CEH Training (Certified Ethical Hacker Training)
According to CEH Prep Guide by Wiley, An ethical hacker attempts to duplicate the intent and actions of malicious hackers without causing harm. Ethical hackers conduct penetration tests to determine what an attacker can find out about an information system, whether a hacker can gain and maintain access to the system, and whether the hacker’s tracks can be successfully covered without being detected. The ethical hacker operates with the permission and knowledge of the organization they are trying to defend and tries to find weaknesses in the information system that can be exploited. In some cases, to test the effectiveness of their information system security team, an organization will not inform their team of the ethical hacker’s activities. This situation is referred to as operating in a double blind environment. To operate effectively, the ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support the ethical hacker’s efforts.
Certified Ethical Hacker Training Course Curriculum
Introduction to Ethical Hacking
What is Hacking? What is Ethical Hacking? Who is an Ethical Hacker, Types of Hacking Methodologies
Fundamentals of Networks and Computer Systems
TCP/IP, SubNet, Network Devices, MAC Addresses, Firewall, DMZ, Proxy Servers, Basics of Operating Systems, Windows, Linux, Mac OS
What is Cryptography? Difference between Symmetric and Assymetric Cryptography, What is Hashing?, IPSec and SSL
Phases of Ethical Hacking
What is Footprint? Scanning, Enumeration and System Hacking, How to scan Ports?, Different types of Scans, Fingerprinting etc, LDAP, Active Directory, SMTP, Authentication, Authorization, System Access
What is Malware? Types of Malware, Trojans, Worms, Viruses
Sniffing Tools, Wireshark, Detecting Sniffing Attacks
Denial of Service
What is Dos? Types of Attacks, DDoS Attacks, Dos Tools, DDoS Tools
Spoofing, Stateful and Stateless Sessions, Active and Passive Attacks, Network Hijacking
WebServers and Web Applications
What are WebServers and Web Applications? 2-Tier and 3- Tier Architecture, Common Flaws and Attacking Methods
Introduction, Examples, Altering Data with SQL, SQL Injection CounterMeasures
Overview, Hacking, Locate Wireless Networks
Introduction, Simple Controls, Mobile Devices, Defensive Paths
The online course session was good with a lot of discussion on the subject in depth. Demo's were good and the trainer cleared my doubts clearly.The trainer having a very good command on the subject.
Real time/live scenario's were included in the training sessions. The trainer's has very good command on the subject. Thank you..
I like the training period from Tekslate. The course is very well designed that helps to keep track until we demonstrate subject mastery.
Using most innovative teaching techniques, Tekslate intended to help students to learn through online. A great part of the coursework is allowed to use and earn certification by the time they finish t ...