Contact us on admin@tiptechnologies.co.uk to get up to 90% discount on bundles.
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
Prerequisite
A minimum of either two years full-time paid work experience, or one year experience, plus an information security university degree, in two or more of the following:
Basic Networking
CompTIA Linux+ Certification
CompTIA Security+ Certification
Don’t have the required experience? Do not worry, we can bring you up to speed.
Who Should Attend
The course is intended for anybody who has a passion for security or looking for a career in Cyber Security.
Course Structure
This is a six weeks, online training course
Course Content: 13 Domains
- Getting Started: Essential Knowledge
Reconnaissance: Information Gathering for the Ethical Hacker
Scanning and Enumeration
Sniffing and Evasion
Attacking a System
Web-Based Hacking: Servers and Applications
Wireless Network Hacking
Mobile Communications and the IoT
Security in Cloud Computing
Trojans and Other Attacks
Cryptography 101
Low Tech: Social Engineering and Physical Security
The Pen Test: Putting It All Together
Module 1 Getting Started: Essential Knowledge
- Security 101
Essentials
Security Basics
Introduction to Ethical Hacking
Hacking Terminology
The Ethical Hacker
Module 2 Reconnaissance: Information Gathering for the Ethical Hacker
- Footprinting
Passive Footprinting
Active Footprinting
Footprinting Methods and Tools
Search Engines
Website and E-mail Footprinting
DNS Footprinting
Network Footprinting
Other ToolsModule 3 Scanning and Enumeration - Fundamentals
TCP/IP Networking
Subnetting
Scanning Methodology
Identifying Targets
Port Scanning
Evasion
Vulnerability Scanning
Enumeration
Windows System Basics
Enumeration Techniques
Module 4 Sniffing and Evasion
- Essentials
Network Knowledge for Sniffing
Active and Passive Sniffing
Sniffing Tools and Techniques
Techniques
Tools
Evasion
Devices Aligned Against You
Evasion Techniques
Module 5 Attacking a System
- Getting Started
Windows Security Architecture
Linux Security Architecture
Methodology
Hacking Steps
Authentication and Passwords
Privilege Escalation and Executing Applications
Hiding Files and Covering Tracks
Module 6 Web-Based Hacking: Servers and Applications
- Web Servers
Web Organizations
Attack Methodology
Web Server Architecture
Web Server Attacks
Attacking Web Applications
Application Attacks
Countermeasures
Module 7 Wireless Network Hacking
- Wireless Networking
Wireless Terminology, Architecture, and Standards
Wireless Hacking
Module 8 Mobile Communications and the IoT
- The Mobile World
Mobile Vulnerabilities and Risks
Mobile Platforms and Attacks
IoT
IoT Architecture
IoT Vulnerabilities and Attacks
IoT Hacking Methodology
Module 9 Security in Cloud Computing
- Cloud Computing
Cloud Security
Threats and Attacks
Module 10 Trojans and Other Attacks
- The “Malware” Attacks
Trojans
Viruses and Worms
Remaining Attacks
Denial of Service
Session Hijacking
Module 11 Cryptography 101
- Cryptography and Encryption Overview
Encryption Algorithms and Techniques
PKI, the Digital Certificate, and Digital Signatures
The PKI System
Digital Certificates
Digital Signatures
Encrypted Communication and Cryptography Attacks
Encrypted Communication
Cryptography Attacks
Module 12 Low Tech: Social Engineering and Physical Security
- Social Engineering
Human-Based Attacks
Computer-Based Attacks
Mobile-Based Attacks
Physical Security
Physical Security 101
Module 13 The Pen Test: Putting It All Together
- Methodology and Steps
The Security Assessments
Security Assessment Deliverable
Guidelines
More Terminology
Why choose Tip Technology?
Tip Technologies provide you course ware, practice questions, answer templates and exam guidance
We make your learning experience enjoyable
We provide pre- and post-course support so you never feel alone
All of our training is hands-on, using real-world scenarios
Advantages of CEH Training
- Shows commitment to the field of Cyber security
- Helps you stand out in a competitive market of IT Security professionals
- Assurance of information security credibility when dealing with other companies or clients.
- Indicates deep technical knowledge and skills
- Professionals Keep up to date with and able to protect against the latest threats