Certified Ethical Hacking v8

Prepare for the CEH v8 certification and learn the latest ethical hacking techniques.

Students begin by learning how perimeter defenses work and then by scanning and attacking your own network (no real networks will be harmed), students will learn how intruders operate and the steps they can take to secure a system.

In the interactive, lab-filled environment, students will gain in-depth knowledge and experience with current, essential security systems. They will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, students will prepare for the latest Certified Ethical Hacker exam. An exam voucher is included with the course registration. The exam will not be administered in class to allow for maximum discussion opportunities and hands-on activities.

Additional fees apply for on-site testing.

Highlights of CEH v8 include:

 

  • Diagrams of concepts and attacks for clarity and easier interpretation
  • Key industry-standard tools covered in detail
  • Time dedicated to penetration testing
  • Results-oriented, descriptive, and analytical lab manual
  • DVD Toolset 2

What Students Learn

Footprinting and reconnaissance

  • Hacking web servers, web applications, and wireless networks
  • Cryptography
  • Penetration testing
  • Social engineering
  • Trojans, viruses, and worms
  • Evading IDS, firewalls, and honeypots
  • Enumeration
  • Buffer overflows

Recommended Prerequisites

At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+ is highly recommended.

Course Outline

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffers
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hijacking Web Servers
  13. Hacking Web Applications
  14. SQL Injection 3
  15. Hacking Wireless Networks
  16. Evading IDS, Firewalls, and Honeypots
  17. Buffer Overflows
  18. Cryptography
  19. Penetration Testing

Labs

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webserver
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS and Firewalls
  • Buffer Overflow
  • Cryptography Practice Tests Students receive 6 months access to online practice tests.