Certified Ethical Hacking

Duration

3 days

Overview

In recent months, several large companies such as Yahoo and LinkedIn have suffered major security breaches or cyberattacks. As a result, there’s always a need for IT security experts. One of the best ways to prevent security threats is to understand how hackers work. Hackers are innovators and constantly find new ways to attack information systems and exploit system vulnerabilities. Enter ethical hacking - a legal, contracted way to hack systems to help organizations tighten up their security! Sounds cool, doesn’t it?

The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

To master the hacking technologies, you will need to become one, but an ethical one! During this training you will learn the tools and techniques used by hackers and information security professionals alike to break into an organization. This course will immerse you into the hacker mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Because if you want to beat a hacker, you need to think like a hacker!

Course Objectives

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Prerequisites

  • This is a BYOD (Bring Your Own Device) training. Please bring your own laptop to the course.

  • This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of their network security.

Course Content

  • Introduction to Ethical Hacking

    • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds?

    • Information Security Overview

    • Information Security Threats and Attack Vectors

    • Hacking Concepts, Types, and Phases

    • Ethical Hacking Concepts and Scope

    • Information Security Controls

  • Information Security Laws and Standards

    • Footprinting and Reconnaissance

    • Footprinting Concepts

    • Footprinting Methodology

    • Footprinting Tools

    • Footprinting Countermeasures

  • Scanning networks

    • Overview of Network Scanning

    • CEH Scanning Methodology

  • Enumeration

    • Overview of Network Scanning

    • CEH Scanning Methodology

    • Enumeration Concepts NetBIOS

    • Enumeration SNMP

    • Enumeration LDAP

    • Enumeration NTP

    • Enumeration SMTP

    • Enumeration Countermeasures

    • SMB Enumeration

    • Enumeration Countermeasures

    • Enumeration Pen Testing

  • System Hacking

    • Information at Hand Before System Hacking Stage

    • System Hacking: Goals

    • CEH Hacking Methodology (CHM)

    • CEH System Hacking Steps

  • Malware Threats

    • Introduction to Malware

    • Trojan Concepts

    • Types of Trojans

    • Virus and Worms Concepts

    • Malware Reverse Engineering

    • Malware Detection

    • Countermeasures

    • Anti-Malware Software

    • Penetration Testing

  • Sniffing

    • Sniffing Concepts

    • MAC Attacks

    • DHCP Attacks

    • ARP Poisoning

    • Spoofing Attack

    • DNS Poisoning

    • Sniffing Tools

    • Countermeasures

    • Sniffing Detection Techniques

    • Sniffing Pen Testing

  • Social Engineering

    • Social Engineering Concepts

    • Social Engineering Techniques

    • Impersonation on Social Networking Sites

    • Identity Theft

    • Social Engineering

    • Countermeasures

    • Penetration Testing

  • Denial-of-Service

    • DoS/DDoS Concepts

    • DoS/DDoS Attack Techniques

    • Botnets

    • DDoS Case Study

    • DoS/DDoS Attack Tools

    • Counter-measures

    • DoS/DDoS Protection Tools

    • DoS/DDoS Attack Penetration Testing

  • Session Hijacking

    • Session Hijacking Concepts

    • Application Level Session Hijacking

    • Network-level Session Hijacking

    • Session Hijacking Tools

    • Countermeasures

    • Session Hijacking Pen Testing

  • Hacking Webservers

    • Webserver Concepts

    • Webserver Attacks

    • Attack Methodology

    • Webserver Attack Tools

    • Counter-measures

    • Patch Management

    • Webserver Security Tools

    • Webserver Pen Testing

  • Hacking Web Applications

    • Web App Concepts

    • Web App Threats

    • Web App Hacking Methodology

    • Countermeasures

    • Security Tools

    • Web App Pen Testing

  • SQL Injection

    • SQL Injection Concepts

    • Types of SQL Injection

    • SQL Injection Methodology

    • SQL Injection Tools

    • Evasion Techniques

    • Countermeasures

  • Hacking Wireless Networks

    • Wireless Concepts

    • Wireless Encryption

    • Wireless Threats

    • Wireless Hacking Methodology

    • Wireless Hacking Tools

    • Bluetooth Hacking

    • Countermeasures

    • Wireless Security Tools

    • Wi-Fi Pen Testing

  • Hacking Mobile Platforms

    • Mobile Platform Attack Vectors

    • Hacking Android OS

    • Hacking iOS

    • Hacking Windows Phone OS

    • Hacking BlackBerry

    • Mobile Device Management (MDM)

    • Mobile Security Guidelines and Tools

    • Mobile Pen Testing

  • Evading IDS, Firewalls, and Honeypots

    • IDS, Firewall and Honeypot Concepts

    • IDS, Firewall and Honeypot System

    • Evading IDS

    • Evading Firewalls

    • IDS/Firewall Evading Tools

    • Detecting Honeypots

    • IDS/Firewall Evasion Countermeasures

    • Penetration Testing

  • Cloud Computing

    • Introduction to Cloud Computing

    • Cloud Computing Threats

    • Cloud Computing Attacks

    • Cloud Security

    • Cloud Security Tools

    • Cloud Penetration Testing

  • Cryptography

    • Market Survey 2014: The Year of Encryption

    • Case Study: Heartbleed

    • Case Study: Poodlebleed

    • Cryptography Concepts

    • Cryptography Tools

    • Public Key Infrastructure(PKI)

    • Email Encryption

    • Disk Encryption

    • Cryptography Attacks

    • Cryptanalysis Tools

 

Enroll here

Dates will be announced soon


Training cost

Full Price
2.850 EUR (VAT excluded) per person

This training qualifies for the SME portfolio (KMO portefeuille)

Practical details

Classroom
From 9 AM to 4 PM

Language

Dutch

Location

TBA


In collaboration with