Font size:

Ethical Hacking Fundamentals

Considering the effects of hacking

  • Reviewing the elements of information security
  • The security, functionality and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analyzing Trojan activity

Dissecting viruses, worms and sniffers

  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

  • Cross–Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks

Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

Ethical Hacking Fundamentals

Considering the effects of hacking

  • Reviewing the elements of information security
  • Evaluating the security, functionality and usability triangle

Outlining the role of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying system attack types: operating system, application level, shrink-wrap code and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Assessing the methodology of penetration testing

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for and collecting a company's information
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS evasion and IP fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts and systems using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and executing applications
  • Defending against password cracking, keyloggers, spyware and rootkits

Uncovering Trojans and backdoors

  • Detecting a Trojan attack
  • Scanning for suspicious entries, services, programs, files and folders

Dissecting viruses, worms and sniffers

  • Stages of virus life
  • Types of viruses
  • Recognizing key indicators of a virus attack
  • Writing a simple virus program
  • Analyzing worms and malware
  • Differentiating between passive and active sniffing

Social engineering and Denial of Service (DoS)

  • Common targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to corporate networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking Web applications and wireless networks

  • Cross-Site Scripting (XSS) and Web application DoS attacks
  • Encoding schemes to defend against SQL injection, command injection, Web services and other attacks
  • Breaking WEP and WPA/WPA2 encryption
  • Employing wireless intrusion prevention systems

Hijacking sessions and Web servers

  • Spoofing vs. hijacking
  • Protecting against and preventing hijacking by implementing appropriate countermeasures

Evading IDS, firewalls and honeypots

  • Considering varying types of intrusion detection systems (IDS) and tools
  • Bypassing firewalls and blocked sites
  • Detecting honeypots

Buffer overflow and cryptography

  • Exploiting semantic comments in annotations
  • Testing to heap overflow conditions: heap.exe
  • Cryptography attacks and code breaking methodologies

Performing Penetration Testing

  • Phases of penetration testing
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing
  • Outsourcing penetration testing services

Ethical Hacking Fundamentals

Considering the effects of hacking

  • Reviewing the elements of information security
  • Evaluating the security, functionality and usability triangle

Outlining the role of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying system attack types: operating system, application level, shrink-wrap code and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Assessing the methodology of penetration testing

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for and collecting a company's information
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS evasion and IP fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts and systems using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and executing applications
  • Defending against password cracking, keyloggers, spyware and rootkits

Uncovering Trojans and backdoors

  • Detecting a Trojan attack
  • Scanning for suspicious entries, services, programs, files and folders

Dissecting viruses, worms and sniffers

  • Stages of virus life
  • Types of viruses
  • Recognizing key indicators of a virus attack
  • Writing a simple virus program
  • Analyzing worms and malware
  • Differentiating between passive and active sniffing

Social engineering and Denial of Service (DoS)

  • Common targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to corporate networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking Web applications and wireless networks

  • Cross-Site Scripting (XSS) and Web application DoS attacks
  • Encoding schemes to defend against SQL injection, command injection, Web services and other attacks
  • Breaking WEP and WPA/WPA2 encryption
  • Employing wireless intrusion prevention systems

Hijacking sessions and Web servers

  • Spoofing vs. hijacking
  • Protecting against and preventing hijacking by implementing appropriate countermeasures

Evading IDS, firewalls and honeypots

  • Considering varying types of intrusion detection systems (IDS) and tools
  • Bypassing firewalls and blocked sites
  • Detecting honeypots

Buffer overflow and cryptography

  • Exploiting semantic comments in annotations
  • Testing to heap overflow conditions: heap.exe
  • Cryptography attacks and code breaking methodologies

Performing Penetration Testing

  • Phases of penetration testing
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing
  • Outsourcing penetration testing services

Find a class and register in three easy steps:
  • 1. Select Location:
  • 2. Select Date Range:
    to
  • 3. Select Class Type:
    • All Types
    • C Classroom
    • V Virtual Live
    • Cv In-Class Virtual
    • O Online
Virtual Live11/27/2017 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805639
VA ALEXANDRIA11/27/2017 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814493
Virtual Live12/11/2017 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805643
VA ALEXANDRIA12/11/2017 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>5 days4095.001803736
MD LAUREL12/11/2017 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814543
Virtual Live1/22/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805647
MD Rockville1/22/2018 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>5 days4095.001803740
MD Rockville1/22/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814418
VA ALEXANDRIA2/26/2018 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>5 days4095.001803732
Virtual Live2/26/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805651
VA SAINT STEPHENS CHURCH2/26/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814415
Virtual Live3/19/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805634
MD LAUREL3/19/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814454
VA ALEXANDRIA4/30/2018 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>5 days4095.001803735
Virtual Live4/30/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805638
VA SAINT STEPHENS CHURCH4/30/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814399
Virtual Live5/14/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805642
DC Downtown, DC(Metro Center)5/14/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814367
MD Rockville6/25/2018 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>5 days4095.001803739
Virtual Live6/25/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805646
VA ALEXANDRIA6/25/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814504
Virtual Live7/30/2018 9:00:00 AM<span class="course-type type-v" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'VILT')" onmouseout="clearHoverInfo()">V</span>5 days4095.001805650
VA ALEXANDRIA7/30/2018 9:00:00 AM<span class="course-type type-c" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'ILT')" onmouseout="clearHoverInfo()">C</span>5 days4095.001803743
ON Toronto7/30/2018 9:00:00 AM<span class="course-type type-cv" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'HVILT')" onmouseout="clearHoverInfo()">Cv</span>5 days4095.001814495
seek-warrow-w
  • 1
arrow-eseek-eitems per page1 - 24 of 24 items