Ethical Hacking and Countermeasures v12 (inclusive of certification exam voucher)

Type
Virtual
Classroom ILT
Skill Level

Available dates
Learning Path
Virtual
Duration
1 Day

TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL

DURATION
AVAILABLE DATES
Choose date
From: R24 900,00
Price excluding VAT
Introduction:
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and taught how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks!
Audience profile:
This course will significantly benefit System Administrators, Network Administrators, Engineers, Webmanagers, Security Officers, Auditors, Security Professionals, Site Administrators, and anyone who is concerned about the integrity of their network infrastructure.
Pre-requisites:
The knowledge and skills that a learner must have before attending this course is as follows:
- Have successfully completed EC-Council’s Certified Network Defender (CND) course o
There is a minimum age requirement that applies and attendance of the Ethical Hacking and Countermeasures training course or attempts at the relevant exam, is restricted to candidates who are at least 18 years old.
Course objectives:
Upon completing this course, the learner will be able to:
- Key issues plaguing the information security world, incident management process, and penetration testing.
- Various types of footprinting, footprinting tools, and countermeasures.
- Network scanning techniques and scanning countermeasures.
- Enumeration techniques and enumeration countermeasures.
- System hacking methodology, steganography, steganalysis attacks, and covering tracks.
- Different types of Trojans, Trojan analysis, and Trojan countermeasures.
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
- Packet sniffing techniques and how to defend against sniffing.
- Social Engineering techniques, identify theft, and social engineering countermeasures.
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
- Session hijacking techniques and countermeasures.
- Different types of webserver attacks, attack methodology, and countermeasures.
- Different types of web application attacks, web application hacking methodology, and countermeasures.
- SQL injection attacks and injection detection tools.
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
- Various cloud computing concepts, threats, attacks, and security techniques and tools.
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
- Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
- Different threats to IoT platforms and learn how to defend IoT devices securely
Module 01: Introduction to Ethical Hacking |
Module 02: Footprinting and Reconnaissance |
Module 03: Scanning Networks |
Module 04: Enumeration |
Module 05: System Hacking |
Module 06: Malware Threats |
Module 07: Sniffing |
Module 08: Social Engineering |
Module 09: Denial of Service |
Module 10: Session Hijacking |
Module 11: Hacking Webservers |
Module 12: Hacking Web Applications |
Module 13: SQL Injection |
Module 14: Hacking Wireless Networks |
Module 15: Hacking Mobile Platforms |
Module 16: Evading IDS, Firewalls and Honeypots |
Module 17: Cloud Computing |
Module 18: Cryptography |
Torque IT specializes in providing our Clients with Vendor authorized instructor-led training, enablement IT courses, and certification solutions.
Associated certifications and exam:
The The CEH certification Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50*.
Number of Questions: 125
Passing Score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
On successful completion of this course students will receive a Torque IT attendance certificate
*When you attend any authorized EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorized EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your examination voucher into a Pearson VUE examination voucher, at an additional cost.

EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.