New Horizons Lexington KY Computer Training
New Horizons Computer Learning Center presents
 

Certified Ethical Hacker (CEH) On-Site Training

This on-site training class is also available as Public Schedule Seminar.

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems

Course Description/Agenda


This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Who Should Attend:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

 
Outline:Top
Lesson 1: Introduction to Ethical Hacking
Problem Definition -Why Security?
Essential Terminologies
Elements of Security
The Security, Functionality and Ease of se Triangle
Case Study
What does a Malicious Hacker do?
Types of Hacker Attacks
Hacktivism
Hacker Classes
Security News - Suicide Hacker
Ethical Hacker Classes
What do Ethical Hackers do?
Can Hacking be Ethical
How to become an Ethical Hacker
Skill Profile of an Ethical Hacker
What is Vulnerability Research?
How to Conduct Ethical Hacking
How Do They Go About It?
Approaches to Ethical Hacking
Ethical Hacking Testing
Ethical Hacking Deliverables
Computer Crimes and Implications
Top
Lesson 2: Hacking Laws
www.usdoj.gov
www.gob.mx
www.jf.gov.br
canada.justice.gc.ca
www.opsi.gov.uk
europa.eu
Belgium Laws
Denmark Laws
France Laws
German Laws
Greece Laws
Italian Laws
Netherlands Laws
Norway
The Cybercrime Act 2001
The Information Technology Act
Japan’s Cyber Laws
Singapore’s Cyber Laws
Act on Promotion of Information and Communications Network Utilization and Information Protection
The Computer Crimes Act 1997
www.legislation.gov.hk
Telecommunication Law
Lesson 3: Footprinting
visiting Reconnaissance
Defining Footprinting
Why is Footprinting Necessary
Areas and Information which Attackers Seek
Information Gathering Methodology
Footprinting Tools
E-Mail Spiders
Steps to Create Fake Login Pages
How to Create Fake Login Pages
Websites using Man-in-the-Middle Phishing Kit
Benefits to Fraudster
Steps to Perform Footprinting
Lesson 4: Google Hacking
What is Google hacking
What a hacker can do with vulnerable site
Anonymity with Caches
Using Google as a Proxy Server
Directory Listings
Going Out on a Limb - Traversal Techniques
Extension Walking
Site Operator
Locating Public Exploit Sites
Locating Vulnerable Targets
Web Server Software Error Messages
Application Software Error Messages
Default Pages
Searching for Passwords
Google Hacking Database (GHDB)
SiteDigger Tool
Gooscan
Goolink Scanner
Goolag Scanner
Tool - Google Hacks
Google Hack Honeypot
Google Protocol
Google Cartography
Lesson 5: Scanning
Scanning: Definition
Types of Scanning
Objectives of Scanning
CEH Scanning Methodology
War Dialer Technique
Banner Grabbing
Vulnerability Scanning
Draw Network Diagrams of Vulnerable Hosts
Preparing Proxies
Scanning Countermeasures
Tool: SentryPC
Top
Lesson 6: Enumeration
Overview of System Hacking Cycle
What is Enumeration?
Techniques for Enumeration
NetBIOS Null Sessions
PS Tools
Network Management Protocol (SNMP) Enumeration
LDAP enumeration
NTP enumeration
SMTP enumeration
Web enumeration
Winfingerprint
How To Enumerate Web Application Directories in IIS Using DirectoryServices
IP Tools Scanner
Enumerate Systems Using Default Password
Tools
Steps to Perform Enumeration
Lesson 7: System Hacking
Part 1- Cracking Password
Part 2- Escalating Privileges
Part 3 - Executing applications
Part 4 - Hiding files
Part 5 - Covering Tracks
Lesson 8: Trojans and Backdoors
Effect on Business
What is a Trojan?
Indications of a Trojan Attack
Ports Used by Trojans
Trojans
Classic Trojans Found in the Wild
Hacking Tool: Loki
Atelier Web Remote Commander
Trojan Horse Construction Kit
How to Detect Trojans?
Anti-Trojan Software
Evading Anti-Virus Techniques
Sample Code for Trojan Client/Server
Evading Anti-Trojan/Anti-Virus using Stealth Tools
Backdoor Countermeasures
Tripwire
System File Verification
MD5 Checksum.exe
Microsoft Windows Defender
How to Avoid a Trojan Infection
Lesson 9: Viruses and Worms
Virus History
Characteristics of Virus
Working of Virus
Why people create Computer Viruses
Symptoms of a Virus-like Attack
Virus Hoaxes
Chain Letters
How is a Worm Different from a Virus
Indications of a Virus Attack
Hardware Threats
Software Threats
Virus Damage
Stages of Virus Life
Virus Classification
How Does a Virus Infect?
Storage Patterns of Virus
Famous Virus/Worms – I Love You Virus
Famous Virus/Worms – Melissa
Famous Virus/Worms – JS/Spth
Klez Virus Analysis
Latest Viruses
Top 10 Viruses- 2008
Writing a Simple Virus Program
Virus Construction Kits
Virus Detection Methods
Virus Incident Response
What is Sheep Dip?
Virus Analysis – IDA Pro Tool
Prevention is better than Cure
Anti-Virus Software
Popular Anti-Virus Packages
Virus Databases
Top
Lesson 10: Sniffers
Definition - Sniffing
Protocols Vulnerable to Sniffing
Tool: Network View – Scans the Network for Devices
The Dude Sniffer
Wireshark
Display Filters in Wireshark
Following the TCP Stream in Wireshark
Cain and Abel
Tcpdump
Tcpdump Commands
Types of Sniffing
What is ARP?
IP-based sniffing
Linux Sniffing Tools (dsniff package)
DNS Poisoning Techniques
Interactive TCP Relay
Interactive Replay Attacks
Raw Sniffing Tools
Features of Raw Sniffing Tools
How to Detect Sniffing
Countermeasures
Lesson 11: Social Engineering (DVD)
Lesson 12: Phishing (DVD)
Lesson 13: Hacking Email Accounts (DVD)

More Seminar Information

New Horizons Computer Learning Center
New Horizons Lexington KY Computer Training

Delivery Method

On-Site Training On-Site Training

Also Available As

Seminar Seminar

 
Add to favorites Add to favorites
Email Email this page
 

On-Site Training
Information Request Form

Please complete the form for more information and/or a quote for this on-site class.

Name:

Email

Phone:

City and State

Company:

Number of students:
(at least 10 for consideration)

When do you want to hold the
seminar?

How long would you like for the
seminar?

Additional comments to trainer:

We value your privacy!