fbpx

Certified Ethical Hacker (CEH)

Available October 1st

Course Information

Difficulty: Intermediate

Certified Ethical Hacker v10

Pre-Order Now!

Description

TARGETED JOB TITLES

  • Ethical Hackers
  • System Administrators
  • Network Administrators & Engineers
  • Web-managers
  • IT Auditors
  • Security Professionals

PERSONA SEARCH FILTERS

  • LEVEL 1: A+ certified, tech support 
  • LEVEL 2: Network+/CCNA certified, network support or network admin
  • LEVEL 3: Security+, CISSP, or TICSA, security support, info security

IMPORTANT SKILLS

  • Unix/Linux commands and distributions
  • Programming–maybe C, LISP, Perl, or Java
  • Database, SQL 

COURSE DESCRIPTION

KWT’s Certified Ethical Hacker (C|EH v10) course is a trusted and respected ethical hacking training program that all information security professional should take advantage of and is a sought after hiring skill by Fortune 500s, industry leaders and government agencies alike.
This course gives you the tools you need to change the game by giving you hack preventing tactics. Instead of reacting to attacks that have already occurred, CEH training teaches you to think like a dangerous hacker. This allows you to analyze existing security controls and procedures in the same way that attackers analyze targets. You will learn to look for undetected weaknesses and exploitable strengths so you can PREVENT attacks. 

 

The U.S. Bureau of Labor Statistics (BLS) projects cybersecurity job growth at a rate of 28% for the decade ending in 2026. This is far greater than job growth of 7% projected for all professions combined. 

A quick search on LinkedIn (August 2019) shows 4,832 current jobs in the United States alone that require the C|EH. These job titles include: 

  • Senior Penetration Tester – $121,000 average salary
  • Security Consultant – $82,939 average salary
  • SOC Tier 2 Analyst – $70,000 average salary
  • Cybersecurity Response Manager – $76,915 average salary
  • Auditor – $78,000 average salary
  • Network Security Operations – $48,036 average salary 
  • Vulnerability Tester – $71,660 average salary
  • Ethical Hacker – $94,300 average salary
 

WHAT PARTICIPANTS CAN EXPECT TO LEARN

Qualification for a CEH involves mastering:
  • Penetration testing
  • Footprinting and reconnaissance
  • Social engineering
The course of study covers: 
  • Creating Trojan horses
  • Backdoors
  • Viruses
  • Worms
  • Denial of Service (DoS) attacks
  • SQL injection
  • Buffer overflow
  • Session hijacking
  • System hacking
You’ll discover how to:
  • Hijack Web servers and Web applications
  • Scan and sniff networks
  • Crack wireless encryption
  • Evade IDSs, firewalls, and honeypots
 

THE EXAM

The 312-50 exam lasts four hours, comprises 125 multiple-choice questions, and tests CEH candidates on the following 18 areas:
 
  • Introduction to ethical hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware threats
  • Sniffing
  • Social engineering
  • Denial of Service
  • Session hijacking
  • Hacking web servers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Hacking mobile platforms
  • Evading IDS, firewalls, and honeypots
  • Cloud computing
  • Cryptography

MESSAGING

To stop a hacker, one needs to think like one and this is what ethical hacking is all about. Ethical hackers perform security tasks like hackers; however it is to protect the computers and networks of an organization. They have the permission to hack organization’s network in order to perform tests that keep it safe from illegal hacking. Ethical hackers help in improving the security of systems in organizations.

Course Instructor

SECTION 1: INTRODUCTION TO ETHICAL HACKING

SECTION 2: FOOTPRINTING & RECONNAISSANCE

SECTION 3: SCANNING NETWORKS

SECTION 4: ENUMERATION

SECTION 5: VULNERABILITY ANALYSIS

SECTION 6: SYSTEM HACKING

SECTION 7: MALWARE THREATS

SECTION 8: SNIFFING

SECTION 9: SOCIAL ENGINEERING

SECTION 10: DENIAL-OF-SERVICE

SECTION 11: SESSION HIJACKING

SECTION 12: EVADING IDS, FIREWALLS, AND HONEYPOTS

SECTION 13: HACKING WEB SERVERS

SECTION 14: HACKING WEB APPLICATIONS

SECTION 15: SQL INJECTION

SECTION 16: HACKING WIRELESS NETWORKS

SECTION 17: HACKING MOBILE PLATFORMS

SECTION 18: IOT HACKING

SECTION 19: CLOUD COMPUTING

SECTION 20: CRYPTOGRAPHY

Course Information

Difficulty: Intermediate

  • Lessons

    • SECTION 1: INTRODUCTION TO ETHICAL HACKING
      • 001: Current Security Trends Overview 
      • 002: Elements of Information Security
      • 003: Information Security Threats & Attack Vectors 
      • 004: Hacking Concepts, Types, and Phases
      • 006: Information Security Management and Defense-in-depth
      • 005: Ethical Hacking Concepts & Scope 
      • 007: Policies, Procedures, and Awareness 
      • 008: Physical Security & Controls
      • 009: Incidence Management Process
      • 010: Vulnerability Assessment & Penetration Testing
      • 011: Information Security Acts & Laws
    • SECTION 2: FOOTPRINTING & RECONNAISSANCE
      • 012: Footprinting Concepts 
      • 013: Footprinting Through Search Engines
      • 014: Footprint Using Advance Google Hacking Techniques
      • 015: Footprint Through Social Networking Sites
      • 016: Techniques for Website Footprinting
      • 017: Techniques for Email Footprinting 
      • 018: Techniques of Competitive Intelligence
      • 019: Techniques for WHO Is Footprinting
      • 020: Techniques for Network Footprinting
      • 021: Techniques of Footprinting Through Social Engineering
      • 022: Footprinting Tools
      • 023: Footprinting Countermeasures
      • 024: Footprinting Pen Testing
    • SECTION 3: SCANNING NETWORKS
      • 025: Networking Scanning Overview
      • 026: Checking for Live Systems 
      • 027: Checking for Open Ports
      • 028: Scanning Techniques
      • 029: IDS Evasion Techniques
      • 030: Banner Grabbing 
      • 031: Vulnerability Scanning 
      • 032: Drawing Network Diagrams
      • 033: Using Proxies & Anonymizers
      • 034: IP Spoofing & Detection Techniques
      • 035: Scanning & Pen Testing
    • SECTION 4: ENUMERATION
      • 036: Understanding Enumeration Concepts
      • 037: NetBIOS Enumeration
      • 038: SNMP Enumeration
      • 039: LDAP Enumeration 
      • 040: NTP Enumeration
      • 041: SMTP and DNS Enumeration Countermeasure
      • 042: Enumeration Pen Testing
    • SECTION 5: VULNERABILITY ANALYSIS
      • 043: Vulnerability of the Management Life Cycle
      • 044: Approaches to Vulnerability Analysis
      • 045: Tools for Vulnerability Assessments
      • 046: Tools and Techniques
    • SECTION 6: SYSTEM HACKING
      • 047: CEH Hacking Methodology Overview
      • 048: Gaining Access to the System
      • 049: Privilege Escalation Techniques
      • 050: Creating and Maintaining Remote Access to the System 
      • 051: Types of Rootkits 
      • 052: Steganograpy and Steganalysis
      • 053: Techniques to Hide the Evidence of Compromise 
      • 054: System Hacking Penetration Testing 
    • SECTION 7: MALWARE THREATS
      • 055: Malware and Malware Propagation Techniques  Overview
      • 056: Types of Trojans, and How to Infect Systems 
      • 057: Types of Viruses, and How They Infect Files 
      • 058: Computer Worms
      • 059: Malware Analysis Process 
      • 060: Techniques to Detect Malware 
      • 061: Malware Countermeasures
      • 062: Malware Penetration Testing 
    • SECTION 8: SNIFFING
      • 063: Sniffing Concepts Overview
      • 064: MAC Attacks 
      • 065: DHCP Attacks
      • 066: ARP Poisoning 
      • 067: MAC Spoofing Attacks 
      • 068: DNS Poisoning 
      • 069: Sniffing Tools
      • 070: Sniffing Countermeasures
      • 071: Techniques to Detect Sniffing 
      • 072: Sniffing Pen Testing
    • SECTION 9: SOCIAL ENGINEERING
      • 073: Social Engineering Overview 
      • 074: Social Engineering Techniques 
      • 075: Insider Threats
      • 076: Impersonation on Social Networking Sites 
      • 077: Identity Theft 
      • 078: Social Engineering Countermeasures 
      • 079: Theft Countermeasures 
      • 080: Social Engineering Pen Testing 
    • SECTION 10: DENIAL-OF-SERVICE
      • 081: Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks Overview
      • 082: DoS/DDoS Attack Techniques 
      • 083: Botnet Networks
      • 084: DoS and DDoS Attack Tools 
      • 085: DoS/DDoS Countermeasures 
      • 086: DoS Attack Penetration Testing 
    • SECTION 11: SESSION HIJACKING
      • 087: Session Hijacking Concepts 
      • 088: Application Level Session Hijacking 
      • 089: Network Level Session Hijacking 
      • 090: Session Hijacking Tools 
      • 091: Session Hijacking Countermeasures 
      • 092: Session Hijacking Penetration Testing 
    • SECTION 12: EVADING IDS, FIREWALLS, AND HONEYPOTS
      • 093: IDS, Firewall, and Honeypot Concepts
      • 094: IDS, Firewall and Honeypot Solutions 
      • 095: Techniques to Bypass IDS 
      • 096: Techniques to Bypass Firewalls 
      • 097: IDS/Firewall Evading Tools
      • 098: Techniques to Detect Honeypots 
      • 099: IDS/Firewall Evasion Countermeasures 
      • 100: IDS and Firewall Penetration Testing Overview
    • SECTION 13: HACKING WEB SERVERS
      • 101: Webserver Concepts 
      • 102: Webserver Attacks 
      • 103: Webserver Attack Methodology 
      • 104: Webserver Attack Tools
      • 105: Countermeasures Against Webserver Attacks 
      • 106: Patch Management Overview
      • 107: Webserver Security Tools 
      • 108: Webserver Penetration Testing 
    • SECTION 14: HACKING WEB APPLICATIONS
      • 109: Web Application Concepts
      • 110: Web application Threats
      • 111: Web Application Hacking Methodology
      • 112: Web Application Hacking Tools 
      • 113: Web Application Countermeasures 
      • 114: Web Application Security Tools 
      • 115: Web Application Penetration Testing
    • SECTION 15: SQL INJECTION
      • 116: SQL Injection Concepts 
      • 117: Various Types of SQL Injection Attacks
      • 118: SQL Injection Methodology 
      • 119: SQL Injection Tools 
      • 120: IDS Evasion Techniques 
      • 121: SQL Injection Countermeasures
      • 122: SQL Injection Detection Tools 
    • SECTION 16: HACKING WIRELESS NETWORKS
      • 123: Wireless Concepts 
      • 124: Wireless Encryption Algorithms 
      • 125: Wireless Threats
      • 126: Wireless Hacking Methodology
      • 127: Wireless Hacking Tools 
      • 128: Bluetooth Hacking Techniques 
      • 129: wireless hacking countermeasures
      • 130: Wireless Security Tools 
      • 131: Wireless Penetration Testing
    • SECTION 17: HACKING MOBILE PLATFORMS
      • 132: Mobile Attack Platform Vectors
      • 133: Various Android Threat and Attacks
      • 134: iOS Threats and Attacks 
      • 135: Windows Phone OS Threats and Attacks 
      • 136: Blackberry Threats and Attacks
      • 137: Mobile Device Management (MDM) 
      • 138: Mobile Security Guidelines and Security Tools
      • 139: Mobile Penetration Testing Overview
    • SECTION 18: IOT HACKING
      • 140: IoT Concepts
      • 141: Cryptography Tools
      • 142: IoT Threats and Attacks
      • 143: Understanding IoT Hacking
      • 144: Understanding IoT Attacks 
      • 145: IoT Security Tools 
    • SECTION 19: CLOUD COMPUTING
      • 146: Cloud Computing Concepts 
      • 147: Cloud Computing Threats 
      • 148: Cloud Computing Attacks 
      • 149: Cloud Computing Security 
      • 150: Cloud Computing Security Tools 
      • 151: Cloud Penetration Testing
    • SECTION 20: CRYPTOGRAPHY
      • 152: Cryptography Concepts
      • 153: Encryption Algorithms
      • 154: Cryptography Tools 
      • 155: Public Key Infrastructure (PKI)
      • 156: Email Encryption
      • 157: Disk Encryption 
      • 158: Cryptography Attacks
      • 159: Cryptanalysis Tools

Pin It on Pinterest

Share This