ExpiredEC-Council Certified Ethical Hacker (CEH) v9.0

Lorie Gregorchuk

  • January 9, 2017 - January 13, 2017
    8:00 am - 4:00 pm
  • February 20, 2017 - February 24, 2017
    8:00 am - 4:00 pm
  • April 17, 2017 - April 21, 2017
    8:00 am - 4:00 pm

Course Delivery: Online Live                                                                         Course Length: 5 days                    

Overview: In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Target Audience: The Certified Ethical Hacking v9.0 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Outline:

Introduction to Ethical Hacking

Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds

Information Security Overview

Information Security Threats and Attack Vectors

Hacking Concepts, Types, and Phases

Ethical Hacking Concepts and Scope

Information Security Controls

Information Security Laws and Standards

Footprinting and Reconnaissance

Footprinting Concepts

Footprinting Methodology

Footprinting Tools

Footprinting Countermeasures

Footprinting Penetration Testing

Scanning Networks

Overview of Network Scanning

CEH Scanning Methodology


Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP Enumeration

NTP Enumeration

SMTP Enumeration

Enumeration Countermeasures

SMB Enumeration Countermeasures

Enumeration Pen Testing

System Hacking

Information at Hand Before System Hacking Stage

System Hacking: Goals

CEH Hacking Methodology (CHM)

CEH System Hacking Steps

Hiding Files

Covering Tracks

Penetration Testing

Malware Threats

Introduction to Malware

Trojan Concepts

Types of Trojans

Virus and Worms Concepts

Malware Reverse Engineering

Malware Detection


Anti-Malware Software

Penetration Testing


Sniffing Concepts

MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack

DNS Poisoning

Sniffing Tools

Sniffing Tool: Wireshark

Follow TCP Stream in Wireshark

Display Filters in Wireshark

Additional Wireshark Filters

Sniffing Tool

Packet Sniffing Tool: Capsa Network Analyzer

Network Packet Analyzer

Counter measures

Sniffing Detection Techniques

Sniffing Pen Testing

Social Engineering

Social Engineering Concepts

Social Engineering Techniques

Impersonation on Social Networking Sites

Identity Theft

Social Engineering Countermeasures

Penetration Testing


DoS/DDoS Concepts

DoS/DDoS Attack Techniques


DDoS Case Study

DoS/DDoS Attack Tools


DoS/DDoS Protection Tools

DoS/DDoS Attack Penetration Testing

Session Hijacking

Session Hijacking Concepts

Application Level Session Hijacking

Network-level Session Hijacking

Session Hijacking Tools


Session Hijacking Pen Testing

Hacking Webservers

Webserver Concepts

Webserver Attacks

Attack Methodology

Webserver Attack Tools


Patch Management

Webserver Security Tools

Webserver Pen Testing

Hacking Web Applications

Web App Concepts

Web App Threats

Web App Hacking Methodology

Web Application Hacking Tools


Security Tools

Web App Pen Testing

SQL Injection

SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Evasion Techniques


Hacking Wireless Networks

Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking


Wireless Security Tools

Wi-Fi Pen Testing

Hacking Mobile Platforms

Mobile Platform Attack Vectors

Hacking Android OS

Hacking iOS

Hacking Windows Phone OS

Hacking BlackBerry

Mobile Device Management (MDM)

Mobile Security Guidelines and Tools

Mobile Pen Testing

Evading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Concepts

IDS, Firewall and Honeypot System

Evading IDS

Evading Firewalls

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Counter-measures

Penetration Testing

Cloud Computing

Introduction to Cloud Computing

Cloud Computing Threats

Cloud Computing Attacks

Cloud Security

Cloud Security Tools

Cloud Penetration Testing


Market Survey 2014: The Year of Encryption

Case Study: Heartbleed

Case Study: Poodlebleed

Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure(PKI)

Email Encryption

Disk Encryption

Cryptography Attacks

Cryptanalysis Tools

Lorie GregorchukExpiredEC-Council Certified Ethical Hacker (CEH) v9.0