Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Certified Ethical Hacker (CEH): Hacking Mobile Platforms $74.95
Certified Ethical Hacker (CEH): Hacking Wireless Networks $74.95
Certified Ethical Hacker (CEH): Evading IDS, Firewalls, and Honeypots $74.95
Certified Ethical Hacker (CEH): Hacking Web Applications $74.95
Certified Ethical Hacker (CEH): SQL Injection $74.95
Certified Ethical Hacker (CEH): Buffer Overflow $74.95

Bundle Price: $219.00
Total Savings: $230.70


Certified Ethical Hacker (CEH): Hacking Mobile Platforms

Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization's data. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify mobile attack vectors
  • match Android hacking tools to their descriptions
  • identify best practices for keeping an Android device secure
  • identify best practices for making your iOS device more secure
  • identify the countermeasures for attacks on Windows OS devices
  • identify countermeasures used to protect against attacks on BlackBerry devices
  • identify the best practices used to protect all mobile devices from attack
  • identify methods of mobile device attacks and how to counter them

Certified Ethical Hacker (CEH): Hacking Wireless Networks

Wireless networks pose unique security challenges and any wireless strategy must have security as a central requirement. In this course we look at hacking wireless networks, the associated tools and techniques used, and mitigation strategies. This course is the thirteenth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify wireless security standards
  • match the type of wireless attack to an example
  • identify wireless hacking discovery and analysis tools
  • identify types of wireless hacking attacks
  • identify types of Bluetooth attacks
  • recognize the characteristics of wireless IPS tools
  • identify wireless network hacking techniques and tools and how to counter them

Certified Ethical Hacker (CEH): Evading IDS, Firewalls, and Honeypots

IDS systems are network hosts designed to monitor for signs of suspicious activity that may indicate an attack. Firewalls are the front-line of network defense against attacks, allowing or disallowing traffic based on rules. A honeypot is a trap host set to either detect attacks, or deflect them away from more sensitive hosts. This course covers the tools and techniques used in evading these three types of network security. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifteenth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify a honeypot
  • identify intrusion detection tools
  • identify types of attacks
  • recognize firewall evasion tools
  • identify firewall penetration testing techniques
  • identify tools and techniques used to evade IDS, firewalls, and honeypots

Certified Ethical Hacker (CEH): Hacking Web Applications

Web applications provide the interface between end users and web servers. In this course, we look at web application attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers This course is the eleventh in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify common attack vectors for web applications
  • identify command injection attacks
  • match the layer to the web service attack type that can be performed at that layer
  • match the hacking activity to the stage in the web application hacking methodology
  • match the web application hacking countermeasure to the type of attack it helps defend against
  • determine what you test for at which stage of web application penetration
  • identify web application hacking techniques and tools and how to counter them

Certified Ethical Hacker (CEH): SQL Injection

SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or simply cause a denial-of-service. In this course, we look at SQL injection attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.This course is the twelfth in a series of courses, which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify correct statements about SQL injection
  • recognize characteristics of methods of testing for SQL injection vulnerabilities
  • identify the characteristics of SQL databases
  • identify the characteristics of SQL injection tools
  • identify the characteristics of SQL injection countermeasure tools
  • identify and counter SQL injection techniques and tools

Certified Ethical Hacker (CEH): Buffer Overflow

Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold. This course looks at buffer overflow attack methodology and tools, and countermeasures. This course is the sixteenth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.
  • identify types of buffer overflow
  • sequence the steps in a buffer overflow attack
  • sequence the steps for testing for a stack overflow vulnerability
  • recognize countermeasures against buffer overflow attacks
  • identify buffer overflow attack methodology and tools, and how to counter them
Register Now
Certified Ethical Hacker (CEH) v8 Part 3 e-learning bundle
  • Course ID:
    252709
  • Duration:
    8 hours
  • Price:
    $219