Академический Документы
Профессиональный Документы
Культура Документы
aaca
Certified Ethical
12000+
students Hacker (CEH) &
Lifetime
Certification
Security+ Training
Access
Program
HD Training
Kick start your Cyber Security Career
45 hours+
Video
Community
support
CEH SERIES
Footprinting Reconnaissance
Duration: 75 Minutes Duration: 75 Minutes
Quizzes: 3 Quizzes: 3
Banner grabbing is a technique used to grab Every system has its own services running on the
information about computer systems on a network network; in many cases those services can reveal
and the services running its open ports. In the sensitive information about network topology,
module, Banner Grabbing, you will be learning the users and groups, etc. Services like LDAP or NTP
tools and techniques used in the process of banner can be enumerated to reveal such information. In
grabbing. You will learn how to take inventory of this module you will be introduced to enumeration
the systems and services on your networks. You and the many different uses it has in computer
will be able to identify potential risks of banner systems. This course will include demos on the
grabbing and learn steps to take to protect your different tools and uses of enumeration.
networks and systems from the potential threat of
an intruder using banner grabbing. We will pair Enumerating Services and
this course with demos on the tools you will be Countermeasures
discussing. Enumeration
Banner Grabbing
Countermeasures
Linux was developed as a free operating system Servers are primary targets for attackers.
for Intel x86 based personal computers. It is a Pentesting is an attack on a system in hopes of
leading operating system on servers. Linux runs on finding security weaknesses. In the course
embedded systems. The most widely used Configuring Linux for Pentesting, you will be
operating system for mobile technology (tablets learning the steps to configure Linux for pentesting
and smartphones) is built on top of the Linux and tools used for pentesting on a Linux system.
kernel. In this module you will be learning the This course will be combined with demos that will
fundamentals of Linux. We will be pairing this delve deeper and give you real world examples of
course with demos with a more in-depth look into the tools and programs that Linux uses to
some of the fundamentals and tools of Linux. accomplish pentesting.
Ensure that you know everything involved in You will take a good look at spyware, the activities
securing a Windows system against attack. During it performs, different types of spyware, and the
this course you’ll get into Windows passwords — countermeasures needed in order to prevent
how they’re created, how they’re stored, and hackers from utilizing these types of techniques
different methods used to crack them. You’ll against your company. You will also spend time
discover different methods used for guessing studying different types of keyloggers. There are
passwords and breaking the different security three different types of keyloggers that we see
methods used within the Windows operating used in today’s environments: hardware, software,
system. You’ll find discussions on responding to and kernel/driver keyloggers. A good pen tester or
privilege escalation. You’ll also spend some time ethical hacker cannot perform his or her job
going through a couple of scenarios demonstrating properly without understanding the
how to use key defense tools. Overall, the topics countermeasures for all of the hacking techniques
explored here will teach you how to increase used against today’s computer systems. Overall,
security on your Windows machines, as well as these topics will help prepare you for certification
show the required procedures and tools to exams from vendors, such as Linux, CompTIA, and
prepare for different certification exams from EC- EC-Council.
Council, CompTIA, Linux, and CISSP.
Spyware Uncovered
Windows Hacking Keyloggers
Password Attacks
Alternate Data Streams
Steganography
Rootkits
Course Summary
study their nature, how they function, and their of-service attacks take place. You will also see
impact. You will also spend time going through what botnets are and how they are used to attack
discussions on varieties of each, along with some your system or network. You will find explanations
real life examples. Refine your understanding of on the tools that are used to attack, and how you
viruses and worms to better your system. The can detect such attacks. You will be introduced to
knowledge you gain here will prepare you to be a different countermeasures, so that you can plan,
more effective network administrator. prepare, and establish the relevant
Furthermore, the topics covered here will help countermeasures to protect your organization.
with preparing you for security certification exams You will also learn how DoS and DDoS can be used
offered by EC-Council, CompTIA, and Linux. in penetration testing. You will go through
discussions on how to protect your organization
Viruses from the distributed denial-of-service attacks and
Worms denial-of service penetration testing. Altogether,
these topics focus on deepening your
Vulnerability Assessment understanding of security concepts and practices,
Duration: 75 Minutes so that you’re a more efficient network
Quizzes: 3 administrator. With the skills you gain here, you’re
equipped to pursue a number of security
Our course Vulnerability Assessment you will certifications from CompTIA, EC-Council, and CEH.
introduce to the concepts of: Vulnerability
Assessment, Vulnerability Assessment Tools, and Denial-of-Service & Distributed Denial-of-
Patch Management. It will offer demos on several Service
of the vulnerability assessment tools that are Digital Attack Map
available, as well as in-depth discussions on the Botnets
benefits of these tools. We will discuss the process DoS/DDoS Attack Tools and Detection
of analyzing the scan results that the vulnerability DoS/DDoS Countermeasures
assessment tools provide. Finally, we will discuss DoS/DDoS in Penetration Testing
patch management and some tools that are
available for this process and at the end of this Covering Tracks
course you will be able to create a comprehensive Duration: 75 Minutes
VA program, identify key vulnerabilities, and Quizzes: 3
perform mitigation actions before those
vulnerabilities can be exploited. This course will be going over various ways that
attackers have at their disposal to cover any tracks
Testing Vulnerabilities that may lead to their unwanted eviction or worse
Results, Reports, and Remediation yet to an audit trail that would lead directly back
to them. In this module we will be discussing
Disaster Recovery and Risk Management disabling auditing during or after an event, steps to
Duration: 30 Minutes take once it is disabled, and destroying any
Quizzes: 3 evidence. We will be going over various ways to
avoid detection on Linux machines, and this will
Since you are a part of IT operations in your include several in-depth demos on various
enterprise, you could be involved in planning and operations for the Linux machines.
applying policies related to risk management
and/or disaster recovery. In our course disaster Avoiding Detection on Windows Machines
recovery and risk management, you will receive an Avoiding Detection on Linux Machines
introduction to the basics of risk management and Destroying the Evidence
disaster recovery. When you have completed the Log Protection Techniques
course, you will be able to identify a risk and the
effect that it has on daily operations. You will gain Trojans and Backdoors
an understanding of security measures and how Duration: 90 Minutes
they are implemented, as well as, the importance Quizzes: 4
and the process of managing risk in your
environment. We will partner this with a detailed As an ethical hacker, there are times when you
demo on the process of risk assessment. You will need to hide software from the company that you
gain an understanding of disaster recovery, be able are performing the test against in order to verify
to define what a disaster is, rank a disaster, and that the defensive strategy is able to find your
create a plan that will define how to recover from software. Trojans and Backdoors is the course
a disaster, as well as, successfully recovering your where our software is going to be going
data. undercover. In this module we are going to define
malware and take a look at how a payload is
Disaster Recovery delivered. We will overview the various Trojan
Risk Management tools, and tools used to generate Trojan programs,
as well as, learning about Netcat. We will spend
Introduction to Ethical Hacking time going over countermeasures and various anti-
Duration: 90 Minutes Trojan software and hardware, and preventive
Quizzes: 3 methods that can be used to prevent attacks. We
will also be incorporating several demos on the
Ethical hacking is testing the resources for a good many tools that we will be discussing in this
cause and for the betterment of technology. In our module.
course Introduction to Ethical Hacking, you will be
introduced to various concepts on ethical hacking. Defining Malware
We will be talking about vulnerabilities, exploits, Malware
defense strategy, penetration testing, pentest Tools of the Trade
types and methodology, vulnerability Countermeasures
management, incident management, and security Course Summary
policy development, and at the end of this course
we hope you will have a basic understanding of Penetration Testing
the various concepts involved in ethical hacking. Duration: 60 Minutes
Quizzes: 3
Introduction to Hacking
Security Management Pentesting is an intentional attack on a system to
discover security weaknesses. These can be left
Port Scanning either by the security officer or the security
Duration: 60 Minutes controls. Penetration Testing is our course that
Quizzes: 3 covers security, vulnerabilities, different types of
tests, and when to test as a pen tester. We have
When a port is scanned on a server, the port paired this with an in-depth demo on vulnerability
returns a response indicating that the port is open assessment using the tool Nexpose. At the end of
and a service is listening. In our course Port this course we will have reviewed security and
Scanning, you will learn how ports can be scanned, vulnerability assessment, and the differences
how a hacker can break into your network through between automatic and manual testing.
the ports, and the countermeasures you can take
to protect your device or network. Our course will Penetration Testing Introduction
mobile hacking with demos giving you a look at What kind of security measures do you take to
some of these tools in action. protect your facilities, equipment, resources,
personnel, and property from damage caused by
Securing Mobile Basics unauthorized access? In this module, Physical
Mobile Security Considerations Security, these are questions that we will be
Hardening Mobile Devices answering. You will be learning how to recognize
the potential risks of unauthorized access to your
Evading Firewalls and Honeypots business and personnel, and how to counteract
Duration: 75 Minutes these risks by learning the steps to creating a
Quizzes: 3 security policy for you and your personnel to
implement. We have included demos that will help
Evading Firewalls and Honeypots, is the course you better understand the concepts that will be
where we will not only discuss what firewalls and discussed in this module.
honeypots are, but how attackers get around
these preventive programs. You will learn about Physical Security
the different types of firewalls and how they may Internal Support Systems
be evaded. You will also learn what honeypots are Perimeter Security
and how they are set-up to divert any would be Audits, Testing & Drills
attacker’s attention. You will be learning how
attackers anticipate honeypots and how Evading IDS
penetration testing can help you in dealing with Duration: 75 Minutes
these attackers. We have paired this course with Quizzes: 4
several demos that will cover more in-depth the
topics that we will be discussing and help you gain Intrusion Detection System (IDS) is a device or
a broader understanding of those topics. software that monitors network activities and
system activities. While monitoring, it looks for
Working with Firewalls suspicious activities and security policy violations.
Working with Honeypots In this module Evading IDS we will be discussing
the vulnerabilities in an IS, types of IDS, types of
Wireless Types and Vulnerabilities evasion, techniques used to evade IDS, IDS tools,
Duration: 75 Minutes and how to carry out penetration testing so you
Quizzes: 3 can put a prevention plan in place. We will
combine this with an in-depth demo on how to
Wireless types, such as WLAN, are also known as avoid IDS.
WiFi networks and they are susceptible to security
lapses that wired networks are exempt from. In Introduction to IDS
this module you will learn about different wireless Evading IDS
types and their vulnerabilities. You will learn about Points of Vulnerability in IDS
several different tools that will help you take DE synchronization
countermeasures against these vulnerabilities. We Intrusion Detection Tools
will complete this course with demos on different IDS Evading Tools
tools that we will be discussing. Countermeasures
Intrusion Detection Tools
Wireless Authentication IDS Evading Tools
Authentication Systems Countermeasures
SECURITY+ (SY0-401)
SERIES
Business Continuity
Security Incidents
Duration: 30 Minutes
Duration: 30 Minutes
Quizzes: 3
Quizzes: 3
Business continuity plans are important if the
Handling incidents often needs preparation. There
organization wishes to continue its normal
are plans and procedures to be taken, and drills to
operations in disasters, whether they are man-
prepare the team. A successful handling team can
made or natural. Business continuity plans study
prevent loss of money for an organization in case
all kinds of threats and estimates the damage
of incident. It is an investment rather than a cost if
resulting from those threats. In the course
it is done correctly. In the course Incident
Business Continuity, you will learn the different
Handling, you will learn how to recognize what an
categories that the events that threaten your
incident is and where they potentially come from.
business are classified under. You will also learn
You will then learn the steps to handling incidents
the steps in creating a business continuity plan.
and implementing those steps into your everyday
You will also delve further into the development
policies and procedures.
process for a business continuity plan, and learn all
the necessary steps that are involved in initiating
Incident Handling the plan as well.
Incident Procedures
BCP
Reviewing and Implementing BCP
Network Design and Security Controls
Duration: 60 Minutes System Hacking
Quizzes: 3 Duration: 90 Minutes
Quizzes: 4
Today’s threats and cyber intelligence have made
it mandatory for us to use devices for protection. Ensure that you know everything involved in
Threats can come from inside our network and the securing a Windows system against attack. During
Internet. This makes it so that a firewall alone is this course you’ll get into Windows passwords —
not sufficient. We need to design a secure how they’re created, how they’re stored, and
network. In Network Design and Security Controls, different methods used to crack them. You’ll
you will learn the steps and the tools to designing discover different methods used for guessing
a secure network. You will also learn of the many passwords and breaking the different security
security devices that you have at your disposal, methods used within the Windows operating
with an in-depth discussion on firewalls and their system. You’ll find discussions on responding to
uses. Included in this module will be detailed privilege escalation. You’ll also spend some time
demos on Firewall and proxy-nat, DMZ, and IDS- going through a couple of scenarios demonstrating
IPS. how to use key defense tools. Overall, the topics
explored here will teach you how to increase
Network Design security on your Windows machines, as well as
Security Devices show you required procedures and tools to
Spyware & Keyloggers prepare for different certification exams from EC-
Duration: 90 Minutes Council, CompTIA, Linux, and CISSP.
Quizzes: 3
Windows Hacking
You will take a good look at spyware, the activities Password Attacks
it performs, different types of spyware, and the Alternate Data Streams
Countermeasures needed in order to prevent Steganography
hackers from utilizing these types of techniques Rootkits
against your company. You will also spend time Course Summary
studying different types of keyloggers. There are
three different types of keyloggers that we see Viruses and Worms
used in today’s environments: hardware, software, Duration: 90 Minutes
and kernel/driver keyloggers. A good pen tester or Quizzes: 3
ethical hacker cannot perform his or her job
properly without understanding the You will discover what viruses and worms are and
countermeasures for all of the hacking techniques how they can infect computers and systems. You’ll
used against today’s computer systems. Overall, study their nature, how they function, and their
these topics will help prepare you for certification impact. You will also spend time going through
exams from vendors, such as Linux, CompTIA, and discussions on varieties of each, along with some
EC-Council. real life examples. Refine your understanding of
viruses and worms to better your system. The
Spyware Uncovered knowledge you gain here will prepare you to be a
Keyloggers more effective network administrator.
Furthermore, the topics covered here will help
with preparing you for security certification exams
Denial of Service offered by EC-Council, CompTIA, and Linux.
Duration: 90 Minutes
Quizzes: 4 Viruses
Worms
Become familiar with the following concepts:
denial-of-service, distributed denial-of-service, and Vulnerability Assessment
how the denial-of-service and distributed denial- Duration: 75 Minutes
of-service attacks take place. You will also see Quizzes: 3
what botnets are and how they are used to attack
your system or network. You will find explanations Our course Vulnerability Assessment will introduce
on the tools that are used to attack, and how you you to the concepts of: Vulnerability Assessment,
can detect such attacks. You will be introduced to Vulnerability Assessment Tools, and Patch
different countermeasures, so that you can plan, Management. It will offer demos on several of the
prepare, and establish the relevant vulnerability assessment tools that are available,
countermeasures to protect your organization. as well as in-depth discussions on the benefits of
You will also learn how DoS and DDoS can be used these tools. We will discuss the process of
in penetration testing. You will go through analyzing the scan results that the vulnerability
discussions on how to protect your organization assessment tools provide. Finally, we will discuss
from the distributed denial-of-service attacks and patch management and some tools that are
denial-of-service penetration testing. Altogether, available for this process and at the end of this
these topics focus on deepening your course you will be able to create a comprehensive
understanding of security concepts and practices, VA program, identify key vulnerabilities, and
so that you’re a more efficient network perform mitigation actions before those
administrator. With the skills you gain here, you’re vulnerabilities can be exploited.
equipped to pursue a number of security
certifications from CompTIA, EC-Council, and CEH. Testing Vulnerabilities
Results, Reports, and Remediation
Denial-of-Service & Distributed Denial-of-
Service Disaster Recovery and Risk Management
Digital Attack Map Duration: 30 Minutes
Botnets Quizzes: 3
DoS/DDoS Attack Tools and Detection
DoS/DDoS Countermeasures Since you are a part of IT operations in your
DoS/DDoS in Penetration Testing enterprise, you could be involved in planning and
applying policies related to risk management
and/or disaster recovery. In our course disaster
Covering Tracks recovery and risk management, you will receive an
Duration: 75 Minutes introduction to the basics of risk management and
Quizzes: 3 disaster recovery. When you have completed the
course, you will be able to identify a risk and the
In Covering Tracks this course will be going over effect that it has on daily operations. You will gain
various ways that attackers have at their disposal an understanding of security measures and how
to cover any tracks that may lead to their they are implemented, as well as, the importance
unwanted eviction or worse yet to an audit trail and the process of managing risk in your
that would lead directly back to them. In this environment. We will partner this with a detailed
module we will be discussing disabling auditing demo on the process of risk assessment. You will
during or after an event, steps to take once it is gain an understanding of disaster recovery, be able
disabled, and destroying any evidence. We will be to define what a disaster is, rank a disaster, and
going over various ways to avoid detection on create a plan that will define how to recover from
Linux machines, and this will include several in- a disaster, as well as, successfully recovering your
depth demos on various operations for the Linux data.
machines.
Risk Management
Avoiding Detection on Windows Machines Disaster Recovery
Avoiding Detection on Linux Machines
Destroying the Evidence Introduction to Ethical Hacking
Log Protection Techniques Duration: 90 Minutes
Quizzes: 3
undercover. In this module we are going to define the various concepts involved in ethical hacking.
malware and take a look at how a payload is
delivered. We will overview the various Trojan Introduction to Hacking
tools, and tools used to generate Trojan programs, Security Management
as well as learn about Net cat. We will spend time
going over countermeasures and various anti- Port Scanning
Trojan software and hardware, and preventive Duration: 105 Minutes
methods that can be used to prevent attacks. We Quizzes: 3
will also be incorporating several demos on the
many tools that we will be discussing in this When a port is scanned on a server, the port
module. returns a response indicating that the port is open
and a service is listening. In our course Port
Defining Malware Scanning, you will learn how ports can be scanned,
Malware how a hacker can break into your network through
Tools of the Trade the ports, and the countermeasures you can take
Countermeasures to protect your device or network. Our course will
Course Summary offer in-depth discussions on port scanning
methods and techniques, port scanning tools, and
port scanning countermeasures. We will partner
Penetration Testing this with detailed demos on Ping, Ping tester, and
Duration: 60 Minutes Netstat.
Quizzes: 3
Port Scanning
Pentesting is an intentional attack on a system to Advanced Techniques
discover security weaknesses. These can be left
either by the security officer or the security Advanced Exploitation Techniques
controls. Penetration Testing is our course that Duration: 90 Minutes
covers security, vulnerabilities, different types of Quizzes: 3
tests, and when to test as a pen tester. We have
paired this with an in-depth demo on vulnerability Exploit is a common term in the computer security
assessment using the tool Nexpose. At the end of community that refers to a piece of software that
this course we will have reviewed security and takes advantage of a bug or glitch. In our course
vulnerability assessment, and the differences Advanced Exploitation Techniques, you will learn
between automatic and manual testing. what advanced exploitation techniques are and
how you can use them in your penetration testing.
Penetration Testing Introduction You will also learn how to use Metasploit to exploit
Organizational Considerations vulnerabilities. This will be coupled with in-depth
demos on using Metasploit, and other Metasploit
tools, such as, Meterpreter, Armitage, and
Armitage-mimkatz.
Sniffers
Duration: 90 Minutes
Advanced Exploiting Techniques
Quizzes: 3
Penetration Testing
A sniffer is our course where we take a look at Exploits
Network Sniffing. We will be covering the basics of
packet sniffing, ARP cache poisoning, DNS
spoofing, SSL sniffing, VoIP phone calls and sniffing
Wireless Authentication
Authentication Systems