Cart Subtotal: $0.00

Welcome Student!

  • Contact Us
  • (888) 840-2378
  • Tech Support: (866) 830-9276
  • Click here to chat!

Certified Ethical Hacking and Countermeasures, CEH Version 8

Click on image to zoom

Be the first to review this product

SKU# 198864

Availability: In stock

$1,295.00

$1,195.00

Secure shopping trustmarks

Quick Overview

Certified Ethical Hacking and Countermeasures, CEH Version 8

QuickCert Exam Pass Guarantee

QuickCert’s online IT training programs are guaranteed to get you certified – or we will pay for your make-up exam. Our quality online IT courseware, packed with instruction, exercises, practice exams and test simulators will ensure you pass the exam. Learn more.

Course Description

The EC-Council CEH v8 Certified Ethical Hacker Training Package includes expert instructor-led training modules with customized presentations, practice simulators and learning supplements including the EC-Council Training Kit for an all-inclusive training program that provides the benefits of classroom training at your own pace.

EC Council's CEH: Certified Ethical Hacker certification training course enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network.  With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.

Our CEH certification training course will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Certified Ethical Hacker or CEH is a vendor-neutral certification that explores the existence and the use of hacking tools and security systems across 22 topical domains.  Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective.

We are an EC-Council Authorized Training Provider for online training, ensuring our training courses follow the approved curriculum and you receive the training and knowledge needed to get certified. We are so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!

Syllabus

Certified Ethical Hacking and Countermeasures Course Overview

Module 1

Program Introduction
Information Security Overview
Essential Terminology
Information Security Elements
Security, Functionality and Usability Triangle
Information Security Threats and Attack Vectors
Information Security Threats
Hacking Concepts
Hacker Classes
Hacktivism
Hacking Phases
Types Of Attacks
Information Security Controls
Scope and Limitations of Ethical Hacking
Skills of an Ethical Hacker
Defense in Depth
Incident Management Process
Information Security Policies
Penetration Testing
Summary

Module 2

Footprinting
Footprinting Concepts and Terminology
Footprinting Threats
Search Engines, Social Networking and Job Sites
Website Footprinting
Email Footprinting
Competitive Intelligence
Footprinting Using Google
WHOIS Footprinting
DNS Footprinting
Networking Footprinting
Footprinting Through Social Engineering
Footprinting Through Social Networking Sites
Footprinting Tools
Footprinting Counter Measures and Pen Testing
Summary

Module 3

Scanning Networks
Overview of Network Scanning
Check for Live Systems
Check for Open Ports
Scanning Techniques
Xmas, Fin and Null Scans
IDLE Scan
ICMP Echo, List and UDP Scanning
ACK Flag and Port Scanning Countermeasures
Scanning Beyond IDS
Banner Grabbing
Scan for Vulnerability
Draw Network Diagrams
Prepare Proxies
Summary

Module 4

Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
UNIX/Linux and LDAP Enumeration
NTP Enumeration
SMTP and DNS Enumeration
Enumeration Countermeasures
Summary

Module 5

System Hacking
Hacking Methodology
Password Cracking
Password Attack Techniques and Types
Microsoft Authentication
Storing Hash Passwords and LAN Manager Hash
Strong Policy Implementation and Enforcement
Escalating Privileges
Executing Applications
Types of Spywares
Keylogger and Spyware Defense
Hiding Files
NTFS Data Streams
Steganography
Classification of Steganography
Steganography Types
Steganalysis
Cover Your Tracks
Penetration Testing
Summary

Module 6

Trojans and Backdoors
Trojan Concepts
Trojan Infections
Types of Trojans
Detecting Trojans
Trojan Countermeasures
Anti Trojan Software
Summary

Module 7

Viruses and Worms
Viruses Concepts
Types of Viruses
Computer Worms
Malware Analysis
Virus Detection Methods
Summary

Module 8

Sniffing
Sniffing Concepts
Types of Sniffing Attacks
Sniffing Protocols and SPAN Ports
MAC Attacks
DHCP Attacks
ARP Spoofing
Spoofing Attacks
DNS Poisoning
Sniffing Tools
Sniffing Countermeasures
Summary

Module 9

Social Engineering
Social Engineering Concepts
Social Engineering Attack Phases
Common Social Engineering Targets
Social Engineering Techniques and Types
Insider Attacks
Social Engineering Countermeasures
Summary

Module 10

Denial of Service
DoS Attacks
DoS Attack Types
Botnets
DDoS Attacks
DoS Attack Tools
DoS and DDoS Attack Counter Measures
DDoS Penetration Testing
Summary

Module 11

Session Hijacking
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
Summary

Module 12

Hacking Web Servers
Webserver Concepts
Webserver Attacks
Attack Methodology
Webserver Attack Tools
Counter Measures
Webserver Security Tools
Webserver Pen Testing
Summary

Module 13

Web Applications
Web App Threats
Injection Flaws
Cross Site Scripting Attack
Cookie/Session Poisoning and Session Fixation
Improper Error Handling
Broken Authentication and Session Management
Web Service Attack
Hacking Methodology
Web Hacking Tools
Web App Countermeasures
Security Tools
Web App Pen Testing
Summary

Module 14

SQL Injection
SQL Injection Concepts
Testing for SQL Injection
Types of SQL Injection
Blind SQL Injection
Advanced SQL Injection
SQL Injection Tools
Evasion Techniques
Injection Attack Counter Measures
Summary

Module 15

Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Hacking Countermeasures
Summary

Module 16

Hacking Mobile Platforms
Mobile Device Hacking Concepts
Mobile Attack Vectors
Hacking Android OS
Hacking Apple IOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management
Guidelines and Tools
Mobile Pen Testing
Summary

Module 17

Evading IDS, Firewalls, and Honeypots
Intrusion Detection Systems
Firewall Concepts
Honeypot Concepts
IDS Tools
Evading IDS
Evading Firewalls
Detecting Honeypots
Firewall Evasion Tools
Countermeasures
Summary

Module 18

Buffer Overflow
Buffer Overflow Concepts
Buffer Overflow Methodology
Buffer Overflow Detection
Buffer Overflows Counter Measures
Buffer Overflow Security Tools
Summary

Module 19

Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure
E-Mail Encryption
Disk Encryption
Cryptography Attacks
Summary

Module 20

Penetration Testing
Pen Testing Concepts
Pen Testing Types
Pen Testing Techniques
Pen Testing Phases
Outsourcing Pen Testing
Summary

Module 21 - Labs

Lab-1 FootPrinting
Lab-2 Trojan Demo
Lab-3 Encryption

Instructor Bio

Dave B. Chronister
CISSP, C|HFI, MCSE, C|EH

As a Certified Ethical Hacker and Certified Forensic Investigator, Chronister possesses deep security expertise in some of the most heavily regulated industries including financial services and healthcare. Specifically, Sarbanes Oxley (SOX), Gramm-Leach-Bliley Act (GLBA), Payment Card Industries (PCI), and the Health Insurance Portability and Accountability Act (HIPAA).

During the course of his professional career, Chronister served as Architect for A.G Edwards' electronic messaging system - the largest Exchange Server deployment at the time. At Cybersource, he was the technical liaison to the various credit card organizations, developing their payment card compliance standards. Additionally, working with numerous medical and dental practices, Chronister served as Technical Advisor helping these practices meet HIPAA compliance. Recently, he served as Chief Technology Officer for a $700 million dollar bank holding company for over 5 years prior to starting Parameter Security.

Reviews
Write Your Own Review

You're reviewing: Certified Ethical Hacking and Countermeasures, CEH Version 8

  •  
    1 star
    2 stars
    3 stars
    4 stars
    5 stars
    Price
    Value
    Quality

* Required Fields

Free Demo