Certified Ethical Hacker

3617

Certified Ethical Hacker

If you''re concerned about the integrity of your network''s infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network''s defenses. You''ll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you''ll also learn how intruders operate and the steps to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

This course includes one exam voucher for the Certified Ethical Hacker (CEH) v9 exam.

  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure

Prerequisites:
  • At least two years of IT security experience
  • A strong working knowledge of TCP/IP
  • Security+ Prep Course is highly recommended
Follow-on Course:

Computer Hacking Forensic Investigator (CHFI) v9

Outline

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Malware Threats
7. Sniffing
8. Social Engineering
9. Denial of Service
10. Session Hijacking
11. Hacking Webservers
12. Hacking Web Applications
13. SQL Injection
14. Hacking Wireless Networks
15. Hacking Mobile Platforms
16. Evading IDS, Firewalls, and Honeypots
17. Cloud Computing
18. Cryptography

Labs

1. Footprinting and Reconnaissance
2. Scanning Networks
3. Enumberation
4. System Hacking
5. Malware Threats
6. Sniffing
7. (Export)
8. Social Engineering
9. Denial of Service
10. System Hijacking
11. Hacking Web Application
12. SQL Injection
13. Hacking Wireless Networks
14. Hacking Mobile Platforms
15. Evading IDS, Firewalls, and Honeypots

Upcoming Classes

Dates Location GTR  
Sep 16-20 (8:30am-4:30pm) EDT
Oct 7-11 (11:30am-7:30pm) EDT
Oct 21-25 (8:30am-4:30pm) EDT
Nov 4-8 (11:30am-7:30pm) EST
Nov 18-22 (8:30am-4:30pm) EST

Questions?

Whether you need assistance scheduling a class for yourself or for your group, GCA's Education Account Manager's will craft a customized training solution to meet the needs of your organization.