ATCEH11 - CEHv11: Certified Ethical Hacker (CEH) v11

The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the expertise and insight necessary to prepare for and react to malicious intrusion.

This class will immerse students in an interactive environment where they will be shown how to scan, test, hack, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then learn to scan and attack their own networks. No real network is harmed during these instructions. Students then learn how intruders escalate privileges and the necessary steps to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation in the process. When a student leaves this class, they will have hands-on understanding and experience in Ethical Hacking.

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »


Students taking this course should have a working knowledge of Linux and strong Microsoft Windows skills, a solid understanding of computer networking, and CompTIA Security+ and Network+ certification or equivalent knowledge.

Detailed Class Syllabus

Chapter 1: Intro to Ethical Hacking

Current trends and security threats
Scope and limitations of ethical hacking
Information security management, policies, and incident management
Vulnerability research, pen test process, and security acts/laws

Chapter 2: Footprinting and Reconnaissance

Footprinting terminology
Footprinting methodology
Footprinting tools
Footprinting countermeasures / pen test steps

Chapter 3: Scanning Networks

Check for live systems and ports / identifying services
Banner grabbing / OS fingerprinting
Scanning for vulnerabilities
Draw network diagrams
Prepare proxies
Pen test steps for scanning networks

Chapter 4: Enumeration

Extracting user names, machine names, and network resources from a system
Enumerate NetBIOS, SNMP, LDAP, NTP, SMTP, and DNS
Using various tools extract information
Pen test steps for enumeration

Chapter 5: System Hacking

Gaining access, maintaining access, and clearing logs
Hacking tools (keyloggers, spyware, and root kits)
Steganography techniques
System attack countermeasures
Pen test steps for system hacking

Chapter 6: Malware Threats

Malware propagation techniques
Trojans, viruses, and worms
Malware analysis
Detect virus’, worms, and trojans
Pen test steps for malware threats

Chapter 7: Sniffing

Basic concepts of sniffing on the network
MAC flooding, DHCP attacks, ARP spoofing, and ARP/DNS poisoning
Sniffing tools
Pen test steps for sniffing

Chapter 8: Social Engineering

Social engineering attack phases
Types of social engineering
Impersonation based social engineering
Social engineering countermeasures
Pen test steps in social engineering

Chapter 9: Denial of Service

Classify DoS and DDoS attacks and techniques
Botnets and how they infect a system
Tools used to perform DoS/DDoS
Pen test steps for DoS/DDoS

Chapter 10: Session Hijacking

Techniques and tools
Pen test steps for session hijacking

Chapter 11: Hacking Webservers

Reasons for webserver compromise
Open source and IIS architecture
Attack tools and techniques
Pen test steps for hacking webservers

Chapter 12: Hacking Web Applications

Intro to web applications
Web application architecture
Threats and attacks
Web application hacking and security tools
Pen test steps for web applications

Chapter 13: SQL Injection

Threats from SQL injection attacks
Types of attacks
Methodology, injection tools, and detection tools
Pen test steps for SQL injection

Chapter 14: Hacking Wireless Networks

Types of wireless networks and standards
Terminology and encryption
Threats and hacking wireless network methodology
Pen test steps in hacking wireless networks

Chapter 15: Hacking Mobile Platforms

Mobile attack vectors
Android OS architecture
Jailbreaking IOS
Windows phone 8 architecture
Pen test steps in hacking wireless networks

Chapter 16: Evading IDS, Firewalls, and Honeypots

IDS, firewall, and honeypot solutions
IDS, firewall, and honeypot placement
Evasion techniques
Tools and countermeasures
Pen test steps in evading IDS, Firewalls, and Honeypots

Chapter 17: Cloud Computing

Basics of cloud computing and services
Security considerations
Threats, tools, and attacks
Pen test steps in cloud computing

Chapter 18: Cryptography

Intro to cryptography concepts
Public Key Infrastructure (PKI)
Cyphers, AES, DES
Pen test steps for cryptography