Certified Ethical Hacking SOUTECH Digital Academy
Price: NGN 70,000

    Course details

    The Cybersecurity Expert course through SOUTECH Academy will help trainees to stop hackers, terrorists by learning to think like one. This class immerses participants in an interactive environment where they will scan, test, hack, and secure their own systems. Candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, and Virus Creation. All participants will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests and apply it.

    Who Should Attend?

    • Computer Forensics/Digital Forensics Professionals 
    • Incident Response Personnel 
    • Military Personnel 
    • Information Security Professionals 
    • IT Managers 
    • Law Enforcement Personnel 
    • Legal Professionals 
    • Network Administrators and Architects 
    • System Administrators
    Course Content:

    Module 1: Introduction to Ethical Hacking, Counter Terrorism

    • Information Security Overview 
    • Information Security Threats and Attack Vectors 
    • Hacking Concepts, Types, and Phases 
    • Ethical Hacking Concepts and Scope 
    • Information Security Controls 
    • Information Security Laws and Standards 

    Module 2: Footprinting and Reconnaissance

    • Footprinting Concepts 
    • Footprinting Methodology 
    • Footprinting Tools 
    • Footprinting Countermeasures 
    • Footprinting Penetration Testing 

    Module 3: Scanning Networks

    • Overview of Network Scanning 
    • Scanning Methodology 

    Module 4: Enumeration

    • Enumeration Concepts 
    • NetBIOS Enumeration 
    • SNMP Enumeration 
    • LDAP Enumeration 
    • NTP Enumeration 
    • SMTP Enumeration 
    • Enumeration Countermeasures 
    • SMB Enumeration Countermeasures 
    • Enumeration Pen Testing
    Module 5: System Hacking

    • Information at Hand Before System Hacking Stage 
    • System Hacking: Goals 
    • Hacking Methodology (CHM) 
    • System Hacking Steps 
    • Hiding Files 
    • Covering Tracks 
    • Penetration Testing 

    Module 6: Malware Threats

    • Introduction to Malware 
    • Trojan Concepts 
    • Types of Trojans 
    • Virus and Worms Concepts 
    • Malware Reverse Engineering 
    • Malware Detection 
    • Countermeasures 
    • Anti-Malware Software 
    • Penetration Testing 

    Module 7: Sniffing

    • Sniffing Concepts 
    • MAC Attacks 
    • DHCP Attacks 
    • ARP Poisoning 
    • Spoofing Attack 
    • DNS Poisoning 
    • Sniffing Tools 
    • Sniffing Tool: Wireshark 
    • Follow TCP Stream in Wireshark 
    • Display Filters in Wireshark 
    • Additional Wireshark Filters 
    • Sniffing Tool 
    • Packet Sniffing Tool: Capsa Network Analyzer 
    • Network Packet Analyzer 
    • Counter measures 
    • Sniffing Detection Techniques 
    • Sniffing Pen Testing 

    Module 8: Social Engineering

    • Social Engineering Concepts 
    • Social Engineering Techniques 
    • Impersonation on Social Networking Sites 
    • Identity Theft 
    • Social Engineering Countermeasures 
    • Penetration Testing 

    Module 9: Denial-of-Service

    • DoS/DDoS Concepts 
    • DoS/DDoS Attack Techniques 
    • Botnets 
    • DDoS Case Study 
    • DoS/DDoS Attack Tools 
    • Counter-measures 
    • DoS/DDoS Protection Tools 
    • DoS/DDoS Attack Penetration Testing 

    Module 10: Session Hijacking

    • Session Hijacking Concepts 
    • Application Level Session Hijacking 
    • Network-level Session Hijacking 
    • Session Hijacking Tools 
    • Counter-measures 
    • Session Hijacking Pen Testing 

    Module 11: Hacking Webservers

    • Webserver Concepts 
    • Webserver Attacks 
    • Attack Methodology 
    • Webserver Attack Tools 
    • Counter-measures 
    • Patch Management 
    • Webserver Security Tools 
    • Webserver Pen Testing 

    Module 12: Hacking Web Applications

    • Web App Concepts 
    • Web App Threats 
    • Web App Hacking Methodology 
    • Web Application Hacking Tools 
    • Countermeasures 
    • Security Tools 
    • Web App Pen Testing 

    Module 13: SQL Injection

    • SQL Injection Concepts 
    • Types of SQL Injection 
    • SQL Injection Methodology 
    • SQL Injection Tools 
    • Evasion Techniques 
    • Counter-measures 

    Module 14: Hacking Wireless Networks

    • Wireless Concepts 
    • Wireless Encryption 
    • WirelessThreats 
    • Wireless Hacking Methodology 
    • Wireless Hacking Tools 
    • Bluetooth Hacking 
    • Counter-measures 
    • Wireless Security Tools 
    • Wi-Fi Pen Testing 

    Module 15: Hacking Mobile Platforms

    • Mobile Platform Attack Vectors 
    • Hacking Android OS 
    • Hacking iOS 
    • Hacking Windows Phone OS 
    • Hacking BlackBerry 
    • Mobile Device Management (MDM) 
    • Mobile Security Guidelines and Tools 
    • Mobile Pen Testing 

    Module 16: Evading IDS, Firewalls, and Honeypots

    • IDS, Firewall and Honeypot Concepts 
    • IDS, Firewall and Honeypot System 
    • Evading IDS 
    • Evading Firewalls 
    • IDS/Firewall Evading Tools 
    • Detecting Honeypots 
    • IDS/Firewall Evasion Counter-measures 
    • Penetration Testing 

    Module 17: Cloud Computing

    • Cloud Computing Threats 
    • Cloud Computing Attacks 
    • Cloud Security 
    • Cloud Security Tools 
    • Cloud Penetration Testing 

    Module 18: Cryptography

    • Market Survey 2014: The Year of Encryption 
    • Case Study: Heartbleed 
    • Case Study: Poodlebleed 
    • Cryptography Concepts 
    • Encryption Algorithms 
    • Cryptography Tools 
    • Public Key Infrastructure(PKI) 
    • Email Encryption 
    • Disk Encryption 
    • Cryptography Attacks 
    • Cryptanalysis Tools 

    Module 19: Application of Ethical Hacking Skills to Nigerian,African,World Cyber Survelliance Drive

    • Overview of Skill Set 
    • Nigerian Terrorism, Groups, Actions, Footprints 
    • Cyber warfare Strategy Development 
    • Cyber Interception/ Surveillance Roadmap and Implementation 
    • Achieving Results and Metrics for Analysis, Reporting and Awareness

    Updated on 01 November, 2018

    Job roles this course is suitable for:

    Ethical Hacker , Security Analyst , Security Consultant

    About SOUTECH Digital Academy

    SOUTECH Web Development Consults – (a smart and budding Information Technology (IT) firm with innovative, intelligent, knowledgeable and experienced consultants, trainers and developers.

    SOUTECH is primarily an Information Technology Firm which has been in operation for over 10 years, created to be the numero uno in business promotion development & implementation, eBusiness & IT systems integration and consultancy industry of the Nigerian Economy and to partners worldwide.

    Our Services and Training Solutions

    –Mobile App Development
    -Websites, eBusiness &  eCommerce Platform Development
    -Integrated Online Marketing Solutions
    -Web Portals and Application Development
    -Alternative Energy Deployment
    -Softwares(Antivirus,Windows,Utility)
    -eHR and Staff Human Capacity Development
    -Research and Technical Documentation
    -ComprehensiveTraining & Consulting(iClass, Online, Train the Trainer, Home Kit options available See all SOUTECH Digital Academy courses
    Courses you can instantly connect with... Do an online course on Certified Ethical Hacker (CEH) starting now. See all courses

    Is this the right course for you?

    Didn't find what you were looking for ?

    or