Home | Career Tracks | Boot Camps | Course Search | Student Referral | Request Info | 1-800-482-2233 | Contact Us | Site Map

About Us
Corporate IT Training
Vocational IT Training
Other Training Information
CareerSource Solutions
Government/Military Solutions
Financing Options
Career Center
Course Catalog
Course Search
News
Evaluations

CEH: Certified Ethical Hacking Boot Camp

 

 

Click Here to View Schedules & Pricing and to Enroll Online

 

 

Duration: 5 Days

  

 

Description:

During this 5-day lab intensive course, candidates will be immersed into an interactive environment where they will learn how perimeter defenses work and then be lead into scanning and attacking their own networks. No real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class, they will have hands-on understanding and experience in Ethical Hacking.

 

 

Prerequisites:

 

-Basic knowledge of Microsoft Windows operating system
-Understanding of Networking in general

 

 

What's Included:

 

 

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers  & Onsite Certification Testing
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

 

 

 

Authorized Training:

 

 

 

The Academy is proud to be the #1 Microsoft Gold Certified Partner for Learning Solutions (CPLS) in Florida. 

 

Course Outline:

 

Module 01: Introduction to Ethical Hacking
 • Internet Crime Current Report: IC3
 • Data Breach Investigations Report
 • Types of Data Stolen From the Organizations
 • Essential Terminologies
 • Elements of Information Security
 • Authenticity and Non-Repudiation
 • The Security, Functionality, and Usability Triangle
 • Security Challenges
 • Effects of Hacking
 • Hacker Classes
 • Types of Attacks on a System
 • Defense in Depth
 • Scope and Limitations of Ethical Hacking
 • Skills of an Ethical Hacker
 • Vulnerability Research
 • Penetration Testing Methodology

 

 Module 02: Footprinting and Reconnaissance
 • Footprinting Terminologies, Objectives, and Threats
 • Public and Restricted Websites
 • Footprinting Through Search Engines and Job Sites
 • Monitoring Target Using Alerts
 • Competitive Intelligence Gathering
 • Extracting DNS Information
 • Locate the Network Range
 • Mirroring Entire Website
 • Monitoring Web Updates Using Website Watcher
 • Tracking Email Communications
 • Footprint Using Google Hacking Techniques
 • Google Hacking Tools
 • Footprinting Countermeasures and Pen Testing

 

 Module 03: Scanning Networks
 • Network Scanning
 • TCP Communication Flags
 • Scanning Techniques
 • IP Fragmentation Tools
 • Scanning Tools and Countermeasures
 • War Dialing Tools and Countermeasures
 • Banner Grabbing Tools and Countermeasures
 • Network Mappers
 • Proxy Servers and Workbench
 • HTTP Tunneling Techniques
 • Anonymizer Tools
 • Spoofing IP Address
 • Scanning Pen Testing

 

 Module 04: Enumeration
 • Techniques for Enumeration
 • Netbios Enumeration
 • Enumerating User Accounts
 • Enumerate Systems Using Default Passwords
 • Types of Enumeration
 • DNS Zone Transfer Enumeration Using nslookup
 • Enumeration Countermeasures and Pen Testing

 

 Module 05: System Hacking
 • CEH Hacking Methodology (CHM)
 • Password Cracking
 • Microsoft and Kerberos Authentication
 • Password Cracking Tools
 • Privilege Escalation
 • Keylogger
 • Types of Keystroke Loggers
 • Spyware
 • Rootkits
 • NTFS Data Stream
 • Types of Steganography
 • Disabling Auditing: Auditpol
 • Covering Tracks Tools
 • System Hacking Penetration Testing

 

 Module 06: Trojans and Backdoors
 • Purpose of Trojans
 • Indications of a Trojan Attack
 • Wrappers
 • Evading Anti-Virus Techniques
 • Types of Trojans
 • Registry Entry Monitoring Tools
 • Scanning for Suspicious Device Drivers
 • Scanning for Suspicious Windows Services
 • Scanning for Suspicious Startup Programs
 • Scanning for Suspicious Files and Folders
 • Scanning for Suspicious Network Activities
 • Trojan Countermeasures
 • Anti-Trojan Softwares
 • Pen Testing for Trojans and Backdoors

 

 Module 07: Viruses and Worms
 • Indications of Virus Attack
 • Virus Hoaxes and Analysis
 • Types of Viruses
 • Computer Worms
 • Malware Analysis Procedure
 • Online Malware Testing and Analysis Services
 • Virus Detection Methods
 • Virus and Worms Countermeasures
 • Anti-virus Tools
 • Penetration Testing for Virus

 

 Module 08: Sniffers
 • Lawful Intercept
 • Wiretapping
 • Sniffing Threats
 • Hardware Protocol Analyzers
 • MAC Spoofing/Duplicating
 • DNS Poisoning Techniques
 • Sniffing Tools
 • Discovery Tools
 • Sniffing Prevention Techniques
 • Promiscuous Detection Tools

 

 Module 09: Social Engineering
 • Behaviors Vulnerable to Attacks
 • Warning Signs of an Attack
 • Impact on the Organization
 • Types of Social Engineering
 • Insider Attack
 • Common Intrusion Tactics and Strategies for Prevention
 • Social Engineering Countermeasures: Policies
 • Identity Theft Countermeasures
 • Social Engineering Pen Testing

 

Module 10: Denial of Service
 • Symptoms of a DoS Attack
 • Cyber Criminals
 • DoS Attack Techniques
 • DoS Attack Tools
 • Detection Techniques
 • DoS/DDoS Countermeasure Strategies
 • DDoS Attack Countermeasures
 • Post-attack Forensics
 • Techniques to Defend against Botnets
 • DoS/DDoS Countermeasures
 • Enabling TCP Intercept on Cisco IOS Software
 • DoS/DDoS Protection Tool
 • Denial of Service (DoS) Attack Penetration Testing

 

 Module 11: Session Hijacking
 • Key Session Hijacking Techniques
 • Brute Forcing
 • Spoofing vs. Hijacking
 • Session Hijacking Process
 • Types of Session Hijacking
 • TCP/IP Hijacking
 • IP Spoofing: Source Routed Packets
 • Countermeasures
 • Protecting against Session Hijacking
 • Methods to Prevent Session Hijackings
 • Defending against Session Hijack Attacks
 • Session Hijacking Remediation
 • Session Hijacking Pen Testing

 

 Module 12: Hijacking Webservers
 • Webserver Market Shares
 • Webserver Architecture
 • Website Defacement
 • Webserver Misconfiguration
 • Directory Traversal Attacks
 • Web Application Attacks
 • Webserver Attack Methodology and Tools
 • Patches and Hotfixes
 • Installation of a Patch
 • Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
 • Webserver Security Tools
 • Web Server Penetration Testing

 

 Module 13: Hacking Web Applications
 • Web Application Components and Architecture
 • Web 2.0 Applications
 • Vulnerability Stack
 • Web Attack Vectors
 • Security Misconfiguration
 • Injection Flaws
 • Cookie/Session Poisoning
 • Session Fixation Attack
 • Web Services Architecture
 • Hacking Web Servers
 • Analyze Web Applications
 • Attack Data Connectivity, Web App Client, and Web Services
 • Web Services Probing Attacks and Attack Tools
 • Web Application Hacking Tools
 • Encoding Schemes
 • Web Application Countermeasures, Firewalls, and Pen Testing

 

 Module 14: SQL Injection
 • SQL Injection Threats
 • SQL Injection Attacks
 • Server Side Technologies
 • Types of SQL Injection
 • SQL Injection Methodology
 • SQL Injection Tools
 • Evading IDS
 • SQL Injection Detection Tools

 

 Module 15: Hacking Wireless Networks
 • Wireless Networks
 • Wireless Standards
 • Wireless Terminologies
 • Types of Wireless Antenna
 • Types of Wireless Encryption
 • WEP Encryption
 • WEP Issues
 • Wireless Threats
 • Wireless Hacking Methodology
 • Footprint the Wireless Network
 • Bluetooth Hacking
 • Wireless Security Layers
 • Wireless Intrusion Prevention Systems
 • Wireless IPS Deployment
 • Wi-Fi Security Auditing Tools
 • Wi-Fi Intrusion Prevention System

 

 Module 16: Evading IDS, Firewalls, and Honeypots
 • Intrusion Detection Systems (IDS) and its Placement
 • Ways to Detect an Intrusion
 • Types of Intrusion Detection Systems
 • General Indications of System Intrusions
 • Types of Firewall
 • Honeypot
 • Intrusion Detection Tool
 • Unicode Evasion Technique
 • Fragmentation Attack
 • Countermeasures
 • Firewall/IDS Penetration Testing

 

Module 17: Buffer Overflow
 • Buffer Overflows
 • Stack-Based Buffer Overflow
 • Stack Operations
 • Code Analysis
 • BoF Detection Tools
 • Defense Against Buffer Overflows
 • BoF Security Tools
 • Buffer Overflow Penetration Testing

 

 Module 18: Cryptography
 • Cryptography
 • Ciphers
 • Cryptography Tools
 • Certification Authorities
 • Digital Signature
 • Disk Encryption
 • Cryptography Attacks
 • Code Breaking Methodologies
 • Cryptanalysis Tools
 • Online MD5 Decryption Tool

 

 Module 19: Penetration Testing
 • Security and Vulnerability Assessments
 • Penetration Testing
 • Testing Points and Locations
 • Types of Penetration Testing
 • Common Penetration Testing Techniques
 • Penetration Testing Methodology
 • Outsourcing Penetration Testing Services
 • Evaluating Different Types of Pentest Tools


Academy Code of Honor:  

 

The Academy guarantees that students shall pass all vendor examinations during the training program or may re-attend within one year of the program completion date. Students will only be responsible for accommodations and vendor exam fees.  

 

Student Logon | Legal Terms | Request Information
Powered By Veplan