Our E-learning curriculum is specifically designed with the busy professional in mind. All of our programs are produced using advanced learning concepts that encompass learning techniques that are designed for adult learning. E- learning is very popular today for a very good reason – It Works! People everywhere are discovering that they can fulfill their learning objectives conveniently.
Our easy-to-use delivery format allows you to concentrate on the lesson at hand and not how to run the delivery software – saving you time and frustration. Our comprehensive course materials are delivered in an easy-to- understand format – allowing you to get the most out of your time online.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
CEH by EC-Council: Certified Ethical Hacker and Penetration Testing
To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in.
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.
This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others.
- Instructor led training by the industry’s finest experts delivered via streaming video online or DVD
- Software demonstrations where the instructor shows you how to perform a task onscreen.
- Interactive multimedia presentations
- Easy to navigate controls
- Course bookmarking which allows you to resume training where you left off the last session.
- Hands-on activities and labs
- Free technology upgrades for one year
- Official curriculum from the EC-Council
- Exam eligibility
- Educational support
Certified Ethical Hacker Course Curriculum
Introduction to Ethical Hacking
Classes of Hackers
Footprinting – Reconnaissance Phase
Competitive Intelligence Gathering
Tools and Steps Used for Footprinting
Tracking Down Web Servers, Login Portals, and Network Hardware
Live Systems, Open Ports, War Dialing, Banner Grabbing and Vulnerability Scanning
Trojans and Backdoors
How Trojans work?
Viruses and Worms
The History of Viruses and Worms
What is ARP?
Sniffer Hacking and Raw Sniffing Tools
What is Social Engineering?
The Common Targets of Social Engineering
What is Phishing
Types of Attacks
Hacking E-mail Accounts
Gaining E-mail Account Information
Denial of Service
What is Denial of Service?
DoS Attack Tools
Everything about Session Hijacking
Hacking Web Servers
How to protect Web Servers
Web Application Vulnerabilities
A Web Application Setup
Web-Based Password Cracking Techniques
What is Authentication?
What is Password Cracker
What is SQL Injection?
SQL Injection Tools
Hacking Wireless Networks
Attacks and Hacking Tools
What you need to know about Security
Everything about Linux
Evading IDS, Firewalls and Honeypots
What is IDS?
What is Firewall?
What is Honeypot?
What are Buffer Overflows?
Encryption and Decryption
Code Breaking Methodologies
To order contact Specialized Solutions at:
Corporate Training Division
3727 Jonlen Drive
Cincinnati, OH 45227
Toll Free – 1-877-291-9797
Direct – 513-878-1116