Академический Документы
Профессиональный Документы
Культура Документы
SYLLABUS
Course Summary
Course Description
This five-day instructor led training experience can fortify the knowledge and skills of an IT
security professional to help them think as a hacker to detect weaknesses within network
infrastructures. Students are exposed to hands-on exercises, lectures, and other material
necessary to prepare them for the CEH certification exam.
Major Instructional Areas
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Session Hacking
Hacking Webservers
SQL Injection
Buffer Overflow
Cryptography
Penetration Testing
Use the following advice to receive maximum learning benefits from your participation in this course:
DO
DONT
CEH Exam
As a focus for your exam preparation, see the CEH exam blue print. This document
details the content that is covered by the exam questions and to what extent each
domain is covered. You can access the Exam blue print on the Phoenix TS student
portal, or at the link below.
https://cert.eccouncil.org/images/doc/CEH-Exam-Blueprint-v2.0.pdf
Course Outline
Module 1: Introduction
to Ethical Hacking
Module 2:
Footprinting and
Reconnaissance
Module 3: Scanning
Enumeration
Module 5: System
Crackingpasswords,escalatingprivileges,executing
applications,hidingfilesandcoveringtracks
Steganographyapplicationandclassification,tools,
methods/attacksonsteganography,steganography
detectiontools
Networks
Module 4:
Hacking
Lab Activities
Homework / Outside
Scanning networks
Enumeration
System hacking
Reading Assignment
concepts
Module 6: Malware
Introduction to malware
Threats
Module 7: Sniffing
Module 8: Social
Malware analysis
Antivirus tools
Penetration testing
Tools
Engineering
Module 9: Denial of
Service
countermeasures
Phases of an attack
Impersonation scenario
Botnet
Hijacking
Lab Activities
Homework / Outside
countermeasures
TCP/IP Hijacking
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Reading Assignments
concepts
Webservers
Web servers
Patch management
Web Applications
Injection
Information gathering
Wireless Networks
Lab Activities
Homework / Outside
Hacking webservers
SQL Injection
Reading Assignment
concepts
Mobile Platforms
Latest Sniffers
Mobile spyware
Mobile Anti-spyware
Honeypots
Detecting honeypots
Concepts,methodologies,examples,detection,and
countermeasures
Separationofresponsibilities
Virtualization
Threatsandattacks
CloudSecurityControlLayers
Tools
CloudPenetrationTesting
Module 18:
Cryptography
Exam Readiness
Assessment
Lab Activities
Homework / Outside
Buffer Overflow
Cryptography
Reading Assignment
concepts