Network Analyzer Sniffing Passwords Using Wireshark Performing Man-in-the-Middle Attack using Cain & Abel
Lab 8: Social Engineering Detecting Phishing Using Netcraft Detecting Phishing Using Phish Tank
Lab 9: Denial of Service Creating a Zombie Using Poison Ivy SYN Flooding a Target Host Using hping3 Creating Zombies Using Shark
Lab 10: Session Hijacking Hijacking Sessions Session Hijacking Using the Paros Proxy Hijacking an Established Session Using Firesheep
Lab 11: Hacking Webserver Footprinting Webserver Using the httprecon Tool Footprinting a Webserver Using ID Serve Cracking Remote Passwords Using Brutus Hacking Windows Server 2008 with Metasploit Framework
Lab 12: Hacking Web Applications Testing Web Applications Using the Burp Suite Website Vulnerability Scanning Using Acunetix WVS
Lab 13: SQL Injection SQl Injection Attacks on MS SQL Database Testing for SQL Injection Using IBM Rational AppScan Tool
Lab 14: Hacking Wireless Networks Cracking WEP Using AirPcap with Wireshark and Cain and Abel Detecting the Wireless Networks Using NetSurveyor Tool Discovering Wireless Networks Using Kismet Cracking A WEP Network with Aircrack-ng on Backtrack
Lab 16: Cryptography Basic Data Encrypting Using HashCalc Basic Data Encrypting Using MD5 Calculator Basic Data Encrypting Using Advance Encryption Package Basic Data Encrypting Using TrueCrypt Basic Data Encrypting Using CryptTool Certificering Yderligere Information
This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Kurset udbydes af IDG som kursusfacilitator for en ATO