Description

  • Provider: Makintouch
  • Location(s): Lagos/Ikeja
  • Duration: 11 days
  • Fee: ₦60,000
  • Venue: 24, Bamishile Street, Beside Best Western Hotel, Off Allen Avenue, Ikeja, Lagos
  • Application Deadline Listing Expired
  • Required Experience
  • Start Date 26 December, 2016

Training/Course Overview

CEH v9.1 is a comprehensive Ethical Hacking and Information Systems Security Auditing training focusing on latest security threats, advanced attack vectors and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks and security measures. In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.

Certified Ethical Hacker

If you’re concerned about the integrity of your network’s infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v8 to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you’ll learn how intruders operate and the steps you can take to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.

Highlights of CEH v9 include:

  • Diagrams of concepts and attacks for clarity and easier interpretation
  • Key industry-standard tools covered in detail
  • Exclusive section for countermeasures against different attacks
  • Time dedicated to penetration testing
  • Results-oriented, descriptive, and analytical lab manual
     

Ethical hacking is just a small part of a strong, comprehensive security solution. That’s why we offer a full line of security training courses, from foundational, multi-vendor training to technology-specific and vendor-specific training. Our courses will help you understand the basic principles behind protecting and securing your information, applications, and networks.

Our security instructors are seasoned veterans who have spent considerable time in the industry. When they aren’t teaching, our instructors spend considerable time on consulting projects, ensuring a thorough understanding of their subject matter and applicable real-world experience.

 

What You’ll Learn

  • Footprinting and reconnaissance
  • Hacking web servers, web applications, and wireless networks
  • Cryptography
  • Penetration testing
  • Social engineering
  • Trojans, viruses, and worms
  • Evading IDS, firewalls, and honeypots
  • Enumeration
  • Buffer overflows

 

Certified Ethical Hacker – Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hijacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Labs

Lab 1: Footprinting and Reconnaissance

  • Discover Network Paths with the Ping Utility
  • Query DNS with nslookup Utility
  • Search for People Using the AnyWho Online Tool
  • Analyze Domain and IP Address Queries Using SmartWhois
  • Trace Network Routes Using Path Analyzer Pro
  • Trace E-Mail Delivery Routes with the eMailTrackerPro Tool
  • Copy a Website with the HTTrack Web Copier Tool
  • Extract Web Data with the Web Data Extractor Tool
  • Search for Web Vulnerabilities with Search Diggity Tool
     

Lab 2: Scanning Networks

  • Scan System and Network Resources Using Advanced IP Scanner
  • Monitor TCP/IP Connections Using the CurrPorts Tool
  • Scan for Network Vulnerabilities Using the GFI Languard Network Scanner
  • Scan Hosts for Services Using Nmap
  • Scan for Vulnerabilities with the Nessus Tool
  • Map a Network Using Global Network Inventory Tool
  • Create Proxies with Proxy Workbench Tool
  • Perform Tunneling with HTTPort/HTTHost Tool
  • Create Packets Using Colasoft Packet Builder
  • Perform Traffic Analysis with the Dude Sniffer Tool
     

Lab 3: Enumeration

  • Enumerate Services with Zenmap
  • Enumerate Hosts Using the SuperScan Tool
  • Enumerate Networks with SoftPerfect Network Scanner
  • Enumerate a Network with SolarWinds Toolset
     

Lab 4: System Hacking

  • Extracting Administrator Passwords Using LCP
  • Hiding Files Using NTFS Streams
  • Search for Alternate Data Streams using the ADS Spy Tool
  • Hide Content with Stealth Files Steganography
  • Extract Passwords with the PWdump7 Tool
  • Generate Rainbow Tables with the Winrtgen Tool
  • Crack Hashed Passwords using the Rainbowcrack Tool
  • Crack Hashed Passwords with the L0phtCrack Tool
  • Execute Files Remotely with the RemoteExec Tool
  • Hide Content with the Snow Steganography Tool
  • Control System Auditing with the Auditpol Utility
  • Reset Passwords with the CHNTPW.iso Tool
  • Monitor Users with the Spytech SpyAgent Tool
  • Hide Content with the QuickStego Tool
     

Lab 5: Trojans and Backdoors

  • Create a Server Using the ProRat Tool
  • Create a Trojan with the OneFile EXE Maker Tool
  • Create a Server with the Proxy Server Trojan
  • Create a Server with the HTTP Trojan
  • Create a Server with Atelier Web Remote Commander
  • Create a Trojan with Biodox Trojan Creator Tool
  • Create a Backdoor with Metasploit
     

Lab 6: Viruses and Worms

  • Create a Virus Using the JPS Virus Maker Tool
  • Reverse Engineer Code Using the IDA Pro Analysis Tool
  • Scan for Viruses with Kaspersky Anti-Malware
  • Generate a Worm Using Internet Worm Maker Thing Tool
     

Lab 7: Sniffers

  • Analyze Packet Captures Using the OmniPeek Network Analyzer
  • Spoof MAC Address Using SMAC
  • Analyze a Network Using the Colasoft Capsa Network Analyzer
  • Sniff Network Traffic with Wireshark
  • Perform ARP Poisoning with Cain
  • Detect Hosts in Promiscuous Mode with PromqryUI
     

Lab 8: Social Engineering

  • Detect Phishing Using Netcraft
  • Create a Rogue Website with Social Engineering Toolkit (SET)

 

Lab 9: Denial of Service

  • Use Hping to Create a Denial of Service Attack
  • Use DoSHTTP to Create a Denial of Service Attack
     

Lab 10: Session Hijacking

  • Hijack and Redirect Web Requests with the Zed Attack Proxy (ZAP)
     

Lab 11: Hacking Webserver

  • Footprint Webservers with the HTTP Recon Tool
  • Footprint a Webserver Using ID Serve
  • Attack Webservers with Metasploit
     

Lab 12: Hacking Web Applications

  • Create a Cross-Site Scripting Attack with JavaScript
  • Explore the Vampire Vulnerability Scanner
  • Scan a Website for Vulnerabilities Using Acunetix
     

Lab 13: SQL Injection

  • Perform SQL Injection Attacks on MS SQL Database
  • Scan an Internet Site with IBM App Scan Vulnerability Scanner
  • Scan a WebServer with N-Stalker Vulnerability Scanner

Lab 14: Hacking Wireless Networks

  • Analyze WiFi Traffic with AirPcap with Wireshark
  • Crack the WEP Key for Captured Traffic with Aircrack-ng
  • UnWEP Bulk Captured Traffic with OmniPeek Once Key is Known

Lab 15: Evading IDS and Firewalls

  • Configure the Snort Intrusion Detection Tool
  • Use the Kiwi Syslog Viewer to Analyze Snort Logs
  • Install, Configure, and Attack the KFSensor Honeypot Tool

Lab 16: Buffer Overflow

  • Code, Compile, and Execute a Buffer Overflow Attack
     

Lab 17: Cryptography

  • Hash Files and Data Using HashCalc
  • Encrypt Data Using the Advanced Encryption Package
  • Encrypt File Systems with TrueCrypt
  • Encrypt Data with the BCTextEncoder Tool

Training/Course Outline / Requirements

Who Needs to Attend

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Prerequisites
At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+ Prep Course is highly recommended.

 

Note:

Cost covers Tuition, Microsoft Original course wares, and certificate of completion.

Date for Training:Jan 23rd-28th, 9am-4pm Daily
 

CONTACT:
Tel:  +2348024316195, +2348180010481, 08077683927, 08077683928, 08077683910
Email: trainings@makintouchconsulting.com , info@makintouchconsulting.com
Website:www.makintouchconsulting.com

Share Sorry this Training Listing has Expired

Related Course/Trainings

Sage Peachtree Training

Sage Peachtree Training

Data-Point Microsystems Ltd Lagos Fulltime

₦30,000
IP Surveillance CCTV & Fire Alarm Training

IP Surveillance CCTV & Fire Alarm Training

Data-Point Microsystems Ltd Lagos Fulltime

₦40,000
Certified Ethical Hacking Training

Certified Ethical Hacking Training

Data-Point Microsystems Ltd Lagos Fulltime

₦100,000
Autocad Engineering Design Training

Autocad Engineering Design Training

Data-Point Microsystems Ltd Lagos Fulltime

₦35,000
SOLAR & INVERTER TRAINING

SOLAR & INVERTER TRAINING

Data-Point Microsystems Ltd Lagos Fulltime

₦25,000
Advanced Excel Training

Advanced Excel Training

Data-Point Microsystems Ltd Lagos Fulltime

₦40,000