CEH (Certified Ethical Hacker) v10 Certification
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification significantly benefits security officers, auditors, security professionals, site administrators, and those concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who knows how to look for the weaknesses and vulnerabilities in a system.
To achieve the CEH certification, you must pass EC-Council exam 312-50 and must also show knowledge of the tools used by hackers in exposing common vulnerabilities and those used by security professionals for implementing countermeasures.
Intensive instruction and review with an experienced master of ethical hacking
The Professional Hacking: CEH Boot Camp is targeted at professionals with at least 1 year of experience in Information Systems and networking technologies. The student should have a strong knowledge of TCP/IP, and a general understanding of information security. While both Windows and Linux are used within the class, students should have a willingness to learn tools and procedures from a Linux perspective.
Course Outline and Objectives:
Module 1: Hacking Laws
This module describes about Cyber Laws present in various countries.
This module discusses about SPY ACT, U.S. Federal Laws, United Kingdom’s Cyber Laws, European Laws, Japan’s Cyber Laws, Australia Cybercrime Act 2001, and Indian Law: The Information Technology Act, Germany’s Cyber Laws, Singapore’s Cyber Laws, Belgium Law, Brazilian Law, Canadian Laws, France Laws and Italian Law.
Module 2: Google Hacking
Google Hacking module familiarizes you about how hacking in done using Google. It explains you about the Google hacking basics and the advanced operators used to attack on the Google website.
Module 3: Phishing
This module describes different phishing methods, various reasons for the phishing attacks to be successful and the process used by the phishers to attack the victim.
Module 4: Hacking Email Accounts
This module gives the idea about how to hack the Email Accounts and how to protect it from hacking. Through this module, professional will get the idea about the different Email hacking tools
Module 5: Mac OS X Hacking
This module explains about hacking Macintosh operating system. It covers various vulnerabilities, viruses, and worms in MAC OS X along with security measures.
Module 6: Hacking Routers, Cable Modems and Firewalls
This module introduces the computer networking devices such as Router, Modems, and Cables and how can attacker hack it. It explains how to identify the devices is router or not also gives the details about the tool for it. This module explains the different vulnerabilities in the router, and how to exploit these vulnerabilities.
Module 7: Hacking Mobile Phones, PDA and Handheld Devices
This Module discuss about the hacking various types of Mobile devices such as BlackBerry, PDA, iPod and iPhone. This module explains about the threats to mobile devices, vulnerabilities in mobile devices and attacks against mobile devices.
Module 8: Bluetooth Hacking
The module Bluetooth Hacking explains about the different ways that a Bluetooth can be hacked and the security measures of it.
Module 9: VoIP Hacking
VoIP Hacking Module explains about the different hacking methods used to hack a VoIP network. It briefs about the hacking steps of Footprinting, Scanning, Enumeration, and Exploiting the Network. It explains about the steps to exploit the network. It features about different attacks like and the Denial of service attack, Replay Attack, ARP Spoofing Attack, H.323-Specific Attacks, SIP Attacks and more.
Module 10: RFID Hacking
This module describes RFID technology. Different components of RFID and their collisions are discussed. Risks such as Business Process Risk, Business Intelligence Risk, Privacy Risk and Externality Risk, privacy issues of RFID are mentioned in this module. This module will look in to details of RFID security and privacy threats and how to protect against RFID attacks. Writing a simple but powerful RFID virus and worm are showcased in this module. The module also discusses the vulnerabilities in RFID-enabled credit cards and RFID security controls.
Module 11: Spamming
The word Spam is a familiar and troubling aspect to every Internet users. This module explains you about the spamming methods used by the spammers and the different anti-spam techniques used to stop the spam. The Spamming part explains you about the techniques used by the spammers to spam on the victims, how the spamming is done and the different ways of spamming. A statistical view tells about the top spammers, the top worst spam service ISPs and the top spamming countries. It features about the types of spam attacks and various tools through which spamming is performed.
Anti-spamming is used to eliminate the spam attacks. There are various anti-spam techniques and tools that can be used to stop spamming and restrict the spam from entering your mail in future.
Module 12: Hacking USB Devices
This module discusses about USB devices and how they affect privacy. Viruses and worms which spread through USB devices are discussed in this module.
Module 13: Hacking Database Servers
This module depicts how Databases are vulnerable to attacks. It also deals with the security issues and type of Database attacks. It gives an idea how attackers after getting the DBA privileges, attack the database.
Attacker can steals the personal information of the users, and can use it for wrong purposes. It also describes Hacking Tricks that an attacker uses to Exploit SQL Server Systems.
Module 14: Cyber Warfare- Hacking, Al-Qaida and Terrorism
This module defines Cyber terrorism, Cyber crime and criminal impacts. It also describes the common forms of these terrorist attacks on the Internet such as distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. This module shows the different types of Cyber warfare attacks. It also describes Terrorist Operations such as Planning, Recruitment, Research, and their Propaganda.
It also deals with Threats that a Military can encounter with Cyber attacks.
This module gives an idea how Terrorists use Electronic Jihad and the latest developed Mujahedeen Secrets Encryption Program to spread terrorism and do cyber wars.
Module 15: Internet Content Filtering Techniques
Today Internet filters are very necessary to prevent children from using the Internet for more time and also to avoid them from accessing the unwanted content. IMs, downloading, forums and chatting can be blocked by using Internet filters in work places. Many tools to filter Internet content are discussed in this module. Internet safety guidelines for children are also mentioned in this module.
Module 16: Privacy on the Internet
This module familiarizes with privacy threats on the Internet and Internet privacy tools. This module demonstrates various anonymizer tools which protect privacy while surfing. This module also discusses step by step procedure of protecting search privacy and online privacy.
Module 17: Securing Laptop Computers
Securing Laptop computers module features various techniques that can be used to protect your Laptop from different thefts (Example: Fingerprint reader, Face Recognition). It shows the different hardware laptop security devices and the software security tools that help you while carrying the laptop. It lists about the security tips that will be advantageous to restrict laptop thefts.
Module 18: Spying Technologies
The module Spying gives you a wide knowledge about the different ways of spying on an individual or object. It notifies you about the main motives to spy on any particular individual. This module presents you with all the devices that are used to spy (ie, video spy, camera spy, audio spy, GPS devices, watch spy, pen spy etc.). It explains about the different spying and anti-spying tools that is used to spy on an individual and restrict others to spy on you.
Module 19: Corporate Espionage- Hacking Using Insiders
This module explains the Corporate Espionage, which can be done using insiders. This module discusses the categories of insider attackers depending on their way of attacks. It also tells that how the attacker can get the personal information of the user, and which techniques they are using. After completion of this module, professional, knows the different tools used for corporate espionage and what are the countermeasures for protection. This module also introduces some real life scenarios about corporate espionage.
Module 20: Creating Security Policies
This module explains about creating security policies which helps to protect infrastructures, network, computer and firewall in your organization.
This module also discusses the key elements of security policy, goals of security policy roles of security policy, concepts of security policy, classifications of security policy and different types of security policies. This module also includes real world sample security policies which are developed by the various organizations.
Module 21: Software Piracy and Warez
This module explains about Software Activation Process, Piracy, Impacts of Piracy, Piracy Blocking and Piracy over the Internet and techniques which are used to spread piracy on the Internet. It also introduces the Warez and its types which are made available on the Internet by the crackers and the techniques to distribute the Warez. It also includes security tools which are used to protect software.
Module 22: Hacking and Cheating Online Games
This module describes hacking and cheating online games. It shows how people may lose their virtual property when they are playing with thieves. It also involves discovering virtual worlds and completing tasks.
This module highlights Basics of Threats in Online Gaming, Cheating in Online Computer Games, Types of Exploits, example of popular game exploits, and Stealing Online Game Passwords.
Module 23: Hacking RSS and Atom
This module explains you about the RSS and Atom feeds that are used to offer users with updated web content and news. It explains about the risks involved like Remote Zone Risks, Local Zone Risk, and Reader Specific Risks. It gives about the security measures that should be taken to keep the RSS and Atom feeds secured.
Module 24: Hacking Web Browsers (Firefox, IE)
This module familiarizes with hacking different web browsers and how to make them secured. How web browsers work and access HTML documents are discussed in this module.
Module 25: Proxy Server Technologies
This module discusses about proxy servers, role of proxy server, and different types of proxy servers. How proxies are used for attacking is mentioned in this module. Many tools such as WinGate, UserGate Proxy Server, Advanced FTP Proxy Server, Trilent FTP Proxy, SafeSquid, AllegroSurf, Proxymanager Tool, Multiproxy, NetProxy, Proxy+, Proxomitron and many more are presented to meet the control, security and communications needs of today’s Internet-connected businesses.
Module 26: Preventing Data Loss
This module explains you about the countermeasures that are to be taken when the data is lost unexpectedly. This module tells about how the data can be lost and the ways that are to be followed to prevent the data loss. It gives a huge list of tools that can be used to prevent the data loss. Some of the tools are Pointsec Data Security, Cisco (IronPort), DBProtector, DeviceWall, Exeros Discovery etc.
Module 27: Hacking Global Positioning System(GPS)
This module explains about hacking the Global Positioning System (GPS) that provides reliable positioning, navigation, and timing services. This module introduces Secret Startup Commands, Firmware Hacking, Waypoints, GPS Tools, and Security Tools.
Module 28: Computer Forensics and Incident Handling
This module helps in describing how to recover, analyze and present computer-based material in such a way that it can be presented as evidence in a court of law. This module also deals with Incident Handling. It defines about Incident and its different categories. It also shows How CSIRT provides rapid response to maintain the security and integrity of the systems.
Module 29: Credit Card Frauds
This module introduces E-Crimes and describes how Credit Card Frauds occur. This module highlights all the security measures that every individual should consider if he/she has a Credit Card.
Module 30: How to Steal Passwords
Module 31: Firewall Technologies
Module 32: Threats and Countermeasures
Module 33: Case Studies