CEH
CEH
CEH
Course Outline
Certified Ethical Hacker (CEH v5)
Introduction to Ethical Hacking, Ethics, and Legality
- What Is Hacktivism?
- Listing Different Types of Hacker Classes
- Ethical Hackers and Crackers—Who Are They?
- What Do Ethical Hackers Do?
- Goals Attackers Try to Achieve Security, Functionality,
and Ease of Use Triangle
- Defining the Skills Required to Become an Ethical
Hacker
- What Is Vulnerability Research?
- Describing the Ways to Conduct Ethical Hacking
- Creating a Security Evaluation Plan
- Types of Ethical Hacks
- Testing Types
- Ethical Hacking Report
- Understanding the Legal Implications of Hacking
- Understanding 18 U.S.C. § 1029 and 1030 U.S. Federal
Law
- Social Engineering
- What Is Social Engineering?
- What Are the Common Types Of Attacks?
- Understand Insider Attacks
- Understand Identity Theft
- Describe Phishing Attacks
- Understand Online Scams
- Understand URL Obfuscation
- Social-Engineering Countermeasures
Sniffers
- Understand the Protocols Susceptible to Sniffing
- Understand Active and Passive Sniffing
- Understand ARP Poisoning
APTECH COMPUTER EDUCATION – KHARTOUM - SUDAN
Wireless Hacking
- Overview of WEP, WPA Authentication Mechanisms, and
Cracking Techniques
- Overview of Wireless Sniffers and Locating SSIDs, MAC
Spoofing
- Understand Rogue Access Points
- Understand Wireless Hacking Techniques
- Describe the Methods Used to Secure Wireless
Networks
-
Physical Security
- Physical Security Breach Incidents
- Understanding Physical Security
- What Is the Need for Physical Security?
- Who Is Accountable for Physical Security?
- Factors Affecting Physical Security
-
Linux Hacking
- Linux Basics
- Understand How to Compile a Linux Kernel
- Understand GCC Compilation Commands
- Understand How to Install Linux Kernel Modules
- Understand Linux Hardening Methods
Cryptography
- Overview of Cryptography and Encryption Techniques
- Describe How Public and Private Keys Are Generated
- Overview of the MD5, SHA, RC4, RC5, and Blowfish
Algorithms
APTECH COMPUTER EDUCATION – KHARTOUM - SUDAN
NOTE:
- CEH is not the study of hacking or hacking tools, but it
provides the candidate deeper knowledge that how the
hackers do exploit the networks, so that a security
professional can better understand the hackers mind to
prevent hacking and securing the networks. A variety of
hacking tools are demonstrated in the lab for proof of
concepts only.
- There are tons of hacking tools available in market for
achieving different hacking and anti-hacking goals; only few
of tools will be practice during the CEH training.
Pre-Requisites.
The CEH candidates should possess good knowledge of computer
networks, preferably as following
- In-depth knowledge of TCP/IP
- MCSA/MCSE level knowledge is preferable
Basics of Linux OS is a plus advantage
Duration: 40 hrs