Certified ethical hacker (CEH)

4 days training event

6100-3075

Course Outlines - Download PDF

Introduction

  • Introduction

  • Ethics and Ethical Hacking

Foundations

  • Network Topologies

  • Communications Models

  • OSI vs TCP/IP

  • Internet Protocol

  • IP Subnetting

  • IP Subnetting Further Explained

  • Subnetting Assignment

  • IPv6

  • IPv6 Rationale

  • User Datagram Protocol (UDP)

  • Transmission Control Protocol (TCP)

  • Network Design

  • Ethernet

  • Wireless Networks

  • Bluetooth

  • Cloud Computing Services

  • Cloud Computing Networking

Cryptography

  • Introduction

  • What is Cryptography?

  • Symmetric Cryptography

  • Diffie-Hellman and Key Derivation

  • Asymmetric Cryptography

  • Encryption Assignment

  • Hybrid CryptoSystems

  • Generating Certificates

  • Cryptographic Hashes

  • PGP vs Certificate Authority

Ethical Hacking Testing Methodology

  • Introduction

  • Basic Methodology

  • Open Source Recon with DNS and whois

  • Open Source Recon with Web Sites

  • Recon Assignment

  • Open Source Recon with Maltego

  • Port Scanning with Nmap

  • Enumeration with Nmap

  • Using the Nmap Scripting Engine

  • Scanning Assignment

  • Password Cracking with John the Ripper

  • Password Cracking with Rainbow Tables

  • Vulnerability Scanning with OpenVAS

  • Vulnerability Scanning with Nessus

  • Searching for Exploits

  • Google Hacking

  • Using Metasploit

  • Using Meterpreter

  • Social Engineering

  • Automating Social Engineering Attacks

Web Application Testing

  • Introduction

  • Web Application Architecture

  • SQL Injection

  • XML Entity Injection

  • Cross-Site Scripting

  • Automated Testing with Burp Suite

  • Automated Testing with ZED Attack Proxy

  • Vulnerability Remediation

Certified Ethical Hacker

Malware Operations

  • Introduction

  • Malware Types

  • Infection Vectors

  • Botnets

  • Command and Control

  • Anti-Virus

  • Static Analysis With Debuggers

  • Static Analysis With Metadata

  • Dynamic Analysis With Virtual Machines

  • Dynamic Analysis With Sandboxes

Software Security

  • Introduction

  • Types of Languages

  • Memory Layout of Process

  • Buffer Overflows

  • Heap Spraying

  • Protecting Against Software Attacks

  • Secure Programming Practices

  • Methodologies

  • Threat Modeling

  • Software Isolation

Wireless Networking

  • Introduction

  • Primer to 802.11

  • Handshakes

  • WEP Encryption

  • WPA Encryption

  • Deauthentication Attacks

Network Design

  • Introduction

  • Gathering Requirements

  • Defence in Depth

  • Defence in Breadth

  • Logging

  • Security Information and Event Management

  • Defensible Network Architecture

  • Security Controls

Governance

  • Introduction

  • Risk

  • Threats and Vulnerabilities

  • Policy Development

  • Standards and Procedures

  • Security Operations

Conclusion

  • Conclusion

TRAINING LOCATIONS

أماكن ومقرات التدريب حول العالم

Dubai

Dubai

Kuala Lumpur

Kuala Lumpur

Tunis

Tunis

Istanbul

Amman

Amman

Sunny resort beach with palm tree at the coast shore of Red Sea in Sharm el Sheikh, Sinai, Egypt, Asia in summer hot. Bright sunny light

Sharm El Sheikh

Ottawa

Ottawa

Paris