StormWind’s Ethical Hacking v12 online training course will immerse students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will gain an understanding of how to leverage a multitude of tools at the disposal of today’s hackers. Ethical hackers use many of the same tools as malicious hackers including, footprinting, sniffing, trojans, and more! When a student completes this online training course they will have knowledge and experience working as penetration testers on their organization’s Red Team. Students completing all activities in this training will have the knowledge to pass the CEH exam (312-50).
Overview
Skills Learned
After completing this online training course, students will be able to:
Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
Different types of footprinting, footprinting tools, and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Different types of vulnerability assessment and vulnerability assessment tools
System hacking methodology
Different types of malware, malware analysis procedure, and malware countermeasures
Various packet sniffing techniques and sniffing countermeasures
Social engineering techniques, insider threats, identity theft, and countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
Different types of web server and web application attacks, hacking methodology, and countermeasures
SQL injection attacks, evasion techniques, and SQL injection countermeasure
Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
Mobile platform attack vector, andriod and iOS hacking, mobile device management, mobile security guidelines, and security tools
Different IoT attacks, IoT hacking methodology, IoT hacking tools, and countermeasures
Various cloud computing threats, attacks, and security techniques and tools
Different types of encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools
Ethical Hacking v12 will significantly benefit security officers, auditors, security professionals, site administrators, anyone who is concerned about the integrity of their network infrastructure, and those looking to become CEH (312-50) certified will be prepared by this class.
A working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies is strongly recommended.
- Hack
- Hacker
- Hacking
- Basics of Hacking
- Reconnaissance
- Scanning, Uptime Chart
- Gaining Access and Clearing Tracks
- What Exactly is Ethical Hacking
- Network Infrastructure, OSI Model, Network Devices
- Understanding IP, DNS, DHCP, Subnetting
- Understanding IPv4 Addresses, Address Classes
- Subnet Masks
- CIDR
- DHCP
- Domain Name Systems
- Dual Homed Host, APT’s
- Intrusion Detection Software
- Securing the Perimeter
- Security Based Organizational Protocols
- Confidentiality, AAA, Non-Repudiation
- Mandatory and Non-Mandatory Compliance Frameworks
- Keys, Digital Certificates
- Attack Steps, Wireless Attacks
- Internet of Things (IoT)
- Viruses, Worms, Trojans
- Stealth Viruses, Steganography
- Ransomware, Spyware, Adware, Scareware
- Spam Emails and Mitigation Techniques
- Bug Types and Attack Vectors
- Honeypots and Password Attacks
- Website Vulnerabilities
- Understanding Risk and Liability
Tuesday, December 5
Wednesday, December 6
Thursday, December 7
Monday, January 29
Tuesday, January 30
Wednesday, January 31
Thursday, February 1
Monday, February 5
Tuesday, February 6
Wednesday, February 7
Thursday, February 8
Skills Learned
After completing this online training course, students will be able to:
Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
Different types of footprinting, footprinting tools, and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Different types of vulnerability assessment and vulnerability assessment tools
System hacking methodology
Different types of malware, malware analysis procedure, and malware countermeasures
Various packet sniffing techniques and sniffing countermeasures
Social engineering techniques, insider threats, identity theft, and countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
Different types of web server and web application attacks, hacking methodology, and countermeasures
SQL injection attacks, evasion techniques, and SQL injection countermeasure
Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
Mobile platform attack vector, andriod and iOS hacking, mobile device management, mobile security guidelines, and security tools
Different IoT attacks, IoT hacking methodology, IoT hacking tools, and countermeasures
Various cloud computing threats, attacks, and security techniques and tools
Different types of encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools
Ethical Hacking v12 will significantly benefit security officers, auditors, security professionals, site administrators, anyone who is concerned about the integrity of their network infrastructure, and those looking to become CEH (312-50) certified will be prepared by this class.
A working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies is strongly recommended.
- Hack
- Hacker
- Hacking
- Basics of Hacking
- Reconnaissance
- Scanning, Uptime Chart
- Gaining Access and Clearing Tracks
- What Exactly is Ethical Hacking
- Network Infrastructure, OSI Model, Network Devices
- Understanding IP, DNS, DHCP, Subnetting
- Understanding IPv4 Addresses, Address Classes
- Subnet Masks
- CIDR
- DHCP
- Domain Name Systems
- Dual Homed Host, APT’s
- Intrusion Detection Software
- Securing the Perimeter
- Security Based Organizational Protocols
- Confidentiality, AAA, Non-Repudiation
- Mandatory and Non-Mandatory Compliance Frameworks
- Keys, Digital Certificates
- Attack Steps, Wireless Attacks
- Internet of Things (IoT)
- Viruses, Worms, Trojans
- Stealth Viruses, Steganography
- Ransomware, Spyware, Adware, Scareware
- Spam Emails and Mitigation Techniques
- Bug Types and Attack Vectors
- Honeypots and Password Attacks
- Website Vulnerabilities
- Understanding Risk and Liability