- Other Location: Bur Dubai - Dubai
- Duration: Upto 5 Days
- Timings: Part Time, Weekdays
Course details
Course Outline1 - Introduction to Ethical Hacking
Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Hacking Concepts and Scope Information Security Controls Information Security Laws and Standards
2 - Footprinting and Reconnaissance
Footprinting Concepts Footprinting Methodology Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing
3 - Scanning Networks
Overview of Network Scanning CEH Scanning Methodology
4 - Enumeration
Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP Enumeration SMTP Enumeration Enumeration Countermeasures SMB Enumeration Countermeasures Enumeration Pen Testing
5 - System Hacking
Information at Hand Before System Hacking Stage System Hacking: Goals CEH Hacking Methodology (CHM) CEH System Hacking Steps Hiding Files Covering Tracks Penetration Testing
6 - Malware Threats
Introduction to Malware Trojan Concepts Types of Trojans Virus and Worms Concepts Malware Reverse Engineering Malware Detection Countermeasures Anti-Malware Software Penetration Testing
7 - Sniffing
Sniffing Concepts MAC Attacks DHCP Attacks ARP Poisoning Spoofing Attack DNS Poisoning Sniffing Tools Sniffing Tool: Wireshark Follow TCP Stream in Wireshark Display Filters in Wireshark Additional Wireshark Filters Sniffing Tool Packet Sniffing Tool: Capsa Network Analyzer Network Packet Analyzer Counter measures Sniffing Detection Techniques Sniffing Pen Testing
8 - Social Engineering
Social Engineering Concepts Social Engineering Techniques Impersonation on Social Networking Sites Identity Theft Social Engineering Countermeasures Penetration Testing
9 - Denial-of-Service
DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DDoS Case Study DoS/DDoS Attack Tools Counter-measures DoS/DDoS Protection Tools DoS/DDoS Attack Penetration Testing
10 - Session Hijacking
Session Hijacking Concepts Application Level Session Hijacking Network-level Session Hijacking Session Hijacking Tools Counter-measures Session Hijacking Pen Testing
11 - Hacking Webservers
Webserver Concepts Webserver Attacks Attack Methodology Webserver Attack Tools Counter-measures Patch Management Webserver Security Tools Webserver Pen Testing
12 - Hacking Web Applications
Web App Concepts Web App Threats Web App Hacking Methodology Web Application Hacking Tools Countermeasures Security Tools Web App Pen Testing
13 - SQL Injection
SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter-measures
14 - Hacking Wireless Networks
Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Counter-measures Wireless Security Tools Wi-Fi Pen Testing
15 - Hacking Mobile Platforms
Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Hacking Windows Phone OS Hacking BlackBerry Mobile Device Management (MDM) Mobile Security Guidelines and Tools Mobile Pen Testing
16 - Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot System Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Counter-measures Penetration Testing
17 - Cloud Computing
Introduction to Cloud Computing Cloud Computing Threats Cloud Computing Attacks Cloud Security Cloud Security Tools Cloud Penetration Testing
18 - Cryptography
Market Survey 2014: The Year of Encryption Case Study: Heartbleed Case Study: Poodlebleed Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure(PKI) Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools Updated on 24 October, 2017
Course Location
About New Horizons Computer Learning Center
New Horizons is the world’s largest training provider with a global footprint of more than 300 locations in over 70 countries.They have more combined global training experience than any other training provider in the world as an industry leading training provider. The institute has been awarded more times
by major vendors than any other training organisation in the world.Their customers have a dedicated account manager who provides advice and guidance regarding training solutions and manages the relationship end-to-end.
Certified Ethical Hacker (CEH) Related Questions
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Ethical Hacking Beginner To Expert Academy for Health & FitnessAED 46Duration: Upto 5 Hours
- Certified Ethical Hacker (CEH) Preparation St. Paul's CollegeAED 46Duration: Upto 15 Hours