Certified Ethical Hacker 9 (CEH V9)

Transcription

Certified Ethical Hacker 9 (CEH v9)What's New in CEH V9? Focus on New Attack VectorsNew Vulnerabilities including Heartbleed & PoodleMore than 40% new tools & over 1500 new labsThreats to latest operating systems and cloud computing technologyThreats to mobile platforms & tablet computersCoverage of new case studies, trojans, viruses & backdoors

CEH Training by ATRCThis CEH course puts you in the driver’s seat of a hands on environment with a systematic process.Here, you will be exposed to an entirely different way of achieving optimal information securityposture in their organization; by hacking it! You will scan, test, hack and secure your own systems.You will be thought the five phases of CEH and thought how you can approach your target andsucceed at breaking in every time! The five phases include Reconnaissance, Gaining Access,Enumeration, Maintaining Access, and covering your tracks.Underground Cracking ToolsThe hacking tools and techniques in each of these five phases are provided in detail in anencyclopedic approach to help you identify when an attack has been used against your own targets.Why then is this training called the CEH Course? This is because by using the same techniques asthe bad guys, you can assess the security posture of an organization with the same approach thesemalicious crackers use, identify weaknesses and fix the problems before they are identified by theenemy, causing what could potentially be a catastrophic damage to your respective organization.We live in an age where attacks are all susceptible and come from anyplace at any time and wenever know how skilled, well funded, or persistent the threat will be. Throughout the CEH course,you will be immersed in a cracker's mindset, evaluating not just logical, but physical security.Exploring every possible point of entry to find the weakest link in an organization. From the enduser, the secretary, the CEO, misconfigurations, vulnerable times during migrations eveninformation left in the dumpster.

OverviewCEHV9 is the most recent and progressive course covering 270 attack technologies within 18extensive modules an ethical cracker should be aware of. This course helps in mastering an CEHmethodology to be used in CEH scenarios or penetration testing. The course also helps cracking theEC Council CEH exam 312 50.Course Objective: Understand a variety of hacking attacks and threats to the cloud computing technology Specify various remedies to encounter cloud computing attacksUnderstand in depth pen testing techniques to identify threats in cloud systemsExplore Heart bleed CVE 2014 0160, Shellshock CVE 2014 6271 and Poodle CVE 2014 3566Explore how to crack using mobile phonesLearn about latest virus, Trojan and Back doorsUnderstand information security controls, laws and standards

Selected Learning Objectives Communicate clearly and correctly to avoid misunderstanding and get your message across Develop and use your listening skills to solve problems, diffuse conflict, teach staff, and be a moreproductive manager or team leader Ask the right type of question to elicit information, encourage a response, or create a relationship Master the techniques of successful presentations from planning to delivery Analyze your audience before communicating your ideas in any format Choose the most appropriate mode for communicating your message Use effective language to express your ideas clearly in well constructed letters, proposals, memos,and e mailCourse DescriptionThe CEH program is the core of the most desired information security training system anyinformation security professional will ever want to be in. The CEH, is the first part of a 3 part EC Council Information Security Track which helps you master hacking technologies. You willbecome a cracker, but hopefully an ethical one! A very “ironical” statement indeed.As the security mindset in any organization must not be limited to the silos of a certain vendor,technologies or pieces of equipment, This course was designed to provide you with the tools andtechniques used by crackers and information security professionals alike to break into anorganization. As we put it, “To beat a cracker, you need to think like a cracker”. This coursewill immerse you into the cracker Mindset so that you will be able to defend against future attacks.It puts you in the driver’s seat of a hands on environment with a systematic CEH process.Here, you will be exposed to an entirely different way of achieving optimal information securityposture in their organization; by cracking it! You will scan, test, hack and secure your own systems.You will be thought the Five Phases of CEH and thought how you can approach yourtarget and succeed at breaking in every time! The five phases include Reconnaissance, GainingAccess, Enumeration, Maintaining Access, and covering your tracks.The tools and techniques in each of these five phases are provided in detail in an encyclopedicapproach to help you identify when an attack has been used against your own targets. Why shouldwe learn cracking ? This is because by using the same techniques as the bad guys, you can assessthe security posture of an organization with the same approach these malicious crackers use,identify weaknesses and fix the problems before they are identified by the enemy, causing what

could potentially be a catastrophic damage to your respective organization.Throughout the CEH course, you will be immersed in a cracker's mindset, evaluating not justlogical, but physical security.What is new in version 9This is the worlds most advanced CEH course with 18 of the most current security domains anyethical cracker will ever want to know when they are planning to beef up the information securityposture of their organization. In 18 comprehensive modules, the course covers 270 attacktechnologies, commonly used by crackers.Real Life ScenarioOur security experts have designed over 140 labs which mimic real time scenarios in the course tohelp you “live” through an attack as if it were real and provide you with access to over 2200commonly used hacking tools to immerse you into the cracker world.

Who is it for ?The CEH training course will significantly benefit security officers, auditors, security professionals,site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Certified CEH FAQsWhat makes the CEH and Countermeasures course different from othercourses in the market?The CEH and Countermeasures course prepares candidates for the CEH exam offered by EC Council. The course focuses on hacking techniques and technology from an offensive perspective.The advanced security course is regularly updated to reflect latest developments in the domain,including new hacking techniques, exploits, automated programs as well as defensiverecommendations as outlined by experts in the field. The CEH body of knowledge representsdetailed contributions from security experts, academicians, industry practitioners and the securitycommunity at large.What is "Cracking techniques and technology"?Cracking techniques represent ways and means by which computer programs can be made tobehave in ways they are not meant to. These techniques extend beyond the technology domain andcan be applied to test security policies and procedures.Cracking technology is used to refer to those tools and automated programs that can be used byperpetrators against an organization to incur critical damage. As technology advances, the skillrequired to execute a hack is much lesser as pre compiled programs are available to effect havocwith simple point and click.Aren't tools meant for script kiddies?Does it matter if an elite cracker writes a buffer overflow or a script kiddy runs a tool if the targetsystem gets compromised anyway? The point of emphasis here is that the enemy may beintellectually great or small, but he requires just one port of entry to wreck damage while theorganization has the entire perimeter to guard with limited time and resources.Who teaches your course?Since the CEH Course is related more to cracking, it would be apt to have a real cracker teach it.However real crackers are usually those who used to be spoiled brats who had plenty of time toexplore the field. So what we have is real hackers who have system administration experiencecollaborating along with real crackers who used to penetrate networks as consultants for our coursesat ATRC. Certainly, experience is the greatest teacher. A real hacker would not know all the tricksand techniques which are used by the crackers. Many techniques are representative of the different

crackers. EC Council gets a signature from the students so they can adhere to a code of ethics andencourages security professionals with significant years of teaching exposure in the industry andsecurity related experience to handle its security related courses. However in our experience ofmore than 20 years, those who want to crack shall do so whether they sign or not. Also real crackersdo not really need such a course to learn the techniques. The certifications are useful for two things.Telling the HR people that you know something, and making IT people learn the basics of securityso they are not as lame as they are usually in their default state. Why is this in the brochure ?Because this brochure is made by a real hacker who is going to teach this to you. So you shall begetting the real guru stuff. Not just what you are expected to know in the exam. Also real hackerswho have been sysops or sysadmins know many techniques on stopping crackers which are notcovered in any book. They are specific to the sysadmins themselves. Just like different crackershave their own special recipes to penetrate.Isn't this knowledge harmful? Why do you make it available so easily tothe public?EC Council fulfills its social responsibility by ensuring that only persons with a minimum of twoyears of security related experience are eligible for the course. In addition all candidates arerequired to sign an agreement where they agree to respect the knowledge acquired and not misuse itin any way. The candidate also agrees to abide by all legal laws of the land in the use of thusacquired knowledge. Besides the CEH exam is a tough one to pass as students must have in depthknowledge to achieve the globally recognized CEH certification.What can I take back to my organization if I certify as a CEH?EC Council believes in giving back to the security community as it has partaken of it. When you area CEH, you are more than a security auditor or a vulnerability tester or a penetration tester alone.You are exposed to security checklists that will help you audit the organization's information assets,tools which will check for vulnerabilities that can be exploited and above all a methodology toassess the security posture of your organization by doing a penetration test against it. In short, theknowledge you will acquire has practical value to make your work place a more secure and efficientone.

It is all too technical. Do you reflect real world business issues?The value of CEH lies in its practical value. Over 20 domains, students are exposed to the businessrisks involved and the potential damage that can result due to negligence. Candidates are able tomake an evaluated opinion regarding the acceptable risk an organization can face should it chooseto address a security concern.What is the employment value of CEH?The ANSI accredited CEH program is primarily targeted at security professionals who want toacquire a well rounded body of knowledge to have better opportunities in this field. Acquiring aCEH means the candidate has a minimum baseline knowledge of security threats, risks andcountermeasures. Organizations can rest assured that they have a candidate who is more than asystems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. Thecandidate is assured of having both business and technical knowledge.Where does CEH stand when compared to other educational offeringsin the field of information Security?Consider this. A security defense course educates regarding proper configuration, firewalls, orrather preemptive security. CEH takes the alternative approach defense in depth by attacking thesystems. This is in sharp contrast to courses that teach defensive tactics alone. CEH impartsoffensive tactics supplemented with defensive countermeasures. This ensures that the CEHprofessional can have a holistic security perspective of the organization.I would like to provide professional service as a CEH professional.What can I expect to be paid per assignment?The remuneration per assignment will vary with specifics of the client environment. However, onan average you can expect to be paid around 15,000 to 45,000 per assignment.Can I pursue self study and attempt the exam instead of attendingformal training?The answer is yes. You must show 2 years of work experience in security related field. You mustalso submit CEH exam eligibility application and obtain authorization from EC Council before youcan attempt the exam. For more details, please click HERE.

I am a CEH. What is my level?Congratulations on becoming a CEH. You have joined elite group of professionals around theworld. Your next level is to become a Licensed Penetration Tester (LPT).

Legal AgreementCEH and Countermeasures course mission is to educate, introduce and demonstrate cracking toolsfor penetration testing purposes only. Prior to attending this course, you will be asked to sign anagreement stating that you will not use the newly acquired skills for illegal or malicious attacks andyou will not use such tools in an attempt to compromise any computer system, and to indemnifyEC Council and ATRC with respect to the use or misuse of these tools, regardless of intent.What is New in the CEHV9 CourseThis is the worlds most advanced cracking course with 18 of the most cu

Certified Ethical Hacker 9 (CEH v9) What's New in CEH V9? Focus on New Attack Vectors New Vulnerabilities including Heartbleed & Poodle More than 40% new tools & over 1500 new labs Threats to latest operating systems and cloud computing technology Threats to mobile platforms & tablet computers Coverage of new case studies, trojans, viruses & backdoors. CEH Training by .