Processing your application. Please be patient while we make sure we receive every piece of it.
Information Security
Certified Ethical Hacker iClass (CEH)
5 Day(s)
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
Course OverviewEC-Council | iClass Online Event Venue is a robust learning environment designed to enhance the remote learning experience of our Information Security Students. iClass encompasses current technologies in online Web Conferencing, VOIP Services, distributed Video Platforms, and our new iLabs product allowing every student full hands on access to live servers to conduct labs in virtualized environments. By combining live instruction, classroom interactivity, remote control capabilities, live hands-on labs, and the power of the world wide web, students now have more learning options than ever when it comes to EC-Council titles. If you want to stop hackers from invading your network, first you've got to invade their minds. Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure. The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50.ObjectivesThe CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. You will understand and know how to look for weaknesses and vulnerabilities in targeted systems, and use the same knowledge and tools as a malicious hacker.AudienceThis course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.PrerequisitesEthical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student--the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.
Price: $3,330
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com

Certified Ethical Hacker iClass (CEH)

Topics

Module 1: Introduction to Ethical Hacking

Module 2: Hacking Laws

Module 3: Footprinting

Module 4: Google Hacking

Module 5: Scanning

Module 6: Enumeration

Module 7: System Hacking

Module 8: Trojans and Backdoors

Module 9: Viruses and Worms

Module 10: Sniffers

Module 11: Social Engineering

Module 12: Phishing

Module 13: Hacking Email Accounts

Module 14: Denial-of-Service

Module 15: Session Hijacking

Module 16: Hacking Web Servers

Module 17: Web Application Vulnerabilities

Module 18: Web-Based Password Cracking Techniques

Module 19: SQL Injection

Module 20: Hacking Wireless Networks

Module 21: Physical Security

Module 22: Linux Hacking

Module 23: Evading IDS, Firewalls and Detecting Honey Pots

Module 24: Buffer Overflows

Module 25: Cryptography

Module 26: Penetration Testing

Module 27: Covert Hacking

Module 28: Writing Virus Codes

Module 29: Assembly Language Tutorial
Module 30: Exploit Writing

Module 31: Smashing the Stack for Fun and Profit

Module 32: Windows Based Buffer Overflow Exploit Writing

Module 33: Reverse Engineering

Module 34: Macintosh Hacking

Module 35: Hacking Routers, cable Modems and Firewalls

Module 36: Hacking Mobile Phones, PDA and Handheld Devices

Module 37: Bluetooth Hacking

Module 38: VoIP Hacking

Module 39: RFID Hacking

Module 40: Spamming

Module 41: Hacking USB Devices

Module 42: Hacking Database Servers

Module 43: Cyber Warfare - Hacking, Al-Qaida and Terrorism

Module 44: Internet Content Filtering Techniques

Module 45: Privacy on the Internet

Module 46: Securing Laptop Computers

Module 47: Spying Technologies

Module 48: Corporate Espionage - Hacking Using Insiders

Module 49: Creating Security Policies

Module 50: Software Piracy and Warez

Module 51: Hacking and Cheating Online Games

Module 52: Hacking RSS and Atom

Module 53: Hacking Web Browsers

Module 54: Proxy Server Technologies

Module 55: Data Loss Prevention

Module 56: Hacking Global Positioning System (GPS)

Module 57: Computer Forensics and Incident Handling

Module 58: Credit Card Frauds

Module 59: How to Steal Passwords

Module 60: Firewall Technologies

Module 61: Threats and Countermeasures
Module 62: Case Studies
Module 63: Botnets

Module 64: Economic Espionage

Module 65: Patch Management

Module 66: Security Convergence

SITE MAP