Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Description

  • Provider: Makintouch Consulting
  • Location(s): Lagos
  • Duration: 5 days
  • Fee: ₦80,000
  • Venue: 24, Bamishile Street, Beside Best Western Hotel, Off Allen Avenue, Ikeja, Lagos
  • Application Deadline Not Specified
  • Training Type fulltime
  • Required Experience
  • Start Date 30 September, 2017

Training/Course Overview

CLASS SECTION

DATE

 

Weekend classes : Saturday : 10am – 5pm

                                  Sunday :  12pm – 4pm

Weekday classes : Mondays – Fridays

                                  9am – 5pm

 

Weekend Class 

(Lagos / Ikeja)

 Sept 30, Nov 7,14 & 21

Weekday Class

 (lagos/ Ikeja)  

  

Deborah.o@makintouchconsulting.com

makintouchconsulting@gmail.com

makintouchconsulting.info@gmail.com

trainings@makintouchconsulting.com

09038138550 , 09023365438

 

 

 

 

Training/Course Outline / Requirements

 

TRAINING/COURSE OVERVIEW

CEH v9.1 is a comprehensive Ethical Hacking and Information Systems Security Auditing training focusing on latest security threats, advanced attack vectors and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks and security measures. In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.

CERTIFIED ETHICAL HACKER

If you’re concerned about the integrity of your network’s infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v8 to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you’ll learn how intruders operate and the steps you can take to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.

HIGHLIGHTS OF CEH V9 INCLUDE:Diagrams of concepts and attacks for clarity and easier interpretation

Key industry-standard tools covered in detail

Exclusive section for countermeasures against different attacks

Time dedicated to penetration testing

Results-oriented, descriptive, and analytical lab manual

Ethical hacking is just a small part of a strong, comprehensive security solution. That’s why we offer a full line of security training courses, from foundational, multi-vendor training to technology-specific and vendor-specific training. Our courses will help you understand the basic principles behind protecting and securing your information, applications, and networks.

Our security instructors are seasoned veterans who have spent considerable time in the industry. When they aren’t teaching, our instructors spend considerable time on consulting projects, ensuring a thorough understanding of their subject matter and applicable real-world experience.

What You’ll Learn

Footprinting and reconnaissance

Hacking web servers, web applications, and wireless networks

Cryptography

Penetration testing

Social engineering

Trojans, viruses, and worms

Evading IDS, firewalls, and honeypots

Enumeration

Buffer overflows

CERTIFIED ETHICAL HACKER – COURSE OUTLINE

Introduction to Ethical Hacking

Foot printing and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Sniffers

Social Engineering

Denial of Service

Session Hijacking

Hijacking Web Servers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Evading IDS, Firewalls, and Honeypots

Buffer Overflows

Cryptography

Penetration Testing

LABS

Lab 1: Footprinting and Reconnaissance

Discover Network Paths with the Ping Utility

Query DNS with nslookup Utility

Search for People Using the AnyWho Online Tool

Analyze Domain and IP Address Queries Using SmartWhois

Trace Network Routes Using Path Analyzer Pro

Trace E-Mail Delivery Routes with the eMailTrackerPro Tool

Copy a Website with the HTTrack Web Copier Tool

Extract Web Data with the Web Data Extractor Tool

Search for Web Vulnerabilities with Search Diggity Tool

Lab 2: Scanning Networks

Scan System and Network Resources Using Advanced IP Scanner

Monitor TCP/IP Connections Using the CurrPorts Tool

Scan for Network Vulnerabilities Using the GFI Languard Network Scanner

Scan Hosts for Services Using Nmap

Scan for Vulnerabilities with the Nessus Tool

Map a Network Using Global Network Inventory Tool

Create Proxies with Proxy Workbench Tool

Perform Tunneling with HTTPort/HTTHost Tool

Create Packets Using Colasoft Packet Builder

Perform Traffic Analysis with the Dude Sniffer Tool

Lab 3: Enumeration

Enumerate Services with Zenmap

Enumerate Hosts Using the SuperScan Tool

Enumerate Networks with SoftPerfect Network Scanner

Enumerate a Network with SolarWinds Toolset

Lab 4: System Hacking

Extracting Administrator Passwords Using LCP

Hiding Files Using NTFS Streams

Search for Alternate Data Streams using the ADS Spy Tool

Hide Content with Stealth Files Steganography

Extract Passwords with the PWdump7 Tool

Generate Rainbow Tables with the Winrtgen Tool

Crack Hashed Passwords using the Rainbowcrack Tool

Crack Hashed Passwords with the L0phtCrack Tool

Execute Files Remotely with the RemoteExec Tool

Hide Content with the Snow Steganography Tool

Control System Auditing with the Auditpol Utility

Reset Passwords with the CHNTPW.iso Tool

Monitor Users with the SpytechSpyAgent Tool

Hide Content with the QuickStego Tool

Lab 5: Trojans and Backdoors

Create a Server Using the ProRat Tool

Create a Trojan with the OneFile EXE Maker Tool

Create a Server with the Proxy Server Trojan

Create a Server with the HTTP Trojan

Create a Server with Atelier Web Remote Commander

Create a Trojan with Biodox Trojan Creator Tool

Create a Backdoor with Metasploit

Lab 6: Viruses and Worms

Create a Virus Using the JPS Virus Maker Tool

Reverse Engineer Code Using the IDA Pro Analysis Tool

Scan for Viruses with Kaspersky Anti-Malware

Generate a Worm Using Internet Worm Maker Thing Tool

Lab 7: Sniffers

Analyze Packet Captures Using the OmniPeek Network Analyzer

Spoof MAC Address Using SMAC

Analyze a Network Using the ColasoftCapsa Network Analyzer

Sniff Network Traffic with Wireshark

Perform ARP Poisoning with Cain

Detect Hosts in Promiscuous Mode with PromqryUI

Lab 8: Social Engineering

Detect Phishing Using Netcraft

Create a Rogue Website with Social Engineering Toolkit (SET)

Lab 9: Denial of Service

Use Hping to Create a Denial of Service Attack

Use DoSHTTP to Create a Denial of Service Attack

Lab 10: Session Hijacking

Hijack and Redirect Web Requests with the Zed Attack Proxy (ZAP)

Lab 11: Hacking Webserver

Footprint Webservers with the HTTP Recon Tool

Footprint a Webserver Using ID Serve

Attack Webservers with Metasploit

 

Lab 12: Hacking Web Applications

Create a Cross-Site Scripting Attack with JavaScript

Explore the Vampire Vulnerability Scanner

Scan a Website for Vulnerabilities Using Acunetix

Lab 13: SQL Injection

Perform SQL Injection Attacks on MS SQL Database

Scan an Internet Site with IBM App Scan Vulnerability Scanner

Scan a Webserver with N-Stalker Vulnerability Scanner

Lab 14: Hacking Wireless Networks

Analyze Wi-Fi Traffic with Air cap with Wireshark

Crack the WEP Key for Captured Traffic with Air crack-ng

UnWEP Bulk Captured Traffic with Omni Peek Once Key is Known

Lab 15: Evading IDS and Firewalls

Configure the Snort Intrusion Detection Tool

Use the Kiwi Syslog Viewer to Analyze Snort Logs

Install, Configure, and Attack the KFSensor Honeypot Tool

Lab 16: Buffer Overflow

Code, Compile, and Execute a Buffer Overflow Attack

Lab 17: Cryptography

Hash Files and Data Using HashCalc

Encrypt Data Using the Advanced Encryption Package

Encrypt File Systems with True Crypt

Encrypt Data with the BCTextEncoder Tool

 

Related Course/Trainings

Web Design & Development

Web Design & Development

SCILS Management Center Lagos Parttime

₦35,000
Administering Windows Server 2012(20-411)

Administering Windows Server 2012(20-411)

Makintouch Consulting Lagos Fulltime

₦60,000

Latest Jobs in Nigeria Today - Ngcareers

Ngcareers.com is Nigeria's top job search, recruitment and career website. We provide you the latest jobs and vacancies in Nigeria today.

As a job seeker you can search for jobs from latest and verified job adverts and career information from employers and recruiters in all Nigerian states. You can upload/create your resume to improve your visibility.

Our job services are FREE for job seekers. You can subscribe to Ngcareers via: Email, Facebook, Twitter.