Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R24 900,00
Price excluding VAT
Introduction
The Certified Ethical Hacker v12 program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. The Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework:
- Learn (where you gain skills)
- Certify (where you gain recognition)
- Engage (where you would gain experience)
- Compete (where you gain respect)
To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As we put it, “To beat a hacker, you need to think like a hacker.” This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies, or pieces of equipment.
Here, you will be exposed to an entirely unique way of achieving optimal information security posture in their organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and taught how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Scanning, and Gaining Access. Maintaining Access, Covering tracks.
Audience profile
This course would significantly benefit:
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Security officers
- Auditors
- Security Professionals
- Site Administrators
- Anyone concerned about the integrity of their network infrastructure
Pre-requisites
The knowledge and skills that a learner must have before attending this course is as follows:
- Have successfully completed EC-Council’s Certified Network Defender (CND) course
OR
- Have successfully completed CompTIA’s Security+ (IN-SE) course
There is a minimum age requirement that applies and attendance of the Ethical Hacking and Countermeasures training course or attempts at the relevant exam, is restricted to candidates who are at least 18 years old.
Course objectives
Upon completing this course, the learner will be able to:
- Key issues plaguing the information security world, incident management process, and penetration testing
- Diverse types of foot-printing, foot-printing tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Diverse types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS (Distributed DoS (Denial of Service)) attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Diverse types of webserver attacks, attack methodology, and countermeasures
- Diverse types of web application attacks, web application hacking methodology, and countermeasures
- SQL injection attacks and injection detection tools
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
- Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools
- Firewall, IDS (Intrusion Detection System) and honeypot evasion techniques, evasion tools, and countermeasures
- Various cloud computing concepts, threats, attacks, and security techniques and tools
- Diverse types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Diverse types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
- Perform vulnerability analysis to identify security loopholes in the target organisation’s network, communication infrastructure, and end systems
- Different threats to IoT (Internet of Things) platforms and learn how to defend IoT devices securely
Course content
Module 01: Introduction to Ethical Hacking | |
|
|
|
|
|
|
Module 02: Footprinting and Reconnaissance | |
|
|
|
|
|
|
|
|
|
|
|
|
Module 03: Scanning Networks | |
|
|
|
|
|
|
|
|
Module 04: Enumeration | |
|
|
|
|
|
|
|
|
Module 05: Vulnerability Analysis | |
|
|
|
|
Module 06: System Hacking | |
|
|
|
|
|
|
Module 07: Malware Threats | |
|
|
|
|
|
|
|
|
Module 08: Sniffing | |
|
|
|
|
|
|
|
|
Module 09: Social Engineering | |
|
|
|
|
|
|
|
|
Module 10: Denial-of-Service | |
|
|
|
|
|
|
Module 11: Session Hijacking | |
|
|
|
|
|
|
Module 12: Evading IDS, Firewalls, and Honeypots | |
|
|
|
|
|
|
|
|
Module 13: Hacking Web Servers | |
|
|
|
|
|
|
Module 14: Hacking Web Applications | |
|
|
|
|
|
|
Module 15: SQL Injections | |
|
|
|
|
|
|
Module 16: Hacking Wireless Networks | |
|
|
|
|
|
|
|
|
Module 17: Hacking Mobile Platforms | |
|
|
|
|
|
|
Module 18: IoT and OT (Operational Technology) Hacking | |
|
|
|
|
|
|
|
|
|
|
Module 19: Cloud Computing | |
|
|
|
|
|
|
Module 20: Cryptography | |
|
|
|
|
|
|
|
|
Ethical Hacking Essential Concepts – I | |
|
|
|
|
|
|
|
|
|
|
Ethical Hacking Essential Concept – II | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Associated certifications and exam
Exam Details | CEHv12 (ANSI)/ (MCQ Exam) | CEHv12 (Practical) |
Exam Title | Certified Ethical Hacker (ANSI) | Certified Ethical Hacker (Practical) |
Number of Questions/Practical Challenges | 125 | 20 |
Test Duration | 4 Hours | 6 Hours |
Test Format | Multiple Choice Questions | iLabs Cyber Range |
Test Delivery | ECC EXAM, VUE | – |
Availability | ECC EXAM, VUE | ASPEN iLabs |
Exam Prefix | 312-50(ECC EXAM)
312-50(VUE) |
– |
Passing Score | Please refer to http://cert.eccounsil.org/faq.html | 70% |
On successful completion of this course students will receive a Torque IT attendance certificate
Note:
When you attend any authorised EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorised EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your examination voucher into a Pearson VUE examination voucher (Remote Procuring Services), at an additional cost.
EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.