Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Certified Ethical Hacker (CEH): Hacking and Penetration Testing $74.95
Certified Ethical Hacker (CEH): Footprinting and Reconnaissance $74.95
Certified Ethical Hacker (CEH): Network Scanning $74.95
Certified Ethical Hacker (CEH): Enumeration and Cryptography $74.95
Certified Ethical Hacker (CEH): System Hacking $74.95

Bundle Price: $199.00
Total Savings: $175.75


Certified Ethical Hacker (CEH): Hacking and Penetration Testing

Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. In this course we discuss hacking concepts, methods, and penetration testing. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the first in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • match types of information security threats to examples
  • put the phases of a hacking attack in order
  • put the steps for creating and implementing security policies into the correct order
  • identify ways to assess the effectiveness of security policies and procedures
  • determine the type of penetration test to perform in a given situation
  • identify factors to consider when outsourcing penetration testing
  • identify effective penetration testing techniques in a given scenario

Certified Ethical Hacker (CEH): Footprinting and Reconnaissance

Footprinting is a set of intelligence gathering techniques whereby an attacker attempts to gain information about a target network and computer devices. In this course, we discuss footprinting and reconnaissance, and the tools and techniques used. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the second in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • recognize the purpose of footprinting
  • identify methods used to mirror a web site
  • match the competitive intelligence information you can obtain with the web site you use to obtain it
  • identify social engineering techniques
  • differentiate between footprinting tools
  • identify footprinting techniques and tools

Certified Ethical Hacker (CEH): Network Scanning

Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify the purposes of network scanning
  • match the type of scan with its description
  • match the network scanning tool to its purpose
  • identify tools used to hide an attacker's identity
  • identify methods used to bypass censorship
  • identify the methods performed as part of scanning penetration testing
  • identify the techniques and tools used in network scanning

Certified Ethical Hacker (CEH): Enumeration and Cryptography

During the enumeration phase of an attack, the attacker creates active connections to an organization's network environment and performs directed queries to gain additional information. In this course, we look at enumeration and the types of enumeration an attacker can perform. We also look at encryption and the technologies and protocols used. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fourth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • recognize the steps of the enumeration phase of an attack
  • match the tool to the type of hosts it can enumerate
  • match the enumeration tool to the network protocol it operates over
  • match the enumeration countermeasure to the protocol it protects
  • identify characteristics of symmetric and asymmetric encryption
  • match the encryption algorithm to its characteristics
  • match the components of Public Key Infrastructure to their descriptions
  • match the attack on cryptographic systems to its description
  • recognize the characteristics of the enumeration phase of an attack and countermeasures to take against enumeration

Certified Ethical Hacker (CEH): System Hacking

System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at system hacking, and the tools and techniques used. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • match the stage of system hacking to the technique or exploit used
  • identify the characteristics of types of password attacks
  • match the LM/NTLM version to its attributes
  • identify the countermeasures against keylogging
  • identify countermeasures against spyware
  • match the method of rootkit detection with its description
  • identify the types of files that can have hidden messages added using Least Significant Bit Insertion
  • identify the tools used to cover the tracks of an intruder
  • identify the techniques and tools used in system hacking
Register Now
Certified Ethical Hacker (CEH) v8 Part 1 e-learning bundle
  • Course ID:
    252707
  • Duration:
    8 hours
  • Price:
    $199