Objectives
CEHv9 consists of 18 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial of Service
Session Hijacking
Hacking Web servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Evading IDS, Firewalls, and Honeypot
Cloud Computing
Cryptography
Programme
DAY 1
Key issues plaguing the information security world, incident management process, and penetration testing
Various types of footprinting, footprinting tools, and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
DAY 2
System hacking methodology, steganography, steganalysis attacks, and covering tracks
Different types of Trojans, Trojan analysis, and Trojan countermeasures
Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
Packet sniffing techniques and how to defend against sniffing
DAY 3
Social Engineering techniques, identify theft, and social engineering countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
Different types of webserver attacks, attack methodology, and countermeasures
Different types of web application attacks, web application hacking methodology, and countermeasures
DAY 4
SQL injection attacks and injection detection tools
Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wireless security tools
Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
DAY 5
Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
Various cloud computing concepts, threats, attacks, and security techniques and tools
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
Good to know
Target audience
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Traduit automagiquement de l'Anglais
Where does it take place?
Chambre de Commerce Luxembourg
7 Rue Alcide de Gasperi
Luxembourg
You could like it :
find out about all the networking events and trainings tailored for you!
find out about all the networking events and trainings tailored for you!