Certified Ethical Hacker Instructor-Led Training

Transcription

Certified Ethical Hacker Instructor-Led TrainingDemand for Certified Ethical Hacker has increased exponentially in last few years. Most of the dataare on digital platform now and hence the need for its security is a must.Ethical hacking course prepares you to be the security defender and protects the confidential datafrom cyber-attacks and unwanted disruptions.The need of certified professionals in the IT industry is rising day by day where the professionals aresupposed to protect the data, network and transactions of informations.About this training Study Material:- 24*7 Lab Access, Live lectures of Training, Streaming Recorded Videos,Online Lab Workbook, and Remote Virtual Lab access. Duration:- 1 monthWhat you will learn? Techniques of Network ScanningTechniques of Network Scanning countermeasuresLaws and standards of Information securityCovering footprinting through the website, social media, search engineFootprinting toolsEnumeration techniques. For instance, NetBIOS, SNMP, NTP, NFS, SMTP, DNS,VoIP.System hacking. Its methodology, steganography, and steganalysis attacks.Methodologies of web server attacks and a comprehensive attack to refrain them.SQL injection attacks and tools to detect them.Hacking tools, methodologies, encryption and security of wireless.Mobile platform security. Including its tools and guidelines.Sniffing techniques and defending.Social engineering techniques and identifying theft.Attack techniques of Dos and DDoS.Session Hijack- application and network. Its concepts and tools.Firewall, IDS, IPS concepts, solutions and evading tools.Cloud computing and security. Methods of threats and attacking.Penetration testing and roadmap.Threats and defence of IoT and OT platforms.Cryptography and PKI, its attacks and tools.CertificationCEH 312-50 (ECC EXAM) & 312-50 (VUE)

About InstructorThe course will be conducted by the professional and verified instructor of UniNets. His 14 years ofexperience will make the course to go on a systematic pattern where all the topics will be coveredfrom the scratch. He has worked with big companies as professional employee and now working asprofessional trainer. The candidates will be able to get the essence of his both side experiences.Course Content Network and Communication Technologieso Networking technologies - instance, hardware & infrastructureo Web technologies - instance, web 2.0 &skypeo Systems technologies - Communication protocolso Telecommunication technologieso Mobile technologieso Wireless terminologieso Cloud computingo Cloud deployment modelsInformation Security Threats and Attack Vectorso Malware - Trojan, virus, backdoor, wormso Malware operationso Information security threats and attack vectorso Attacks on a system - DoS, DDoS, wireless threats, web server and web applicationattacks, SQL injection, session hijackingo Botnet - Cloud computing threats and attackso Mobile platform attack vectorso Cryptography attacksInformation Security Technologieso Information security elementso Information security management - IA, Defense-in-Depth, incident managemento Security trendso Hacking and ethical hackingo Vulnerability assessment and penetration testingo Cryptographyo Encryption algorithmso Wireless encryptiono Bring Your Own Device (BYOD)o Backups and archiving (instance, local, network)o IDS, firewalls, and honeypotsInformation Security Assessment and Analysiso Data analysiso Systems analysiso Risk assessmentso Vulnerability assessment and penetration testingo Technical assessment methodso Network sniffingo Malware analysisInformation Security Assessment Processo Footprinting

o Scanning - Port scanning, vulnerability scanning, proxy chaining, IP spoofing, bannergrabbing, network discovery.o Enumerationo System hacking - password cracking, executing applications, privilege escalation, hidingfiles, covering tracksInformation Security Controlso Systems security controlso Application/file servero IDSo Firewallso Cryptographyo Disk Encryptiono Network securityo Physical securityo Threat modelingo Biometricso Wireless access technology - networking, RFID, Bluetootho Trusted networkso Privacy/confidentiality (with regard to engagement)Information Security Attack Detectiono Security policy implicationso Vulnerability detectiono IP Spoofing detectiono Verification procedures - false positive/negative validationo Social engineering (human factors manipulation)o Vulnerability scanningo Malware detectiono Sniffer detectiono DoS and DDoS detectiono Detect and block rogue APo Evading IDS - evasion, fragmentationo Evading Firewall - firewalking, tunnelingo Honeypot detectiono SteganalysisInformation Security Attack Preventiono Defend against web server attackso Patch managemento Encoding schemes for web applicationo Defend against web application attackso Defend against SQL injection attackso Defend against wireless and Bluetooth attackso Mobile platforms securityo Mobile Device Management (MDM)o BYOD Securityo Cloud computing securityInformation Security Systemso Network/host based intrusiono Boundary protection applianceso Access control mechanisms - smart cardso Cryptography techniques - IPSec, SSL, PGPo Domain name system (DNS)o Network topologieso Subnetting

ooo Routers / modems / switchesSecurity modelsDatabase structuresInformation Security Programso Operating environments - Linux, Windows, Maco Anti-malware systems and programs - anti-keylogger, anti-spyware, anti-rootkit, antitrojan, anti-viruso Wireless IPS deploymento Programming languages - C , Java, C#, Co Scripting languages - PHP, JavascriptInformation Security Toolso Network/wireless sniffers - Wireshark, Airsnorto Port scanning tools - Nmap, Hpingo Vulnerability scanner - Nessus, Qualys, Retinao Vulnerability management and protection systems - Founds tone, Ecorao Log analysis tools - Exploitation toolso Footprinting tools - Maltego, FOCA, Recon-ngo Network discovery tools - Network Topology Mappero Enumeration tools - SuperScan, Hyena, NetScanTools Proo Steganography detection tools - Malware detection toolso DoS/DDoS protection tools - Patch management tool (MBSA)o Web Server security toolso Web application security tools (eg: Acunetix WVS)o Web application firewall (eg: dotDefender)o SQL injection detection tools - IBM Security AppScano Wireless and Bluetooth security toolso Information Security Toolso Android, iOS, Windows Phone OS, and BlackBerry device security toolso MDM Solutionso Mobile Protection Toolso Intrusion Detection Tools - Snorto Hardware and software firewalls - Comodo Firewallo Honeypot tools - KFSensero IDS/Firewall evasion tools - Traffic IQ Professionalo Packet fragment generatorso Honeypot Detection Toolso Cloud security tools - Core CloudInspecto Cryptography tools - Advanced Encryption Packageo Cryptography toolkit - OpenSSLo Disk encryption toolso Cryptanalysis tool - CrypToolInformation Security Procedureso Cryptographyo Public key infrastructure (PKI)o Digital signature and Pretty Good Privacy (PGP)o Security Architecture (SA)o Service oriented architectureo Information security incidento N-tier application designo TCP/IP networking (instance, network routing)o Security testing methodologyInformation Security Assessment Methodologieso Web server attack methodology

ooooo Web application hacking methodologySQL injection methodology and evasion techniquesSQL injection evasion techniquesWireless and Bluetooth hacking methodologyMobile platform (Android, iOS, Windows Phone OS, and BlackBerry) hackingmethodologyo Mobile Rooting and JailbreakingInformation Security Policies/Laws/Actso Security policieso Compliance regulations (instance, PCI-DSS, SOX)Ethics of Information Securityo Professional code of conducto Appropriateness of hackingNote: ***Most of the course topics are covered with hands-on lab exercises and others aretheoreticalThank YouVisit ushttps://www.uninets.com/

CEH 312-50 (ECC EXAM) & 312-50 (VUE) About Instructor The course will be conducted by the professional and verified instructor of UniNets. His 14 years of experience will make the course to go on a systematic pattern where all the topics will be covered from the scratch. He has worked with big companies as professional employee and now working as professional trainer. The candidates will be .