CEH

Overview

Introduction to Ethical Hacking will cover:
  • Foot printing and Reconnaissance
  • Scanning Networks
  • Enumeration 
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers and Session Hijacking
  • Social Engineering 
  • Denial of Service
  • Webservers and Applications
  • Hacking Wireless Networks
  • IDS, Firewalls, and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing 

Course Description

The course is structured knowledge base needed to probe, discover vulnerabilities and recommend solutions for tightening network security and protecting data from potential attackers. Focus is on penetration-testing tools and techniques to protect computer networks.

Certification

C-Council Certified Ethical Hacker

Learning Outcome

Students will be able to:

  • Apply laws and regulations relevant to computer systems in order to practice ethical hacking
  • Analyze and examine different methods for penetrating and/or attacking networks
  • Assess system vulnerability and exposure to develop an overall organizational security posture
  • Conduct penetration testing to measure overall security posture