Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Certified Ethical Hacker (CEH): Hacking Web Servers $74.95
Certified Ethical Hacker (CEH): Social Engineering $74.95
Certified Ethical Hacker (CEH): Denial of Service and Session Hijacking $74.95
Certified Ethical Hacker (CEH): Malware $74.95
Certified Ethical Hacker (CEH): Sniffing $74.95

Bundle Price: $199.00
Total Savings: $175.75


Certified Ethical Hacker (CEH): Hacking Web Servers

When an organization's web servers are attacked, valuable information can be exposed. A web server attack may include data theft, or web site defacement, but can also pose threats to other servers or services. In this course we look at how hackers attack web servers, the tools they use, and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify reasons why web servers are often compromised
  • differentiate between different types of web server attacks
  • recognize web server identification tools
  • identify precautionary steps to take to protect against web server attacks
  • sequence the steps you would perform to complete a penetration test on your web servers
  • identify web server hacking techniques and countermeasures against them

Certified Ethical Hacker (CEH): Social Engineering

Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • recognize social engineering
  • match social engineering activities to their types
  • identify the risks of social engineering through impersonation
  • identify social engineering countermeasures
  • identify social engineering techniques and countermeasures

Certified Ethical Hacker (CEH): Denial of Service and Session Hijacking

Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer's resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In this course, we look at denial of service and session hijacking attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the ninth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify permanent denial-of-service attacks
  • identify hardware botnet tools
  • identify which type of filtering defends against botnets and DDoS
  • match the type of session hijacking attack to its characteristics
  • identify application-level hijacking attacks
  • identify true statements about IPSec
  • identify the characteristics of and countermeasures to denial-of-service and session hijacking attacks

Certified Ethical Hacker (CEH): Malware

Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what countermeasures are available. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course we look at malware, how it is created, the attack vectors, and what countermeasures are available. This course is the sixth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • recognize techniques for getting trojans to evade antivirus software
  • match the trojan to its type
  • identify the purpose of specific trojans
  • identify the tools used to detect trojans by scanning for suspicious open ports
  • identify trojan countermeasures
  • recognize the definition and characteristics of a virus
  • identify the characteristics of a worm
  • identify the purpose and characteristics of Sheep dip
  • identify and counter types of malware

Certified Ethical Hacker (CEH): Sniffing

Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • match each type of sniffing to its descriptions
  • match DHCP attacks with their descriptions and countermeasures
  • differentiate between ARP attack tools and countermeasures
  • identify DNS poisoning attacks
  • identify the countermeasures against sniffing
  • identify sniffing attacks and countermeasures
Register Now
Certified Ethical Hacker (CEH) v8 Part 2 e-learning bundle
  • Course ID:
    252708
  • Duration:
    6 hours
  • Price:
    $199