SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Vision for future


                                         CEH
Course Description:

This class will immerse the student into an interactive environment where they will
be shown how to scan, test, hack and secure their own systems. Students will begin
by understanding how perimeter defenses work and then be lead into scanning and
attacking their own networks, no real network is harmed. Students then learn how
intruders escalate privileges and what steps can be taken to secure a system.

Who Should Take This Course?

This course will significantly benefit security officers, auditors, security
professionals, site administrators, and anyone who is concerned about the integrity
of the network infrastructure.

Curriculum

Module 1: Introduction to Ethical Hacking
    Why Security?
    The Security, functionality and ease of use Triangle
    Can Hacking be Ethical?

Module 2: Foot printing
    Defining Foot printing

Module 3: Scanning
    Definition of Scanning.
    Types of scanning


                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future


Module 4: Enumeration
   What is Enumeration?
   NetBios Null Sessions

Module 5: System Hacking
   Administrator Password Guessing
   Manual Password Cracking Algorithm
   Automated Password Cracking

Module 6: Trojans and Backdoors
   Effect on Business
   What is a Trojan?

Module 7: Sniffers
   Definition of sniffing
   How a Sniffer works?

Module 8: Denial of Service
   What is Denial of Service?
   Goal of DoS (Denial of Service)

Module 9: Social Engineering
   What is Social Engineering?
   Art of Manipulation

Module 10: Session Hijacking
   Understanding Session Hijacking

                   Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
              Tel : 048/9102897                 Customer Service : 0102502304
       Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

   Spoofing vs Hijacking
   How Web Servers Work?

Module 11: Hacking Web Servers
   How are Web Servers Compromised?

Module 12: Web Application Vulnerabilities
   Web Application Set-up
   Web Application Hacking

Module 13: Web Based Password Cracking Techniques
   Authentication ( Definition – Mechanisms )
   HTTP Authentication

Module 14: SQL Injection
   Attacking SQL Servers
   SQL Server Resolution Service (SSRS)

Module 15: Hacking Wireless Networks
   Introduction to Wireless Networking
   Business and Wireless Attacks

Module 16: Virus
   Virus Characteristics
   Symptoms of ‘virus-like’ attack




                   Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
              Tel : 048/9102897                 Customer Service : 0102502304
       Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future


Module 17: Physical Security
   Security statistics
   Physical Security breach incidents

Module 18: Linux Hacking
   Why Linux?
   Linux basics

Module 19: Evading Firewalls, IDS and Honeypots
   Intrusion Detection Systems
   Ways to Detect Intrusion

Module 20: Buffer Overflows
   Significance of Buffer Overflow Vulnerability
   Why are Programs/Applications Vulnerable?

Module 21: Cryptography
   Public-key Cryptography
   Working of Encryption

Module 22: Penetration Testing Course
   Introduction to Penetration Testing (PT)

Module 23: Advanced Exploit Writing

Module 24: Advanced Covert Hacking Techniques

Module 25: Advanced Virus Writing Techniques

                   Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
              Tel : 048/9102897                 Customer Service : 0102502304
       Email : info@ideal-generation.com        Website: www.ideal-generation.com

Más contenido relacionado

Similar a Ceh

certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfinfosec train
 
certified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentcertified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentpriyanshamadhwal2
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)Wail Hassan
 
M4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdfM4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdfJitendraBhatia15
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfinfosec train
 
The more you know the better you do
The more you know the better you doThe more you know the better you do
The more you know the better you doDemetrio Milea
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Website Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdfWebsite Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdfBella Nirvana Center
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chainPriyanka Aash
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Mohammed Abdul Lateef
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 

Similar a Ceh (20)

certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
certified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_contentcertified-ethical-hacker-cehv12_course_content
certified-ethical-hacker-cehv12_course_content
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)
 
M4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdfM4 Ch 1 Cyber Security.pdf
M4 Ch 1 Cyber Security.pdf
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Top 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdfTop 20 Ethical Hacker Interview Questions.pdf
Top 20 Ethical Hacker Interview Questions.pdf
 
The more you know the better you do
The more you know the better you doThe more you know the better you do
The more you know the better you do
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Website Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdfWebsite Security Testing Ahmedabad Mar 2024.pdf
Website Security Testing Ahmedabad Mar 2024.pdf
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Ethical Hacking Course
Ethical Hacking CourseEthical Hacking Course
Ethical Hacking Course
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 

Más de elshiekh1980

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diplomaelshiekh1980
 
Web design diploma
Web design diplomaWeb design diploma
Web design diplomaelshiekh1980
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administrationelshiekh1980
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administrationelshiekh1980
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialselshiekh1980
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sqlelshiekh1980
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)elshiekh1980
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administrationelshiekh1980
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database securityelshiekh1980
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)elshiekh1980
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)elshiekh1980
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008elshiekh1980
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008elshiekh1980
 

Más de elshiekh1980 (20)

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diploma
 
Web design diploma
Web design diplomaWeb design diploma
Web design diploma
 
Sql server 2005
Sql server 2005Sql server 2005
Sql server 2005
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administration
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administration
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Php
PhpPhp
Php
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sql
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administration
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)
 
N+
N+N+
N+
 
Mcse security
Mcse securityMcse security
Mcse security
 
Mcse messaging
Mcse messagingMcse messaging
Mcse messaging
 
Mcsa security
Mcsa securityMcsa security
Mcsa security
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008
 
Maintenance
MaintenanceMaintenance
Maintenance
 

Último

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 

Último (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

Ceh

  • 1. Vision for future CEH Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Who Should Take This Course? This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Curriculum Module 1: Introduction to Ethical Hacking  Why Security?  The Security, functionality and ease of use Triangle  Can Hacking be Ethical? Module 2: Foot printing  Defining Foot printing Module 3: Scanning  Definition of Scanning.  Types of scanning Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 2. Vision for future Module 4: Enumeration  What is Enumeration?  NetBios Null Sessions Module 5: System Hacking  Administrator Password Guessing  Manual Password Cracking Algorithm  Automated Password Cracking Module 6: Trojans and Backdoors  Effect on Business  What is a Trojan? Module 7: Sniffers  Definition of sniffing  How a Sniffer works? Module 8: Denial of Service  What is Denial of Service?  Goal of DoS (Denial of Service) Module 9: Social Engineering  What is Social Engineering?  Art of Manipulation Module 10: Session Hijacking  Understanding Session Hijacking Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 3. Vision for future  Spoofing vs Hijacking  How Web Servers Work? Module 11: Hacking Web Servers  How are Web Servers Compromised? Module 12: Web Application Vulnerabilities  Web Application Set-up  Web Application Hacking Module 13: Web Based Password Cracking Techniques  Authentication ( Definition – Mechanisms )  HTTP Authentication Module 14: SQL Injection  Attacking SQL Servers  SQL Server Resolution Service (SSRS) Module 15: Hacking Wireless Networks  Introduction to Wireless Networking  Business and Wireless Attacks Module 16: Virus  Virus Characteristics  Symptoms of ‘virus-like’ attack Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 4. Vision for future Module 17: Physical Security  Security statistics  Physical Security breach incidents Module 18: Linux Hacking  Why Linux?  Linux basics Module 19: Evading Firewalls, IDS and Honeypots  Intrusion Detection Systems  Ways to Detect Intrusion Module 20: Buffer Overflows  Significance of Buffer Overflow Vulnerability  Why are Programs/Applications Vulnerable? Module 21: Cryptography  Public-key Cryptography  Working of Encryption Module 22: Penetration Testing Course  Introduction to Penetration Testing (PT) Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking Techniques Module 25: Advanced Virus Writing Techniques Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com