In recent months, several large companies such as Yahoo and LinkedIn have suffered major security breaches or cyberattacks. As a result, there’s always a need for IT security experts. One of the best ways to prevent security threats is to understand how hackers work. Hackers are innovators and constantly find new ways to attack information systems and exploit system vulnerabilities. Enter ethical hacking - a legal, contracted way to hack systems to help organizations tighten up their security! Sounds cool, doesn’t it?

The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

To master the hacking technologies, you will need to become one, but an ethical one! During this training you will learn the tools and techniques used by hackers and information security professionals alike to break into an organization. This course will immerse you into the hacker mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Because if you want to beat a hacker, your need to think like a hacker!

Pluspunten

  • This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers.
  • The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!

Uw resultaten

The tools and techniques are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why this training is called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization.

Bestemd voor

This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of their network security.

Programma

1. Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds?
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards

2. Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures

3. Scanning networks

  • Overview of Network Scanning
  • CEH Scanning Methodology

4. Enumeration

  • Overview of Network Scanning
  • CEH Scanning Methodology
  • Enumeration Concepts NetBIOS
  • Enumeration SNMP
  • Enumeration LDAP
  • Enumeration NTP
  • Enumeration SMTP
  • Enumeration Countermeasures
  • SMB Enumeration
  • Enumeration Countermeasures
  • Enumeration Pen Testing

5. System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps

6. Malware Threats

  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Malware Detection
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

7. Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

8. Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering
  • Countermeasures
  • Penetration Testing

9. Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

10. Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Session Hijacking Pen Testing

11. Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

12. Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Countermeasures
  • Security Tools
  • Web App Pen Testing

13. SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures

14. Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

15. Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

16. Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

17. Cloud Computing

  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

18. Cryptography

  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

Docent(en)

cr-01846671

Steven Ramboer

Steven Ramboer has more then 15 years experience in IT audit, PEN-testing, security management and architecture. The past 6 years Steven has worked as Group IT Security Manager with Bekaert. A few months ago he started as Lead CyberSecurity Architect with Assa Abloy Group. Meanwhile he has almost 3 years experience as a trainer: ethical hacking essentials and EC-Council certified ethical hacker (CEH). A few years ago he started his own business Cyberlabs where he does cybersecurity consultancy & training.

Praktische informatie

Prijs: 2 800 EUR (excl btw)

De opleidingen van Kluwer Opleidingen komen in aanmerking voor verschillende subsidies. Handig: zo betaalt u zelf maar een deel van het inschrijvingsgeld.

  • Tot 40% subsidie met KMO portefeuille. Meer info vindt u hier.

Extra:

Please bring your own laptop to this training.

Incompany: Hebben meerdere collega’s behoefte aan deze opleiding? En trekt u liever niet naar een andere plaats? Breng de opleiding naar uw afdeling of onderneming: handig! Bovendien spitst de trainer zich dan toe op uw situatie, op uw sector en op de vragen van uw medewerker. Vraag uw incompany opleiding aan.

Partner(s)

Inschrijven