Certified Ethical Hacker
Course ID
Course Description
Prerequisites
Audience
Course Content
- Introduction to Ethical Hacking
- Internet Crime Current Report: IC3
- Data Breach Investigations Report
- Types of Data Stolen From the Organizations
- Essential Terminologies
- Elements of Information Security
- Authenticity and Non-Repudiation
- The Security, Functionality, and Usability Triangle
- Security Challenges
- Effects of Hacking
- Who is a Hacker?
- Hacker Classes
- Hacktivism
- What Does a Hacker Do?
- Types of Attacks on a System
- Why Ethical Hacking is Necessary?
- Defense in Depth
- Scope and Limitations of Ethical Hacking
- What Do Ethical Hackers Do?
- Skills of an Ethical Hacker
- Vulnerability Research
- Vulnerability Research Websites
- What is Penetration Testing?
- Why Penetration Testing?
- Penetration Testing Methodology
- Footprinting and Reconnaissance
- Footprinting Terminologies
- What is Footprinting?
- Objectives of Footprinting
- Footprinting Threats
- Finding a Company URL
- Locate Internal URLs
- Public and Restricted Websites
- Search for Company Information
- Footprinting Through Search Engines
- Collect Location Information
- People Search
- Gather Information from Financial Services
- Footprinting Through Job Sites
- Monitoring Target Using Alerts
- Competitive Intelligence Gathering
- WHOIS Lookup
- Extracting DNS Information
- Locate the Network Range
- Traceroute
- Mirroring Entire Website
- Extract Website Information from http://www.archive.org
- Monitoring Web Updates Using Website Watcher
- Tracking Email Communications
- Footprint Using Google Hacking Techniques
- What a Hacker Can Do With Google Hacking?
- Google Advance Search Operators
- Google Hacking Tool: Google Hacking Database (GHDB)
- Google Hacking Tools
- Additional Footprinting Tools
- Footprinting Countermeasures
- Footprinting Pen Testing
- Scanning Networks
- Network Scanning
- Types of Scanning
- Checking for Live Systems - ICMP Scanning
- Ping Sweep
- Three-Way Handshake
- TCP Communication Flags
- Hping2 / Hping3
- Hping Commands
- Scanning Techniques
- IP Fragmentation Tools
- Scanning Tools
- Do Not Scan These IP Addresses (Unless you want to get into trouble)
- Scanning Countermeasures
- War Dialing
- Why War Dialing?
- War Dialing Countermeasures
- OS Fingerprinting
- Banner Grabbing Tool: ID Serve
- Banner Grabbing Tools
- Banner Grabbing Countermeasures: Disabling or Changing Banner
- Hiding File Extensions
- Vulnerability Scanning
- Network Vulnerability Scanners
- LANsurveyor
- Network Mappers
- Proxy Servers
- Why Attackers Use Proxy Servers?
- Use of Proxies for Attack
- How Does MultiProxy Work?
- Free Proxy Servers
- Proxy Workbench
- Proxifier Tool: Create Chain of Proxy Servers
- SocksChain
- TOR (The Onion Routing)
- TOR Proxy Chaining Software
- HTTP Tunneling Techniques
- Why do I Need HTTP Tunneling?
- Super Network Tunnel Tool
- Httptunnel for Windows
- Additional HTTP Tunneling Tools
- SSH Tunneling
- SSL Proxy Tool
- How to Run SSL Proxy?
- Proxy Tools
- Anonymizers
- Types of Anonymizers
- Case: Bloggers Write Text Backwards to Bypass Web Filters in China
- Text Conversion to Avoid Filters
- Censorship Circumvention Tool: Psiphon
- How Psiphon Works?
- How to Check if Your Website is Blocked in China or Not?
- G-Zapper
- Anonymizer Tools
- Spoofing IP Address
- IP Spoofing Detection Techniques
- IP Spoofing Countermeasures
- Scanning Pen Testing
- Enumertion
- What is Enumeration?
- Techniques for Enumeration
- Netbios Enumeration
- Enumerating User Accounts
- Enumerate Systems Using Default Passwords
- SNMP (Simple Network Management Protocol) Enumeration
- UNIX/Linux Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP Enumeration
- DNS Zone Transfer Enumeration Using nslookup
- Enumeration Countermeasures
- Enumeration Pen Testing
- System Hacking
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- CEH Hacking Methodology (CHM)
- Password Cracking
- Microsoft Authentication
- How Hash Passwords are Stored in Windows SAM?
- What is LAN Manager Hash?
- Kerberos Authentication
- Salting
- PWdump7 and Fgdump
- L0phtCrack
- Ophcrack
- Cain & Abel
- RainbowCrack
- Password Cracking Tools
- LM Hash Backward Compatibility
- How to Defend against Password Cracking?
- Privilege Escalation
- Active@ Password Changer
- Privilege Escalation Tools
- How to Defend against Privilege Escalation?
- Executing Applications
- Alchemy Remote Executor
- RemoteExec
- Execute This!
- Keylogger
- Types of Keystroke Loggers
- Acoustic/CAM Keylogger
- Keyloggers
- Spyware
- How to Defend against Keyloggers?
- How to Defend against Spyware?
- Rootkits
- Types of Rootkits
- How Rootkit Works?
- Rootkit: Fu
- Detecting Rootkits
- How to Defend against Rootkits?
- Anti-Rootkit: RootkitRevealer and McAfee Rootkit Detective
- NTFS Data Stream
- What is Steganography?
- Types of Steganography
- Document Steganography
- Video Steganography
- Audio Steganography Tools
- Folder Steganography: Invisible Secrets 4
- Spam/Email Steganography: Spam Mimic
- Natural Text Steganography: Sams Big G Play Maker
- Steganalysis
- Steganography Detection Tool: Stegdetect
- Why Cover Tracks?
- Ways to Clear Online Tracks
- Disabling Auditing: Auditpol
- Covering Tracks Tool: Window Washer
- Covering Tracks Tool: Tracks Eraser Pro
- System Hacking Penetration Testing
- Trojans and Backdoors
- What is a Trojan?
- Overt and Covert Channels
- Purpose of Trojans
- What Do Trojan Creators Look For?
- Indications of a Trojan Attack
- Common Ports used by Trojans
- How to Infect Systems Using a Trojan?
- Wrappers
- Different Ways a Trojan can Get into a System
- How to Deploy a Trojan?
- Evading Anti-Virus Techniques
- Types of Trojans
- Destructive Trojans
- Notification Trojans
- Credit Card Trojans
- Data Hiding Trojans (Encrypted Trojans)
- BlackBerry Trojans
- MAC OS X Trojans
- How to Detect Trojans?
- Process Monitoring Tool: What's Running
- Scanning for Suspicious Registry Entries
- Registry Entry Monitoring Tools
- Scanning for Suspicious Device Drivers
- Scanning for Suspicious Windows Services
- Scanning for Suspicious Startup Programs
- Scanning for Suspicious Files and Folders
- Scanning for Suspicious Network Activities
- Trojan Countermeasures
- Backdoor Countermeasures
- Trojan Horse Construction Kit
- Anti-Trojan Software: TrojanHunter
- Anti-Trojan Software: Emsisoft Anti-Malware
- Anti-Trojan Softwares
- Pen Testing for Trojans and Backdoors
- Viruses and Worms
- Introduction to Viruses
- Virus and Worm Statistics 2010
- Stages of Virus Life
- Working of Viruses: Infection Phase
- Working of Viruses: Attack Phase
- Why Do People Create Computer Viruses?
- Indications of Virus Attack
- How does a Computer get Infected by Viruses?
- Virus Hoaxes
- Virus Analysis
- Types of Viruses
- Transient and Terminate and Stay Resident Viruses
- Writing a Simple Virus Program
- Computer Worms
- How is a Worm Different from a Virus?
- Example of Worm Infection: Conficker Worm
- Worm Analysis
- Worm Maker: Internet Worm Maker Thing
- What is Sheep Dip Computer?
- Anti-Virus Sensors Systems
- Malware Analysis Procedure
- String Extracting Tool: Bintext
- Compression and Decompression Tool: UPX
- Process Monitoring Tools: Process Monitor
- Log Packet Content Monitoring Tools: NetResident
- Debugging Tool: Ollydbg
- Virus Analysis Tool: IDA Pro
- Online Malware Testing:
- Online Malware Analysis Services
- Virus Detection Methods
- Virus and Worms Countermeasures
- Companion Antivirus: Immunet Protect
- Anti-virus Tools
- Penetration Testing for Virus
- Sniffers
- Lawful Intercept
- Wiretapping
- Sniffing Threats
- How a Sniffer Works?
- Hacker Attacking a Switch
- Types of Sniffing: Passive Sniffing
- Types of Sniffing: Active Sniffing
- Protocols Vulnerable to Sniffing
- Tie to Data Link Layer in OSI Model
- Hardware Protocol Analyzers
- SPAN Port
- MAC Flooding
- How DHCP Works?
- What is Address Resolution Protocol (ARP)?
- Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
- MAC Spoofing/Duplicating
- DNS Poisoning Techniques
- Sniffing Tools
- Discovery Tools
- Password Sniffing Tool: Ace
- Packet Sniffing Tool: Capsa Network Analyzer
- OmniPeek Network Analyzer
- Network Packet Analyzer: Observer
- Session Capture Sniffer: NetWitness
- Email Message Sniffer: Big-Mother
- TCP/IP Packet Crafter: Packet Builder
- Additional Sniffing Tools
- How an Attacker Hacks the Network Using Sniffers?
- How to Defend Against Sniffing?
- Sniffing Prevention Techniques
- How to Detect Sniffing?
- Promiscuous Detection Tools
- Social Engineering
- What is Social Engineering?
- Behaviors Vulnerable to Attacks
- Why is Social Engineering Effective?
- Warning Signs of an Attack
- Phases in a Social Engineering Attack
- Impact on the Organization
- Command Injection Attacks
- Common Targets of Social Engineering
- Types of Social Engineering
- Insider Attack
- Common Intrusion Tactics and Strategies for Prevention
- Social Engineering Through Impersonation on Social Networking Sites
- Risks of Social Networking to Corporate Networks
- Identity Theft Statistics
- Real Steven Gets Huge Credit Card Statement
- Identity Theft - Serious Problem
- Social Engineering Countermeasures: Policies
- How to Detect Phishing Emails?
- Identity Theft Countermeasures
- Social Engineering Pen Testing
- Denial of Service
- What is a Denial of Service Attack?
- What is Distributed Denial of Service Attacks?
- Symptoms of a DoS Attack
- Cyber Criminals
- Internet Chat Query (ICQ)
- Internet Relay Chat (IRC)
- DoS Attack Techniques
- Botnet
- WikiLeak Operation Payback
- DoS Attack Tools
- Detection Techniques
- DoS/DDoS Countermeasure Strategies
- DDoS Attack Countermeasures
- Post-attack Forensics
- Techniques to Defend against Botnets
- DoS/DDoS Countermeasures
- DoS/DDoS Protection at ISP Level
- Enabling TCP Intercept on Cisco IOS Software
- Advanced DDoS Protection: IntelliGuard DDoS Protection System (DPS)
- DoS/DDoS Protection Tool
- Denial of Service (DoS) Attack Penetration Testing
- Session Hijacking
- What is Session Hijacking?
- Dangers Posed by Hijacking
- Why Session Hijacking is Successful?
- Key Session Hijacking Techniques
- Brute Forcing
- HTTP Referrer Attack
- Spoofing vs. Hijacking
- Session Hijacking Process
- Packet Analysis of a Local Session Hijack
- Types of Session Hijacking
- Predictable Session Token
- Man-in-the-Middle Attack
- Man-in-the-Browser Attack
- Client-side Attacks
- Cross-site Script Attack
- Session Fixation
- Network Level Session Hijacking
- The 3-Way Handshake
- Sequence Numbers
- TCP/IP Hijacking
- IP Spoofing: Source Routed Packets
- RST Hijacking
- Blind Hijacking
- Man-in-the-Middle Attack using Packet Sniffer
- UDP Hijacking
- Session Hijacking Tools
- Countermeasures
- Protecting against Session Hijacking
- Methods to Prevent Session Hijacking: To be Followed by Web Developers
- Methods to Prevent Session Hijacking: To be Followed by Web Users
- Defending against Session Hijack Attacks
- Session Hijacking Remediation
- IPSec
- Session Hijacking Pen Testing
- Hijacking Webservers
- Webserver Market Shares
- Open Source Webserver Architecture
- IIS Webserver Architecture
- Website Defacement
- Case Study
- Why Web Servers are Compromised?
- Impact of Webserver Attacks
- Webserver Misconfiguration
- Directory Traversal Attacks
- HTTP Response Splitting Attack
- Web Cache Poisoning Attack
- HTTP Response Hijacking
- SSH Bruteforce Attack
- Man-in-the-Middle Attack
- Webserver Password Cracking
- Web Application Attacks
- Webserver Attack Methodology
- Webserver Attack Tools
- Web Password Cracking Tool
- Countermeasures
- How to Defend Against Web Server Attacks?
- How to Defend against HTTP Response Splitting and Web Cache Poisoning?
- Patches and Hotfixes
- What is Patch Management?
- Identifying Appropriate Sources for Updates and Patches
- Installation of a Patch
- Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
- Web Application Security Scanner: Sandcat
- Web Server Security Scanner: Wikto
- Webserver Malware Infection Monitoring Tool: HackAlert
- Webserver Security Tools
- Web Server Penetration Testing
- Hacking Web Applications
- Web Application Security Statistics
- Introduction to Web Applications
- Web Application Components
- How Web Applications Work?
- Web Application Architecture
- Web 2.0 Applications
- Vulnerability Stack
- Web Attack Vectors
- Web Application
- Unvalidated Input
- Parameter/Form Tampering
- Directory Traversal
- Security Misconfiguration
- Injection Flaws
- What is LDAP Injection?
- How LDAP Injection Works?
- Hidden Field Manipulation Attack
- Cross-Site Scripting (XSS) Attacks
- Web Application Denial-of-Service (DoS) Attack
- Buffer Overflow Attacks
- Cookie/Session Poisoning
- Session Fixation Attack
- Insufficient Transport Layer Protection
- Improper Error Handling
- Insecure Cryptographic Storage
- Broken Authentication and Session Management
- Unvalidated Redirects and Forwards
- Web Services Architecture
- Footprint Web Infrastructure
- Web Spidering Using Burp Suite
- Hacking Web Servers
- Analyze Web Applications
- Attack Authentication Mechanism
- Username Enumeration
- Password Attacks
- Session Attacks: Session ID Prediction/ Brute-forcing
- Cookie Exploitation: Cookie Poisoning
- Authorization Attack
- Session Management Attack
- Injection Attacks
- Attack Data Connectivity
- Attack Web App Client
- Attack Web Services
- Web Services Probing Attacks
- Web Service Attack Tools
- Web Application Hacking Tools
- Encoding Schemes
- Web Application Countermeasures
- Web Application Firewalls
- Web Application Pen Testing
- SQL Injection
- SQL Injection is the Most Prevalent Vulnerability
- SQL Injection Threats
- What is SQL Injection?
- SQL Injection Attacks
- How Web Applications Work?
- Server Side Technologies
- HTTP Post Request
- SQL Injection Detection
- SQL Injection Black Box Pen Testing
- Types of SQL Injection
- What is Blind SQL Injection?
- SQL Injection Methodology
- Information Gathering
- Database, Table, and Column Enumeration
- Features of Different DBMSs
- Password Grabbing
- Transfer Database to Attacker’s Machine
- Interacting with the Operating System
- Interacting with the FileSystem
- Network Reconnaissance Full Query
- SQL Injection Tools
- Evading IDS and techniques
- How to Defend Against SQL Injection Attacks?
- SQL Injection Detection Tools
- Snort Rule to Detect SQL Injection Attacks
- Hacking Wireless Networks
- Wireless Networks
- Wi-Fi Usage Statistics in the US
- Wi-Fi Hotspots at Public Places
- Wi-Fi Networks at Home
- Types of Wireless Networks
- Wireless Standards
- Service Set Identifier (SSID)
- Wi-Fi Authentication Modes
- Wireless Terminologies
- Wi-Fi Chalking
- Wi-Fi Hotspot Finders
- Types of Wireless Antenna
- Parabolic Grid Antenna
- Types of Wireless Encryption
- WEP Encryption
- What is WPA?
- Temporal Keys
- What is WPA2?
- WEP vs. WPA vs. WPA2
- WEP Issues
- Weak Initialization Vectors (IV)
- How to Break WEP Encryption?
- How to Break WPA/WPA2 Encryption?
- How to Defend Against WPA Cracking?
- Wireless Threats :
- Rogue Access Point Attack
- Client Mis-association
- Misconfigured Access Point Attack
- Unauthorized Association
- Ad Hoc Connection Attack
- HoneySpot Access Point Attack
- AP MAC Spoofing
- Denial-of-Service Attack
- Jamming Signal Attack
- Wi-Fi Jamming Devices
- Wireless Hacking Methodology
- Find Wi-Fi Networks to Attack
- Attackers Scanning for Wi-Fi Networks
- Footprint the Wireless Network
- Wi-Fi Discovery Tools
- GPS Mapping
- How to Discover Wi-Fi Network Using Wardriving?
- Wireless Traffic Analysis
- Wireless Cards and Chipsets
- Wi-Fi USB Dongle: AirPcap
- Wi-Fi Packet Sniffer Tools
- What is Spectrum Analysis?
- Wireless Sniffers
- Aircrack-ng Suite
- How to Reveal Hidden SSIDs
- Fragmentation Attack
- How to Launch MAC Spoofing Attack?
- Denial of Service: Deauthentication and Disassociation Attacks
- Man-in-the-Middle Attack
- MITM Attack Using Aircrack-ng
- Wireless ARP Poisoning Attack
- Rogue Access Point
- Evil Twin
- How to Crack WEP Using Aircrack?
- How to Crack WPA-PSK Using Aircrack?
- WPA Cracking Tool: KisMAC
- WEP Cracking Using Cain & Abel
- WPA Brute Forcing Using Cain & Abel
- WPA Cracking Tool: Elcomsoft Wireless Security Auditor
- WEP/WPA Cracking Tools
- Wi-Fi Sniffer: Kismet
- Wardriving Tools
- RF Monitoring Tools
- Wi-Fi Connection Manager Tools
- Wi-Fi Traffic Analyzer Tools
- Wi-Fi Raw Packet Capturing Tools
- Wi-Fi Spectrum Analyzing Tools
- Bluetooth Hacking
- How to BlueJack a Victim?
- Bluetooth Hacking Tool: Super Bluetooth Hack
- Bluetooth Hacking Tool: PhoneSnoop
- Bluetooth Hacking Tool: BlueScanner
- How to Defend Against Bluetooth Hacking?
- How to Detect and Block Rogue AP?
- Wireless Security Layers
- How to Defend Against Wireless Attacks?
- Wireless Intrusion Prevention Systems
- Wireless IPS Deployment
- Wi-Fi Security Auditing Tools
- Wi-Fi Intrusion Prevention System
- Wi-Fi Predictive Planning Tools
- Wi-Fi Vulnerability Scanning Tools
- Wireless Penetration Testing
- Evading IDS, Firewalls, and Honeypots
- Intrusion Detection Systems (IDS) and its Placement
- How IDS Works?
- Ways to Detect an Intrusion
- Types of Intrusion Detection Systems
- System Integrity Verifiers (SIV)
- General Indications of Intrusions
- General Indications of System Intrusions
- Firewall
- DeMilitarized Zone (DMZ)
- Types of Firewall
- Firewall Identification
- Honeypot
- How to Set Up a Honeypot?
- Intrusion Detection Tool
- Intrusion Detection Systems: Tipping Point
- Firewall: Sunbelt Personal Firewall
- Honeypot Tools
- Insertion Attack
- Evasion
- Denial-of-Service Attack (DoS)
- Obfuscating
- False Positive Generation
- Session Splicing
- Unicode Evasion Technique
- Fragmentation Attack
- Overlapping Fragments
- Time-To-Live Attacks
- Invalid RST Packets
- Urgency Flag
- Polymorphic Shellcode
- ASCII Shellcode
- Application-Layer Attacks
- Desynchronization
- Pre Connection SYN
- Post Connection SYN
- Other Types of Evasion
- Bypass Blocked Sites Using IP Address in Place of URL
- Bypass a Firewall using Proxy Server
- Detecting Honeypots
- Honeypot Detecting Tool: Send-Safe Honeypot Hunter
- Firewall Evasion Tools
- Packet Fragment Generators
- Countermeasures
- Firewall/IDS Penetration Testing
- Buffer Overflows
- Why are Programs And Applications Vulnerable?
- Understanding Stacks
- Stack-Based Buffer Overflow
- Understanding Heap
- Stack Operations
- Knowledge Required to Program Buffer Overflow Exploits
- Buffer Overflow Steps
- Simple Uncontrolled Overflow
- Simple Buffer Overflow in C
- Code Analysis
- Exploiting Semantic Comments in C (Annotations)
- How to Mutate a Buffer Overflow Exploit?
- Identifying Buffer Overflows
- How to Detect Buffer Overflows in a Program?
- BOU (Buffer Overflow Utility)
- Testing for Heap Overflow Conditions: heap.exe
- Steps for Testing for Stack Overflow in OllyDbg Debugger
- Testing for Format String Conditions using IDA Pro
- BoF Detection Tools
- Defense Against Buffer Overflows
- Data Execution Prevention (DEP)
- Enhanced Mitigation Experience Toolkit (EMET)
- BoF Security Tools
- Buffer Overflow Penetration Testing
- Cryptography
- Types of Cryptography
- Government Access to Keys (GAK)
- Ciphers
- Advanced Encryption Standard (AES)
- Data Encryption Standard (DES)
- RC4, RC5, RC6 Algorithms
- The DSA and Related Signature Schemes
- RSA (Rivest Shamir Adleman)
- Message Digest (One-way Bash) Functions
- Secure Hashing Algorithm (SHA)
- What is SSH (Secure Shell)?
- MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
- Cryptography Tool: Advanced Encryption Package
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Certification Authorities
- Digital Signature
- SSL (Secure Sockets Layer)
- Transport Layer Security (TLS)
- Disk Encryption
- Cryptography Attacks
- Code Breaking Methodologies
- Meet-in-the-Middle Attack on Digital Signature Schemes
- Cryptanalysis Tools
- Online MD5 Decryption Tool
- Penetration Testing
- Introduction to Penetration Testing
- Security Assessments
- Vulnerability Assessment
- Penetration Testing
- Why Penetration Testing?
- What Should be Tested?
- What Makes a Good Penetration Test?
- ROI on Penetration Testing
- Testing Points
- Testing Locations
- Types of Penetration Testing
- Common Penetration Testing Techniques
- Using DNS Domain Name and IP Address Information
- Enumerating Information about Hosts on Publicly-Available Networks
- Phases of Penetration Testing
- Penetration Testing Methodology
- Evaluating Different Types of Pentest Tools
- Application Security Assessment Tool
- Network Security Assessment Tool
- Wireless/Remote Access Assessment Tool
- Telephony Security Assessment Tool
- Testing Network-Filtering Device Tool
For More Information
For training inquiries, call 850-308-1376
or email us at eramos@gbsi.com
Course Details
Duration - 5 days
Price - $3795.00 USD
(Discounts may apply. Call for more information.)
Acceletrain Collaborative Learning Environment (formerly know as VILT) places industry certified and expert instructors, peers, learners and multi-media components into a "borderless classroom", and interactive learning environment that can span multiple physical locations. VILT combines the benefits of the traditional brick-and-mortar classroom with innovative learning techniques and the cost savings of internet-based training.