Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certification is the most comprehensive course for network security professionals. This globally acceptable certification authenticates the applied knowledge of the network administrators, auditors and professionals from a security perspective. Since this course contents are vendor-neutral, it covers a wide range of network-security concepts. This training will help you to think from the malicious hackers viewpoint but try to penetrate the network, ethically and list out the loopholes and vulnerabilities.

img
request

Can’t find a batch you were looking for?

 

The CEH Certification Course will teach the students about hacking from an entirely practical stand-point following the principle of ‘Learning by Doing’. In this course you will be performing all the steps right from scanning and identifying vulnerable targets and gaining access to those systems and suggesting the remedies. The practical approach gives the student an in-depth knowledge about the hacking tools and techniques. The simulated lab environment will demonstrate how actual hackers penetrate through the multi-level defenses of the organization. This course additionally teaches you about the virus creation, DDoS attacks, Intrusion Detection techniques and Social Engineering,  apart from the steps of hacking.

Course content

 

Background

 

Network and Communication Technologies
  • Networking technologies (e.g., hardware, infrastructure)
  • Web technologies (e.g., web 2.0, skype)
  • Systems technologies
  • Communication protocols
  • Telecommunication technologies
  • Mobile technologies (e.g., smartphones)
  • Wireless terminologies
  • Cloud computing
  • Cloud deployment models
 Information Security Threats and Attack Vectors
  • Malware (e.g., Trojan, virus, backdoor, worms)
  • Malware operations
  • Information security threats and attack vectors
  • Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web applicationattacks, SQL injection, wireless threats)
  • Botnet
  • Cloud computing threats and attacks
  • Mobile platform attack vectors
  • Cryptography attacks
Information Security Technologies
  • Information security elements
  • Information security management (e.g. IA, Defense-in-Depth, incident management)
  • Security trends
  • Hacking and ethical hacking
  • Vulnerability assessment and penetration testing
  • Cryptography
  • Encryption algorithms
  • Wireless encryption
  • Bring Your Own Device (BYOD)
  • Backups and archiving (e.g., local, network)
  • IDS, firewalls, and honeypots

 

Analysis / Assessment

 

Information Security Assessment and Analysis
  • Data analysis
  • Systems analysis
  • Risk assessments
  • Vulnerability assessment and penetration testing
  • Technical assessment methods
  • Network sniffing
  • Malware analysis
Information Security Assessment Process
  • Footprinting
  • Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery,proxy chaining, IP spoofing)
  • Enumeration
  • System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)

 

Security

 

Information Security Controls
  • Systems security controls
  • Application/file server
  • IDS
  • Firewalls
  • Cryptography
  • Disk Encryption
  • Network security
  • Physical security
  • Threat modeling
  • Biometrics
  • Wireless access technology (e.g., networking, RFID, Bluetooth)
  • Trusted networks
  • Privacy/confidentiality (with regard to engagement) 
Information Security Attack Detection
  • Security policy implications
  • Vulnerability detection
  • IP Spoofing detection
  • Verification procedures (e.g., false positive/negative validation)
  • Social engineering (human factors manipulation)
  • Vulnerability scanning
  • Malware detection
  • Sniffer detection
  • DoS and DDoS detection
  • Detect and block rogue AP
  • Evading IDS (e.g., evasion, fragmentation)
  • Evading Firewall (e.g., firewalking, tunneling)
  • Honeypot detection
  • Steganalysis
Information Security Attack Prevention
  • Defend against webserver attacks
  • Patch management
  • Encoding schemes for web application
  • Defend against web application attacks
  • Defend against SQL injection attacks
  • Defend against wireless and Bluetooth attacks
  • Mobile platforms security
  • Mobile Device Management (MDM)
  • BYOD Security
  • Cloud computing security

 

Tools / Systems / Programs

 

 

Information Security Systems
  • Network/host based intrusion
  • Boundary protection appliances
  • Access control mechanisms (e.g., smart cards)
  • Cryptography techniques (e.g., IPSec, SSL, PGP)
  • Domain name system (DNS)
  • Network topologies
  • Subnetting
  • Routers / modems / switches
  • Security models
  • Database structures
Information Security Programs
  • Operating environments (e.g., Linux, Windows, Mac)
  • Anti-malware systems and programs (e.g., anti-keylogger, anti-spyware, anti-rootkit, anti-trojan, anti-virus)
  • Wireless IPS deployment
  • Programming languages (e.g. C++, Java, C#, C)
  • Scripting languages (e.g., PHP, Javascript)
Information Security Tools
  • Network/wireless sniffers (e.g., Wireshark, Airsnort)
  • Port scanning tools (e.g., Nmap, Hping)
  • Vulnerability scanner (e.g., Nessus, Qualys, Retina)
  • Vulnerability management and protection systems (e.g., Founds tone, Ecora)
  • Log analysis tools
  • Exploitation tools
  • Footprinting tools (e.g., Maltego, FOCA, Recon-ng)
  • Network discovery tools (e.g., Network Topology Mapper)
  • Enumeration tools (e.g., SuperScan, Hyena, NetScanTools Pro)
  • Steganography detection tools
  • Malware detection tools
  • DoS/DDoS protection tools
  • Patch management tool (e.g., MBSA)
  • Webserver security tools
  • Web application security tools (e.g., Acunetix WVS)
  • Web application firewall (e.g., dotDefender)
  • SQL injection detection tools (e.g., IBM Security AppScan)
  • Wireless and Bluetooth security tools
  • Android, iOS, Windows Phone OS, and BlackBerry device security tools
  • MDM Solutions
  • Mobile Protection Tools
  • Intrusion Detection Tools (e.g., Snort)
  • Hardware and software firewalls (e.g., Comodo Firewall)
  • Honeypot tools (e.g., KFSenser)
  • IDS/Firewall evasion tools (e.g., Traffic IQ Professional)
  • Packet fragment generators
  • Honeypot Detection Tools
  • Cloud security tools (e.g., Core CloudInspect)
  • Cryptography tools (e.g., Advanced Encryption Package)
  • Cryptography toolkit (e.g., OpenSSL)
  • Disk encryption tools
  • Cryptanalysis tool (e.g., CrypTool)

 

Procedures / Methodology

 

 

Information Security Procedures
  • Cryptography
  • Public key infrastructure (PKI)
  • Digital signature and Pretty Good Privacy (PGP)
  • Security Architecture (SA)
  • Service oriented architecture
  • Information security incident
  • N-tier application design
  • TCP/IP networking (e.g., network routing)
  • Security testing methodology
Information Security Assessment Methodologies
  • Web server attack methodology
  • Web application hacking methodology
  • SQL injection methodology and evasion techniques
  • SQL injection evasion techniques
  • Wireless and Bluetooth hacking methodology
  • Mobile platform (Android, iOS, Windows Phone OS, and BlackBerry) hacking methodology
  • Mobile Rooting and Jailbreaking

 

Regulation / Policy

 

 

Information Security Policies/ Laws/Acts
  • Security policies
  • Compliance regulations (e.g., PCI-DSS, SOX)
Ethics of Information Security
  • Professional code of conduct
  • Appropriateness of hacking

 

To see the full course content Download now

Course Prerequisites

 
  • Participants should have good knowledge and understanding of OS, TCP/IP and Network
  • Networking Basics will be an additional advantage to understand the concepts easily

Who can attend

 
  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Number of Hours: 50hrs

Certification

 
CEH 312-50

Key features

  • One to One Training
  • Online Training
  • Fastrack & Normal Track
  • Resume Modification
  • Mock Interviews
  • Video Tutorials
  • Materials
  • Real Time Projects
  • Virtual Live Experience
  • Preparing for Certification

FAQs

DASVM Technologies offers 300+ IT training courses with 10+ years of Experienced Expert level Trainers.

  • One to One Training
  • Online Training
  • Fastrack & Normal Track
  • Resume Modification
  • Mock Interviews
  • Video Tutorials
  • Materials
  • Real Time Projects
  • Materials
  • Preparing for Certification

Call now: +91-99003 49889 and know the exciting offers available for you!

We working and coordinating with the companies exclusively to get placed. We have a placement cell focussing on training and placements in Bangalore. Our placement cell help more than 600+ students per year.

Learn from experts active in their field, not out-of-touch trainers. Leading practitioners who bring current best practices and case studies to sessions that fit into your work schedule. We have a pool of experts and trainers are composed with highly skilled and experienced in supporting you in specific tasks and provide professional support. 24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts. Our trainers has contributed in the growth of our clients as well as professionals.

All of our highly qualified trainers are industry experts with at least 10-12 years of relevant teaching experience. Each of them has gone through a rigorous selection process which includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating continue to train for us.

No worries. DASVM technologies assure that no one misses single lectures topics. We will reschedule the classes as per your convenience within the stipulated course duration with all such possibilities. If required you can even attend that topic with any other batches.

DASVM Technologies provides many suitable modes of training to the students like:

  • Classroom training
  • One to One training
  • Fast track training
  • Live Instructor LED Online training
  • Customized training

Yes, the access to the course material will be available for lifetime once you have enrolled into the course.

You will receive DASVM Technologies recognized course completion certification & we will help you to crack global certification with our training.

Yes, DASVM Technologies provides corporate trainings with Course Customization, Learning Analytics, Cloud Labs, Certifications, Real time Projects with 24x7 Support.

Yes, DASVM Technologies provides group discounts for its training programs. Depending on the group size, we offer discounts as per the terms and conditions.

We accept all major kinds of payment options. Cash, Card (Master, Visa, and Maestro, etc), Wallets, Net Banking, Cheques and etc.

DASVM Technologies has a no refund policy. Fees once paid will not be refunded. If the candidate is not able to attend a training batch, he/she is to reschedule for a future batch. Due Date for Balance should be cleared as per date given. If in case trainer got cancelled or unavailable to provide training DASVM will arrange training sessions with other backup trainer.

Your access to the Support Team is for lifetime and will be available 24/7. The team will help you in resolving queries, during and after the course.

Please Contact our course advisor +91-99003 49889. Or you can share your queries through info@dasvmtechnologies.com

like our courses