Your Career
Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

Course ID: 252708

e-Learning Bundle

Certified Ethical Hacker (CEH) v8 Part 2

When you register for training with TrainUp.com, you are also supporting local education. Find out how.

  • Instant Access
    From Anywhere
  • Unlimited
    Viewing
  • 6-12 Months
    To Complete

Agenda

When an organization's web servers are attacked, valuable information can be exposed. A web server attack may include data theft, or web site defacement, but can also pose threats to other servers or services. In this course we look at how hackers attack web servers, the tools they use, and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
  • identify reasons why web servers are often compromised
  • differentiate between different types of web server attacks
  • recognize web server identification tools
  • identify precautionary steps to take to protect against web server attacks
  • sequence the steps you would perform to complete a penetration test on your web servers
  • identify web server hacking techniques and countermeasures against them
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
  • recognize social engineering
  • match social engineering activities to their types
  • identify the risks of social engineering through impersonation
  • identify social engineering countermeasures
  • identify social engineering techniques and countermeasures
Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer's resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In this course, we look at denial of service and session hijacking attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the ninth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
  • identify permanent denial-of-service attacks
  • identify hardware botnet tools
  • identify which type of filtering defends against botnets and DDoS
  • match the type of session hijacking attack to its characteristics
  • identify application-level hijacking attacks
  • identify true statements about IPSec
  • identify the characteristics of and countermeasures to denial-of-service and session hijacking attacks
Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what countermeasures are available. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course we look at malware, how it is created, the attack vectors, and what countermeasures are available. This course is the sixth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
  • recognize techniques for getting trojans to evade antivirus software
  • match the trojan to its type
  • identify the purpose of specific trojans
  • identify the tools used to detect trojans by scanning for suspicious open ports
  • identify trojan countermeasures
  • recognize the definition and characteristics of a virus
  • identify the characteristics of a worm
  • identify the purpose and characteristics of Sheep dip
  • identify and counter types of malware
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
  • match each type of sniffing to its descriptions
  • match DHCP attacks with their descriptions and countermeasures
  • differentiate between ARP attack tools and countermeasures
  • identify DNS poisoning attacks
  • identify the countermeasures against sniffing
  • identify sniffing attacks and countermeasures

Join The 50,000+ Companies That Have Purchased Training from TrainUp.com

  • 50K+ Companies Trained

    Including 90% Of Fortune 500 Companies Have Purchased Training With TrainUp.com

  • 300K+ Courses & Videos

    Live Instructor-Led (Classroom & Virtual), Self-Paced E-learning & Custom OnSite Training Solutions From Leading Training Providers

  • 800+ Expert Instructors

    Industry-Leading Subject Matter Experts (SMEs).Tenured &
    Award-Winning Instructor Network

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.