SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Vision for future


                                         CEH
Course Description:

This class will immerse the student into an interactive environment where they will
be shown how to scan, test, hack and secure their own systems. Students will begin
by understanding how perimeter defenses work and then be lead into scanning and
attacking their own networks, no real network is harmed. Students then learn how
intruders escalate privileges and what steps can be taken to secure a system.

Who Should Take This Course?

This course will significantly benefit security officers, auditors, security
professionals, site administrators, and anyone who is concerned about the integrity
of the network infrastructure.

Curriculum

Module 1: Introduction to Ethical Hacking
    Why Security?
    The Security, functionality and ease of use Triangle
    Can Hacking be Ethical?

Module 2: Foot printing
    Defining Foot printing

Module 3: Scanning
    Definition of Scanning.
    Types of scanning


                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future


Module 4: Enumeration
   What is Enumeration?
   NetBios Null Sessions

Module 5: System Hacking
   Administrator Password Guessing
   Manual Password Cracking Algorithm
   Automated Password Cracking

Module 6: Trojans and Backdoors
   Effect on Business
   What is a Trojan?

Module 7: Sniffers
   Definition of sniffing
   How a Sniffer works?

Module 8: Denial of Service
   What is Denial of Service?
   Goal of DoS (Denial of Service)

Module 9: Social Engineering
   What is Social Engineering?
   Art of Manipulation

Module 10: Session Hijacking
   Understanding Session Hijacking

                   Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
              Tel : 048/9102897                 Customer Service : 0102502304
       Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

   Spoofing vs Hijacking
   How Web Servers Work?

Module 11: Hacking Web Servers
   How are Web Servers Compromised?

Module 12: Web Application Vulnerabilities
   Web Application Set-up
   Web Application Hacking

Module 13: Web Based Password Cracking Techniques
   Authentication ( Definition – Mechanisms )
   HTTP Authentication

Module 14: SQL Injection
   Attacking SQL Servers
   SQL Server Resolution Service (SSRS)

Module 15: Hacking Wireless Networks
   Introduction to Wireless Networking
   Business and Wireless Attacks

Module 16: Virus
   Virus Characteristics
   Symptoms of ‘virus-like’ attack




                   Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
              Tel : 048/9102897                 Customer Service : 0102502304
       Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future


Module 17: Physical Security
   Security statistics
   Physical Security breach incidents

Module 18: Linux Hacking
   Why Linux?
   Linux basics

Module 19: Evading Firewalls, IDS and Honeypots
   Intrusion Detection Systems
   Ways to Detect Intrusion

Module 20: Buffer Overflows
   Significance of Buffer Overflow Vulnerability
   Why are Programs/Applications Vulnerable?

Module 21: Cryptography
   Public-key Cryptography
   Working of Encryption

Module 22: Penetration Testing Course
   Introduction to Penetration Testing (PT)

Module 23: Advanced Exploit Writing

Module 24: Advanced Covert Hacking Techniques

Module 25: Advanced Virus Writing Techniques

                   Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
              Tel : 048/9102897                 Customer Service : 0102502304
       Email : info@ideal-generation.com        Website: www.ideal-generation.com

Más contenido relacionado

Similar a Ceh

certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfinfosec train
 
certified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentcertified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentpriyanshamadhwal2
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)Wail Hassan
 
M4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdfM4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdfJitendraBhatia15
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfinfosec train
 
The more you know the better you do
The more you know the better you doThe more you know the better you do
The more you know the better you doDemetrio Milea
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Website Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdfWebsite Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdfBella Nirvana Center
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chainPriyanka Aash
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Mohammed Abdul Lateef
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 

Similar a Ceh (20)

certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
certified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentcertified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_content
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)
 
M4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdfM4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdf
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdf
 
The more you know the better you do
The more you know the better you doThe more you know the better you do
The more you know the better you do
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Website Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdfWebsite Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdf
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Ethical Hacking Course
Ethical Hacking CourseEthical Hacking Course
Ethical Hacking Course
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 

Más de elshiekh1980

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diplomaelshiekh1980
 
Web design diploma
Web design diplomaWeb design diploma
Web design diplomaelshiekh1980
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administrationelshiekh1980
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administrationelshiekh1980
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialselshiekh1980
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sqlelshiekh1980
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)elshiekh1980
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administrationelshiekh1980
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database securityelshiekh1980
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)elshiekh1980
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)elshiekh1980
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008elshiekh1980
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008elshiekh1980
 

Más de elshiekh1980 (20)

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diploma
 
Web design diploma
Web design diplomaWeb design diploma
Web design diploma
 
Sql server 2005
Sql server 2005Sql server 2005
Sql server 2005
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administration
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administration
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Php
PhpPhp
Php
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sql
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administration
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)
 
N+
N+N+
N+
 
Mcse security
Mcse securityMcse security
Mcse security
 
Mcse messaging
Mcse messagingMcse messaging
Mcse messaging
 
Mcsa security
Mcsa securityMcsa security
Mcsa security
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008
 
Maintenance
MaintenanceMaintenance
Maintenance
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Ceh

  • 1. Vision for future CEH Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Who Should Take This Course? This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Curriculum Module 1: Introduction to Ethical Hacking  Why Security?  The Security, functionality and ease of use Triangle  Can Hacking be Ethical? Module 2: Foot printing  Defining Foot printing Module 3: Scanning  Definition of Scanning.  Types of scanning Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 2. Vision for future Module 4: Enumeration  What is Enumeration?  NetBios Null Sessions Module 5: System Hacking  Administrator Password Guessing  Manual Password Cracking Algorithm  Automated Password Cracking Module 6: Trojans and Backdoors  Effect on Business  What is a Trojan? Module 7: Sniffers  Definition of sniffing  How a Sniffer works? Module 8: Denial of Service  What is Denial of Service?  Goal of DoS (Denial of Service) Module 9: Social Engineering  What is Social Engineering?  Art of Manipulation Module 10: Session Hijacking  Understanding Session Hijacking Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 3. Vision for future  Spoofing vs Hijacking  How Web Servers Work? Module 11: Hacking Web Servers  How are Web Servers Compromised? Module 12: Web Application Vulnerabilities  Web Application Set-up  Web Application Hacking Module 13: Web Based Password Cracking Techniques  Authentication ( Definition – Mechanisms )  HTTP Authentication Module 14: SQL Injection  Attacking SQL Servers  SQL Server Resolution Service (SSRS) Module 15: Hacking Wireless Networks  Introduction to Wireless Networking  Business and Wireless Attacks Module 16: Virus  Virus Characteristics  Symptoms of ‘virus-like’ attack Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 4. Vision for future Module 17: Physical Security  Security statistics  Physical Security breach incidents Module 18: Linux Hacking  Why Linux?  Linux basics Module 19: Evading Firewalls, IDS and Honeypots  Intrusion Detection Systems  Ways to Detect Intrusion Module 20: Buffer Overflows  Significance of Buffer Overflow Vulnerability  Why are Programs/Applications Vulnerable? Module 21: Cryptography  Public-key Cryptography  Working of Encryption Module 22: Penetration Testing Course  Introduction to Penetration Testing (PT) Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking Techniques Module 25: Advanced Virus Writing Techniques Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com