The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
Module 1: Introduction to Ethical Hacking
Module 2: Foot printing
Module 3: Scanning
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Sniffers
Module 8: Denial of Service
Module 9: Social Engineering
Module 10: Session Hijacking
Module 11: Hacking Web Servers
ul>
Module 12: Web Application Vulnerabilities
Module 13: Web Based Password Cracking Techniques
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Worms and Viruses
Module 17: Physical Security
Module 18: Linux Hacking
Module 19: Evading Firewalls, IDS and Honeypots
Module 20: Buffer Overflows
Module 21: Cryptography
Module 22: Penetration Testing
A Certified Ethical Hacker candidate should have at least two years of information technology security experience, a strong working knowledge of TCP/IP, and a basic familiarity with Linux.
This class will immerse the student into an interactive environment where they will be shown how to scan, test, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about intrusion detection, policy creation, social engineering, open source intelligence, incident handling, and log interpretation.
The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.