Ethical Hacking

Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques. The CEH program is the core of the most desired information security training system any information security professional will ever want to be in. CEH is the ¬first part of a 3 part EC-Council Information Security Track which helps to master hacking technologies.

Click Below To Download Ethical Hacking Brochure

Certified Ethical Hacking

PROGRAM HIGHLIGHTS


CERTIFICATIONS

Get prepared for globally recognized Certifications

 

GLOBAL PRESENCE

150+ centres spread over 20+ countries

 

LAB FACILITY

State-of-the-art Infrastructure based on latest technologies

 

EXPERIENCED FACULTY

Get trained from industry-experts

 

iSMAC PROGRAMS

Based on ITIMS, Social, Mobility, Analytics and Cloud

 

PLACEMENT ASSISTANCE

Dedicated Placement Cell for IIHT students

Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.

The CEH program is the core of the most desired information security training system any information security professional will ever want to be in. CEH is the ¬first part of a 3 part EC-Council Information Security Track which helps to master hacking technologies. After getting certified as a CEH, one will become a hacker, but an ethical one!

This course was designed to provide the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

Why we need to learn Certified Ethical Hacker Course?

This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and x the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization.

Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Program highlights of CEH v9 that are designed to provide a comprehensive ethical hacking are listed as follows:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web servers
  • Hacking Web Applications
  • SQL injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypot
  • Cloud Computing
  • Cryptography
  • Penetration Testing, Scoping and Engagement Methodology
  • Database Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • Cloud Penetration Testing Methodology

After a successful completion of CEH v9 Certification, a Certified Ethical Hacker attracts the following job opportunities:

  • IT Security Specialist
  • IT Security Consultant
  • Network Security Specialist
  • Security Administrator
  • Ethical Hacker
  • Penetration Tester
  • Site Administrator
  • IT Auditor
  • Computer Forensics Analyst
  • Homeland Security Specialist
  • Business and Hiring Managers
  • Information Security Engineer
  • Cyber Engineer
  • Data Security Analyst

CEH COURSE CONTENTS

INTRODUCTION TO ETHICAL HACKING

Information Security World,Introduction to Hacking Terminologies,Elements of Information Security,Ethical Hackers,Types of Attacks on the Systems,Scope and Limitation on Ethical Hacking,Vulnerabilities and Vulnerability Research Tools,Understand Penetration Testing and Various Methods

ENUMERATION

Learn the System Hacking Cycle, Introduction to Enumeration, Null Sessions and its Countermeasures, SNMP Enumeration and its Countermeasures, Enumeration Pen Testing

SNIFFING

Understanding Sniffers, Using a Sniffer, Switched Network Sniffing, Counter measures for Defending against Sniffing, Sniffing Detection Techniques, and Sniffing Pen Testing

SESSION HIJACKING

Introduction to Session Hijacking, Spoofing vs. Hijacking, Discuss Session Sniffing, Levels of Session Hijacking, Tools and Countermeasures, Session Hijacking Pen Testing.

SQL INJECTION

Introduction to SQL injection, Understanding the process of Web Application, Introduction to Server-Side Technologies, Understanding SQL Query and grabbing SQL server hashes, Detecting SQL Injection Vulnerabilities and Defensive Strategies, SQL Injection hacking tools and detection tools,SQL Injection Countermeasures

EVADING IDS, FIREWALLS, AND HONEYPOTS

Introduction to Intrusion Detection System, Firewall and Evading Technique, Introduction to Honeypots, Countermeasures, Analyze Firewall and IDS Penetration Testing

FOOT PRINTING

Introduction to Footprinting,footprinting Threats,Smart Whois,DNS,Traceroute,Google hacking, Website mirroring, and email tracking,Mirroring Tools,Email tracking Methodology,Penetration Testing,Footprinting through Social Engineering

SYSTEM HACKING

System Hacking, Authentication on Microsoft Platforms, Privilege Escalation, Covering Your Tracks, Penetration Testing.

SOCIAL ENGINEERING

Social Engineering and human weakness, Different Types of social engineering, Warning signs of an attack, Dumpster Diving, Human-based Social Engineering, Social Engineering threats and defense Comprehend Identity Theft, Phishing Attacks and URL obfuscation, Online Scams, Commonly Employed Threats, Social Engineering on Social Networking Sites

HACKING WEB SERVERS

Introduction to web server, Web server attacks and its Impacts, Web server Methodology and tools, Patch Management,Web server Pen Testing

HACKING WIRELESS NETWORKS

Introduction to Wireless Networking, Knowing WEP, WPA/WPA2,Wireless Hacking Methodology and Various tools, Introduction to Bluetooth, Defending against Wireless Attacks, Wireless Penetration Testing Framework.

CLOUD COMPUTING

What Is Cloud, Cloud Computing Attacks, Controls for Cloud Security, Cloud Penetration Testing Recommendation for Cloud Testing

SCANNING NETWORKS

To put your enterprise in a position to win, you have to break down the barriers that hold you back. Linux is the preferred choice here! Linux is an open-source platform with unparalleled stability and flexibility, where you can manage your resources towards better productivity. More than 90% of Fortune Global 500 companies use Linux and other Linux based solutions.

MALWARE

Introduction to Malware, Trojan, Virus and Worm, Detection Methods, Countermeasures, Penetration Testing.

DENIAL OF SERVICE

Introduction to DoS Attack, DoS Attack Techniques, tools, countermeasure, Internet Chat Query (ICQ), Internet Relay Chat (IRC) and Botnets, Analyze Post-Attack Forensics, Penetration Testing for DoS/DDoS.

HACKING WEB APPLICATION

Introduction to Web Application, Security Vulnerability and Attacks, Web application Hacking Methodology and Tools, Defending and Security Tools for web application, Pen Testing

HACKING MOBILE PLATFORMS

Mobile OS Models and Architectures, Device Security Models Countermeasures.

CRYPTOGRAPHY

Introduction to Cryptography, Encryption algorithm techniques, Encryption, Public Key Infrastructure, Identify Digital Signature, Secure Sockets Layer