Duration 5 days – 35 hrs
Overview.
The CEH Training Course is designed to equip IT professionals with ethical hacking techniques to identify and address vulnerabilities in systems before they can be exploited by malicious hackers. By understanding the tactics, techniques, and procedures (TTPs) used by cybercriminals, participants will learn to think like a hacker, performing penetration testing and vulnerability assessments to improve organizational security. This course aligns with the latest CEH curriculum and prepares participants for the CEH certification exam.
Objectives
- Master ethical hacking techniques, tools, and methodologies used by cybersecurity professionals.
- Develop the skills to perform network scanning, reconnaissance, and system hacking.
- Learn to identify vulnerabilities and understand how attackers exploit them.
- Gain practical knowledge of cryptography, penetration testing, and security controls.
- Prepare thoroughly for the CEH certification exam, focusing on hands-on application.
Audience
- IT Security Officers
- Network Security Engineers
- IT Auditors and Cybersecurity Consultants
- Systems Administrators and Network Administrators
- Cybersecurity Analysts
- Professionals preparing for the CEH certification exam
Pre- requisites
- Basic knowledge of networking and information security concepts.
- Familiarity with operating systems (Windows and Linux).
- No formal experience is required, but 2+ years of cybersecurity experience is recommended.
Course Content
Day 1: Introduction to Ethical Hacking and Footprinting
- Overview of Ethical Hacking: Introduction to ethical hacking principles, legal implications, and methodologies.
- Types of Ethical Hacking: Exploring different areas such as web application hacking, network hacking, and mobile hacking.
- Footprinting and Reconnaissance: Techniques to gather information about a target, including open-source intelligence (OSINT).
- Passive Information Gathering: DNS queries, WHOIS lookup, and social engineering.
- Active Information Gathering: Network mapping, scanning IP addresses, and analyzing web services.
Day 2: Scanning Networks
- Network Scanning Techniques: Understanding different types of scans, such as ping sweeps, port scanning, and network mapping.
- Vulnerability Scanning: Using tools like Nmap, Nessus, and OpenVAS to identify system vulnerabilities.
- Enumeration: Gaining insights into systems through user account discovery and SMB enumeration.
- Countermeasures: Defensive strategies to detect and mitigate scanning and enumeration activities.
Day 3: System Hacking
- System Hacking Techniques: Exploiting system vulnerabilities, privilege escalation, and maintaining access.
- Password Cracking Techniques: Dictionary attacks, brute force, and rainbow tables.
- Privilege Escalation: Methods to gain higher-level privileges on compromised systems.
- Covering Tracks: Techniques to hide malicious activities and evade detection.
- Malware and Trojans: Understanding and using trojans, backdoors, and rootkits.
Day 4: Penetration Testing and Cryptography
- Penetration Testing Process: Planning, reconnaissance, scanning, exploitation, and post-exploitation activities.
- Types of Penetration Testing: Black-box, white-box, and gray-box testing methodologies.
- Penetration Testing Tools: Introduction to tools like Metasploit, Burp Suite, and Wireshark.
- Cryptography: Basics of encryption and cryptographic techniques.
- Symmetric and Asymmetric Encryption: Understanding algorithms like AES, RSA, and ECC.
- Public Key Infrastructure (PKI): Digital signatures, certificates, and SSL/TLS protocols.
- Hashing Algorithms: MD5, SHA, and password storage methods.
Day 5: Practice Labs and Exam Preparation
- Hands-On Lab Exercises: Practicing ethical hacking techniques using lab scenarios and virtual environments.
- Review of Key Concepts: Summary of key topics covered in each module.
- Practice Exam Questions: Sample CEH exam questions to test knowledge and readiness.
- Exam Strategy and Tips: Guidance on tackling the CEH exam efficiently.
- Q&A Session: Open forum for participants to clarify doubts and review practical applications.