Course Information
Course Objectives
- Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
- Identify and defend against webserver attacks, including wireless and mobile hacking
- Be able to evade IDS, firewalls, and honeypots
- Recognize and address threats that accompany cloud computing and cryptography
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50
Prerequisites & Requirements
There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.
- Introduction to Ethical Hacking
Key InfoSec issues; incident management process and penetration testing - Footprinting and Reconnaissance
Various types of footprinting, tools and countermeasures - Scanning Networks
Network scanning techniques and countermeasures - Enumeration
Enumeration techniques and countermeasures - System Hacking
System hacking methodology, steganography and steganalysis - Malware Threats
Analysis and countermeasure for malware types including trojans, viruses and worms - Evading IDS, Firewalls and Honeypots
IDS and honeypot evasion tools, techniques and countermeasures - Sniffing
Packet sniffing techniques and defense - Social Engineering
Techniques and countermeasures for social engineering and identify theft - Denial of Service
DoS/DDoS attack tools, technique and countermeasures - Session Hijacking
Session hijacking technique and countermeasures - Hacking Web Servers
Methodology and countermeasures for webserver attacks - Hacking Web Applications
Methodology and countermeasures for web application attacks - SQL Injection
SQL injection attacks and detection tools - Hacking Wireless Networks
Wireless encryption hacking tools, techniques and methodology; WiFi security - Hacking Mobile Platforms
Mobile platform attack vector; mobile security guidelines and tools; and Android, iOS and Windows vulnerabilities - Cloud Computing
Cloud computing concepts, threats and attacks; security techniques and tools - Cryptography
Cryptography ciphers, attack and tools; public key infrastructure (PKI)
Instructor
Eric Reed
Since 2005, Eric Reed has provided security consulting to large organizations including Fortune 500 companies and the United States military. His pass rate for CEH, CHFI, and ECSA/LPT exams is 95%. He is a member of the EC-Council certification organization’s Circle of Excellence.