Cyber Ethical Hacking v2

H

Contact us on admin@tiptechnologies.co.uk to get up to 90% discount.  Get 80%discount on our test questions.

Contact us on admin@tiptechnologies.co.uk to get up to 90% discount on bundles.

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.

Prerequisite

A minimum of either two years full-time paid work experience, or one year experience, plus an information security university degree, in two or more of the following:

Basic Networking
CompTIA Linux+ Certification
CompTIA Security+ Certification

Don’t have the required experience? Do not worry, we can bring you up to speed.

Who Should Attend

The course is intended for anybody who has a passion for security or looking for a career in Cyber Security.

Course Structure

This is a six weeks, online training course

Course Content: 13 Domains

  • Getting Started: Essential Knowledge
    Reconnaissance: Information Gathering for the Ethical Hacker
    Scanning and Enumeration
    Sniffing and Evasion
    Attacking a System
    Web-Based Hacking: Servers and Applications
    Wireless Network Hacking
    Mobile Communications and the IoT
    Security in Cloud Computing
    Trojans and Other Attacks
    Cryptography 101
    Low Tech: Social Engineering and Physical Security
    The Pen Test: Putting It All Together

Module 1 Getting Started: Essential Knowledge

  • Security 101
    Essentials
    Security Basics
    Introduction to Ethical Hacking
    Hacking Terminology
    The Ethical Hacker

Module 2 Reconnaissance: Information Gathering for the Ethical Hacker

  • Footprinting
    Passive Footprinting
    Active Footprinting
    Footprinting Methods and Tools
    Search Engines
    Website and E-mail Footprinting
    DNS Footprinting
    Network Footprinting
    Other ToolsModule 3 Scanning and Enumeration
  • Fundamentals
    TCP/IP Networking
    Subnetting
    Scanning Methodology
    Identifying Targets
    Port Scanning
    Evasion
    Vulnerability Scanning
    Enumeration
    Windows System Basics
    Enumeration Techniques

Module 4 Sniffing and Evasion

  • Essentials
    Network Knowledge for Sniffing
    Active and Passive Sniffing
    Sniffing Tools and Techniques
    Techniques
    Tools
    Evasion
    Devices Aligned Against You
    Evasion Techniques

Module 5 Attacking a System

  • Getting Started
    Windows Security Architecture
    Linux Security Architecture
    Methodology
    Hacking Steps
    Authentication and Passwords
    Privilege Escalation and Executing Applications
    Hiding Files and Covering Tracks

Module 6 Web-Based Hacking: Servers and Applications

  • Web Servers
    Web Organizations
    Attack Methodology
    Web Server Architecture
    Web Server Attacks
    Attacking Web Applications
    Application Attacks
    Countermeasures

Module 7 Wireless Network Hacking

  • Wireless Networking
    Wireless Terminology, Architecture, and Standards
    Wireless Hacking

Module 8 Mobile Communications and the IoT

  • The Mobile World
    Mobile Vulnerabilities and Risks
    Mobile Platforms and Attacks
    IoT
    IoT Architecture
    IoT Vulnerabilities and Attacks
    IoT Hacking Methodology

Module 9 Security in Cloud Computing

  • Cloud Computing
    Cloud Security
    Threats and Attacks

Module 10 Trojans and Other Attacks

  • The “Malware” Attacks
    Trojans
    Viruses and Worms
    Remaining Attacks
    Denial of Service
    Session Hijacking

Module 11 Cryptography 101

  • Cryptography and Encryption Overview
    Encryption Algorithms and Techniques
    PKI, the Digital Certificate, and Digital Signatures
    The PKI System
    Digital Certificates
    Digital Signatures
    Encrypted Communication and Cryptography Attacks
    Encrypted Communication
    Cryptography Attacks

Module 12 Low Tech: Social Engineering and Physical Security

  • Social Engineering
    Human-Based Attacks
    Computer-Based Attacks
    Mobile-Based Attacks
    Physical Security
    Physical Security 101

Module 13 The Pen Test: Putting It All Together

  • Methodology and Steps
    The Security Assessments
    Security Assessment Deliverable
    Guidelines
    More Terminology

Why choose Tip Technology?

Tip Technologies provide you course ware, practice questions, answer templates and exam guidance
We make your learning experience enjoyable
We provide pre- and post-course support so you never feel alone
All of our training is hands-on, using real-world scenarios

Advantages of CEH Training

  • Shows commitment to the field of Cyber security
  • Helps you stand out in a competitive market of IT Security professionals
  • Assurance of information security credibility when dealing with other companies or clients.
  • Indicates deep technical knowledge and skills
  • Professionals Keep up to date with and able to protect against the latest threats