Certified ethical hacker (CEH)
5 days training event
6100-3075
Introduction
Introduction
Ethics and Ethical Hacking
Foundations
Network Topologies
Communications Models
OSI vs TCP/IP
Internet Protocol
IP Subnetting
IP Subnetting Further Explained
Subnetting Assignment
IPv6
IPv6 Rationale
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Network Design
Ethernet
Wireless Networks
Bluetooth
Cloud Computing Services
Cloud Computing Networking
Cryptography
Introduction
What is Cryptography?
Symmetric Cryptography
Diffie-Hellman and Key Derivation
Asymmetric Cryptography
Encryption Assignment
Hybrid CryptoSystems
Generating Certificates
Cryptographic Hashes
PGP vs Certificate Authority
Ethical Hacking Testing Methodology
Introduction
Basic Methodology
Open Source Recon with DNS and whois
Open Source Recon with Web Sites
Recon Assignment
Open Source Recon with Maltego
Port Scanning with Nmap
Enumeration with Nmap
Using the Nmap Scripting Engine
Scanning Assignment
Password Cracking with John the Ripper
Password Cracking with Rainbow Tables
Vulnerability Scanning with OpenVAS
Vulnerability Scanning with Nessus
Searching for Exploits
Google Hacking
Using Metasploit
Using Meterpreter
Social Engineering
Automating Social Engineering Attacks
Web Application Testing
Introduction
Web Application Architecture
SQL Injection
XML Entity Injection
Cross-Site Scripting
Automated Testing with Burp Suite
Automated Testing with ZED Attack Proxy
Vulnerability Remediation
Malware Operations
Introduction
Malware Types
Infection Vectors
Botnets
Command and Control
Anti-Virus
Static Analysis With Debuggers
Static Analysis With Metadata
Dynamic Analysis With Virtual Machines
Dynamic Analysis With Sandboxes
Software Security
Introduction
Types of Languages
Memory Layout of Process
Buffer Overflows
Heap Spraying
Protecting Against Software Attacks
Secure Programming Practices
Methodologies
Threat Modeling
Software Isolation
Wireless Networking
Introduction
Primer to 802.11
Handshakes
WEP Encryption
WPA Encryption
Deauthentication Attacks
Network Design
Introduction
Gathering Requirements
Defence in Depth
Defence in Breadth
Logging
Security Information and Event Management
Defensible Network Architecture
Security Controls
Governance
Introduction
Risk
Threats and Vulnerabilities
Policy Development
Standards and Procedures
Security Operations
Conclusion
Conclusion
TRAINING LOCATIONS
أماكن ومقرات التدريب حول العالم
Dubai
Kuala Lumpur
Tunis
Istanbul
Amman
Sharm El Sheikh
Ottawa
Paris