Ethical Hacking

 

Cybersecurity Demo

Ethical Hacking

StormWind’s Ethical Hacking online training course will immerse students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will gain an understanding of how to leverage a multitude of tools at the disposal of today’s hackers. Ethical hackers use many of the same tools as malicious hackers including, footprinting, sniffing, trojans, and more! When a student completes this online training course they will have knowledge and experience working as penetration testers on their organization’s Red Team. Students completing all activities in this training will have the knowledge to pass the CEH exam (312-50).

Instructor:

Michael Redman, CEH, CISM, CISSP, Security+

Course Information

Skills Learned

The Ethical Hacking online training course covers:

  • Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
  • Different types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Different types of vulnerability assessment and vulnerability assessment tools
  • System hacking methodology
  • Different types of malware, malware analysis procedure, and malware countermeasures
  • Various packet sniffing techniques and sniffing countermeasures
  • Social engineering techniques, insider threats, identity theft, and countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
  • Different types of web server and web application attacks, hacking methodology, and countermeasures
  • SQL injection attacks, evasion techniques, and SQL injection countermeasure
  • Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
  • Mobile platform attack vector, andriod and iOS hacking, mobile device management, mobile security guidelines, and security tools
  • Different IoT attacks, IoT hacking methodology, IoT hacking tools, and countermeasures
  • Various cloud computing threats, attacks, and security techniques and tools
  • Different types of encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools

Who Should Attend This Course

Ethical Hacking will significantly benefit security officers, auditors, security professionals, site administrators, anyone who is concerned about the integrity of their network infrastructure, and those looking to become CEH (312-50) certified will be prepared by this class.

Prerequisites

A working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies is strongly recommended.

Course Outline

Module 1: Security Concepts

  • Basic security concepts
  • Hacking concepts
  • Threats, attack vectors, and risk
  • Information security controls
  • Physical security
  • Incident management
  • Information security laws and standards

Module 2: Reconnaissance Activities l

  • Footprinting overview
  • Footprinting methodology
  • Footprinting tools
  • Network scanning concepts
  • Network scanning tools
  • Network scanning techniques

Module 3: Reconnaisance Activities ll

  • Banner grabbing
  • Drawing network diagrams
  • Sniffing concepts
  • Sniffing techniques and tools
  • Sniffing countermeasures and detection

Module 4-5: Vulnerability Assessments and Social Engineering

  • Vulnerability assessment concepts
  • Vulnerability scoring systems
  • Vulnerability assessment tools
  • Vulnerability assessment reports
  • Relation to penetration testing
  • Social engineering
  • Insider threats
  • Countermeasures

Module 6: Malware

  • Malware concepts
  • Trojans
  • Viruses and worms
  • Malware analysis
  • Countermeasures

Module 7: System Hacking Basics

  • System hacking concepts
  • Password cracking
  • Privilege escalation
  • Hiding files
  • Covering tracks

Module 8: Penetration Testing Web Servers l

  • Web server concepts
  • Web server attacks
  • Attack methodology
  • Web server attack tools
  • Countermeasures
  • Web application concepts
  • Web application threats

Module 9: Penetration Testing Web Servers ll

  • Web application hacking methodology
  • Web application hacking tools
  • Countermeasures
  • Security testing tools
  • Penetration testing

Module 10: Network Attacks

  • Denial of service concepts and techniques
  • Botnets
  • Attack tools
  • Countermeasures and protection tools
  • Cloud penetration testing
  • Session hijacking concepts and tools
  • Session hijacking countermeasures

Module 11: Network Defenses

  • IDS, firewall, and honeypot concepts
  • IDS, firewall, and honeypot solutions
  • IDS evasion
  • Firewall evasion tools

Module 12: Wifi Pen Testing

  • Wireless concepts
  • Wireless encryption
  • Wireless threats
  • Wireless hacking methodology
  • Bluetooth hacking
  • Countermeasures
  • Wireless security tools

Module 13: Cryptography and Cryptanalysis

  • Cryptography concepts
  • Encryption algorithms
  • Cryptography tools
  • Public Key Infrastructure (PKI)
  • Email encryption
  • Disk encryption
  • Cryptanalysis
  • Countermeasures

Module 14: Mobile Platforms

  • Mobile platform attack vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile spyware
  • Mobile device management
  • Mobile security guidelines and tools
  • Mobile penetration testing

Module 15: Cloud Security

  • Cloud computing concepts
  • Cloud computing threats
  • Cloud computing attacks
  • Cloud security
  • Cloud penetration testing

Module 16: IoT

  • IoT Concepts
  • IoT attacks
  • IoT hacking methodology
  • IoT hacking tools
  • Countermeasures
  • IoT penetration testing

CLASS START DATES



– ET

Are you a student and need support?

Don’t see the class you’re looking for?

Get a demo or pricing!

Call (800) 850-9932 or submit this form to get pricing for you or your team.

We absolutely love being able to tailor the StormWind training experience to you and your goals. Simply provide us with a little bit of upfront info and we’ll get to work on customizing learning packages for you—at a price you just can’t resist.