Certified Ethical Hacker (CEH) Training

In this award-winning CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH) exam, and an in-depth understanding of how to deploy tools and techniques needed to protect your network. Included in your course tuition is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

Target Audience

Individuals who have a security background and would like to successfully prepare for EC-Council’s Certified Ethical Hacker certification.

Recommended Experience

Two years of security-related experience and a strong practical working knowledge of TCP/IP.

Course Duration

This is a 5-day class.

Exam Voucher

This course includes a voucher to take the EC-Council CEH exam via ProctorU.

You Will Learn How To

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyze your company’s risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Course Outline

Ethical Hacking Fundamentals

  • Considering the effects of hacking
  • Reviewing the elements of information security
  • The security, functionality and usability triangle

Outlining the methods of hackers

  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

Functions of an ethical hacker

  • Conducting vulnerability research
  • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance

  • Objectives and methods of footprinting
  • Searching for information with Google Hacking
  • Employing footprinting countermeasures

Scanning networks

  • Adopting multiple scanning techniques
  • Identifying IDS–evasion and IP–fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection

Examining enumeration techniques

  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration
  • Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking

  • CEH Hacking Methodology (CHM)
  • Cracking passwords and escalating privileges
  • Defending against password cracking and keyloggers
  • Hiding information with steganography

Uncovering Trojans and backdoors

  • Injecting a Trojan into a host
  • Analyzing Trojan activity

Dissecting viruses, worms and sniffers

  • Distributing malware on the web
  • Recognizing key indicators of a virus attack
  • Analyzing worms and malware

Social engineering and Denial–of–Service (DoS)

  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks

  • Cross–Site Scripting (XSS) and web application DoS attacks
  • Defending against SQL injection
  • Implementing a man–in–the–middle attack

Hijacking sessions and web servers

  • Spoofing a site to steal credentials
  • Preventing hijacking by implementing countermeasures
  • Leveraging Metasploit in an attack

Evading IDS, firewalls and honeypots

  • Assessing various types of Intrusion Detection Systems (IDS) and tools
  • Bypassing firewalls and accessing blocked sites

Buffer overflow and cryptography

  • Exploiting input validation failures
  • Defending against memory corruption attacks
  • Performing Penetration Testing
  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

Please contact us for more information.


For your cybersecurity training and consulting, go with the pros at SeattlePro.