EC-Council Security Courses

 Certified Ethical Hacker & Countermeasures (Ceh) Version 9

Introduction

Course Overview

Course Outline

Register

 This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

 

Overview

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

Duration

Corporate Training – 5 days

Course Description

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. In short, you walk out the door with advanced hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

A snapshot of what’s new in CEH version 9 Course?

Focus on New Attack Vectors

  • Emphasis on Cloud Computing Technology
    • CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
    • Covers wide-ranging countermeasures to combat cloud computing attacks
    • Provides a detailed pen testing methodology for cloud systems to identify threats in advance
  • Emphasis on Mobile Platforms and Tablet Computers
    • CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
    • Coverage of latest development in mobile and web technologies

New Vulnerabilities Are Addressed

  • Heartbleed CVE-2014-0160
    • Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
    • Detailed coverage and labs in Module 18: Cryptography.
  • Shellshock CVE-2014-6271
    • Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
    • Detailed coverage and labs in Module 11: Hacking Webservers
  • Poodle CVE-2014-3566
    • POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
    • Case study in Module 18: Cryptography
  • Hacking Using Mobile Phones
    • CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
    • Courseware covers latest mobile hacking tools in all the modules
  • Coverage of latest Trojan, Virus, Backdoors
  • Courseware covers Information Security Controls and Information Security Laws and Standards
  • Labs on Hacking Mobile Platforms and Cloud Computing
  • More than 40 percent new labs are added from Version 8
  • More than 1500 new/updated tools
  • CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
  • It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)
Who Should Attend

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Exam Info
  • Number of Questions: 125
  • Passing Score: 70%
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: ?312-50 (ECC EXAM), 312-50 (VUE)
What makes the Ethical Hacking and Countermeasures course different from other courses in the market?

The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technology from an offensive perspective. The advanced security course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.

What is the employment value of CEH?

The ANSI accredited Ethical Hacking program is primarily targeted at security professionals who want to acquire a well rounded body of knowledge to have better opportunities in this field. Acquiring a CEH means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.

Features
  • Updated Content
    • CEH v8 contains completely updated content on rapidly evolving security scenario and attack mechanisms
  • New Hacks
    • CEH v8 provides insights on new hacking techniques, networked environment and organized cybercrime
  • Hacking Tools
    • CEH v8 showcases thousands of Hacking tools including password cracker, spyware, live Trojans and viruses.
  • Security Tools
    • CEH v8 provides a detailed description of different industry-standard security tools. Other tools are listed for testing by students in a lab environment.
Legal Agreement

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

 

 Course Outline

  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • System Hacking

  • Malwa

    re Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Hacking Webservers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

Cyber Security First Responder: Threat Detection and Response

Introduction

Course Overview

Course Outline

Register

This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

 

 

Overview

This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

Duration

Corporate Training – 5 days

Who Should Attend

This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

At Course Completion

In this course, you will develop, operate, manage, and enforce security capabilities for systems and networks. You will:

  • Assess information security risk in computing and network environments
  • Create an information assurance lifecycle process
  • Analyze threats to computing and network environments
  • Design secure computing and network environments
  • Operate secure computing and network environments
  • Assess the security posture within a risk management framework
  • Collect cybersecurity intelligence information
  • Respond to cybersecurity incidents
  • Investigate cybersecurity incidents
  • Audit secure computing and network environments.
Course Outline

Lesson 1: Assessing Information Security Risk

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Lesson 2: Creating an Information Assurance Lifecycle Process

  • Evaluate Information Assurance Lifecycle Models
  • Align Information Security Operations to the Information Assurance Lifecycle
  • Align Information Assurance and Compliance Regulations

Lesson 3: Analyzing Threats to Computing and Network Environments

  • Identify Threat Analysis Models
  • Assess the Impact of Reconnaissance Incidents
  • Assess the Impact of Systems Hacking Attacks
  • Assess the Impact of Malware
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of Denial of Service Incidents
  • Assess the Impact of Threats to Mobile Infrastructure
  • Assess the Impact of Threats to Cloud Infrastructures

Lesson 4: Designing Secure Computing and Network Environments

  • Information Security Architecture Design Principles
  • Design Access Control Mechanisms
  • Design Cryptographic Security Controls
  • Design Application Security
  • Design Computing Systems Security
  • Design Network Security

Lesson 5: Operating Secure Computing and Network Environments

  • Implement Change Management in Security Operations
  • Implement Monitoring in Security Operations
  • Test and Evaluate Information Assurance Architectures

Lesson 6: Assessing the Security Posture Within a Risk Management Framework

  • Deploy a Vulnerability Assessment and Management Platform
  • Conduct Vulnerability Assessments
  • Conduct Penetration Tests on Network Assets
  • Analyze and Report Penetration Test Results

Lesson 7: Collecting Cybersecurity Intelligence Information

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Sources

Lesson 8: Analyzing Cybersecurity Intelligence Information

  • Analyze Security Intelligence to Address Incidents
  • Incorporate Security Intelligence and Event Management

Lesson 9: Responding to Cybersecurity Incidents

  • Deploy an Incident Handling and Response Architecture
  • Perform Real-Time Incident Handling Tasks
  • Prepare for Forensic Investigation

Lesson 10: Investigating Cybersecurity Incidents

  • Create a Forensics Investigation Plan
  • Securely Collect Electronic Evidence
  • Identify the Who, Why, and How of an Incident
  • Follow Up on the Results of an Investigation

Lesson 11: Computing and Network Environments

  • Deploy a Systems and Processes Auditing Architecture
  • Maintain a Deployable Audit Toolkit
  • Perform Audits Geared Toward the Information Assurance Lifecycle