f

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore. Excepteur sint lorem cupidatat.

You may like:

Certified Ethical Hacking (CEH) Program

Module 1

Introduction to Ethical Hacking

6 readings
Reading: Overview of Information Security
Reading: Information Security Threats and Attack Vectors
Reading: Hacking Concepts
Reading: Information Security Controls
Reading: Penetration Testing Concepts
Reading: Information Security Laws and Standards
Graded: Module 1 Introduction to Ethical Hacking Quiz

Module 2

Footprinting and Reconnaissance

14 readings
Reading: Footprinting Concepts
Reading: Footprinting through Search Engines
Reading: Footprinting through Web Services
Reading: Footprinting through Social Networking Sites
Reading: Website Footprinting
Reading: Email Footprinting
Reading: Competitive Intelligence
Reading: Whois Footprinting
Reading: DNS Footprinting
Reading: Network Footprinting
Reading: Footprinting through Social Engineering
Reading: Footprinting Tools
Reading: Footprinting Countermeasures
Reading: Footprinting Penetration Testing
Graded: Module 2 Footprinting and Reconnaissance Quiz

Module 3

Scanning Networks

7 readings
Reading: Network Scanning Concept
Reading: Scanning Tools
Reading: Scanning Techniques
Reading: Scanning Beyond IDS and Firewall
Reading: Banner Grabbing
Reading: Draw Network Diagrams
Reading: Scanning Pen Testing
Graded: Module 3 Scanning Networks Quiz

Module 4

Enumeration

9 readings
Reading: Enumeration Concepts
Reading: NetBIOS Enumeration
Reading: SNMP Enumeration
Reading: LDAP Enumeration
Reading: NTP Enumeration
Reading: SMTP and DNS Enumeration
Reading: Other Enumeration Techniques
Reading: Enumeration Countermeasures
Reading: Enumeration Pen Testing
Graded: Module 4 Enumeration Quiz

Module 5

Vulnerability Analysis

5 readings
Reading: Vulnerability Assessment Concept
Reading: Vulnerability Assessment Solution
Reading: Vulnerability Scoring Systems
Reading: Vulnerability Assessment Tools
Reading: Vulnerability Assessment Reports
Graded: Module 5 Vulnerability Analysis Quiz

Module 6

System Hacking

7 readings
Reading: System Hacking Concepts
Reading: Cracking Passwords
Reading: Escalating Privileges
Reading: Executing Applications
Reading: Hiding Files
Reading: Covering Tracks
Reading: Penetration Testing
Graded: Module 6 System Hacking Quiz

Module 7

Malware Threats

7 readings
Reading: Malware Concepts
Reading: Trojan Concepts
Reading: Virus and Worms Concepts
Reading: Malware Analysis
Reading: Countermeasures
Reading: Anti-Malware Software
Reading: Malware Penetration Testing
Graded: Module 7 Malware Threats Quiz

Module 8

Sniffing

10 readings
Reading: Sniffing Concepts
Reading: Sniffing Techniques: MAC Attacks
Reading: Sniffing Techniques: DHCP Attacks
Reading: Sniffing Techniques: ARP Poisoning
Reading: Sniffing Techniques: Spoofing Attacks
Reading: Sniffing Techniques: DNS Poisoning
Reading: Sniffing Tools
Reading: Countermeasures
Reading: Sniffing Detection Techniques
Reading: Sniffing Pen Testing
Graded: Module 8 Sniffing Quiz

Module 9

Social Engineering

7 readings
Reading: Social Engineering Concepts
Reading: Social Engineering Techniques
Reading: Insider Threats
Reading: Impersonation on Social Networking Sites
Reading: Identity Theft
Reading: Countermeasures
Reading: Social Engineering Pen Testing
Graded: Module 9 Social Engineering Quiz

Module 10

Denial-of-Service

8 readings
Reading: DoS and DDoS Concepts
Reading: DoS and DDoS Attacks Techniques
Reading: Botnets
Reading: DDoS Case Study
Reading: DoS and DDoS Attack Tools
Reading: Countermeasures
Reading: DoS and DDoS Protection Tools
Reading: Dos and DDoS Penetration Testing
Graded: Module 10 Denial-of-Service Quiz

Module 11

Session Hijacking

6 readings
Reading: Session Hijacking Concepts
Reading: Application Level Session Hijacking
Reading: Network Level Session Hijacking
Reading: Session Hijacking Tools
Reading: Countermeasures
Reading: Penetration Testing
Graded: Module 11 Session Hijacking Quiz

Module 12

Evading IDS,Firewalls, and Honeypots

8 readings
Reading: IDS, Firewall and Honeypot Concepts
Reading: IDS, Firewall and Honeypot Solutions
Reading: Evading IDS
Reading: Evading Firewalls
Reading: IDS/Firewall Evading Tools
Reading: Detecting Honeypots
Reading: IDS and Firewall Evasion Countermeasures
Reading: Penetration Testing
Graded: Module 12 Evading IDS,Firewalls, and Honeypots Quiz

Module 13

Hacking Web Servers

8 readings
Reading: Web Server Concepts
Reading: Web Server Attacks
Reading: Web Server Attack Methodology
Reading: Web Server Attack Tools
Reading: Countermeasures
Reading: Patch Management
Reading: Web Server Security Tools
Reading: Web Server Pen Testing
Graded: Module 13 Hacking Web Servers Quiz

Module 14

Hacking Web Applications

7 readings
Reading: Web App Concepts
Reading: Web App Threats
Reading: Hacking Methodology
Reading: Web App Hacking Tools
Reading: Countermeasures
Reading: Web App Security Testing Tools
Reading: Web App Pen Testing
Graded: Module 14 Hacking Web Applications Quiz

Module 15

SQL Injection

6 readings
Reading: SQL Injection Concepts
Reading: Types of SQL Injection
Reading: SQL Injection Methodology
Reading: SQL Injection Tools
Reading: Evasion Techniques
Reading: Countermeasures
Graded: Module 15 SQL Injection Quiz

Module 16

Hacking Wireless Networks

9 readings
Reading: Wireless Concepts
Reading: Wireless Encryption
Reading: Wireless Threats
Reading: Wireless Hacking Methodology
Reading: Wireless Security Tools
Reading: Bluetooth Hacking
Reading: Countermeasures
Reading: Wireless Security Tools
Reading: Wireless Pen Testing
Graded: Module 16 Hacking Wireless Networks Quiz

Module 17

Hacking Mobile Platforms

7 readings
Reading: Mobile Platform Attack Vectors
Reading: Hacking Android OS
Reading: Hacking iOS
Reading: Mobile Spyware
Reading: Mobile Device Management
Reading: Mobile Security Guidelines and Tools
Reading: Mobile Pen Testing
Graded: Module 17 Hacking Mobile Platforms Quiz

Module 18

IoT Hacking

6 readings
Reading: IoT Concepts
Reading: IoT Attacks
Reading: IoT Hacking Methodology
Reading: IoT Hacking Tools
Reading: Countermeasures
Reading: IoT Pen Testing
Graded: Module 18 IoT Hacking Quiz

Module 19

Cloud Computing

6 readings
Reading: Cloud Computing Concepts
Reading: Cloud Computing Threats
Reading: Cloud Computing Attacks
Reading: Cloud Security
Reading: Cloud Security Tools
Reading: Cloud Penetration Testing
Graded: Module 19 Cloud Computing Quiz

Module 20

Cryptography

8 readings
Reading: Cryptography Concepts
Reading: Encryption Algorithms
Reading: Cryptography Tools
Reading: Public Key Infrastructure (PKI)
Reading: Email Encryption
Reading: Disk Encryption
Reading: Cryptanalysis
Reading: Countermeasures
Graded: Module 20 Cryptography Quiz

Certified Ethical Hacking (CEH) Program

About this course

Ethical Hacking is one of the most demanded skills on the planet in light of the modern connected ecosystem. With an increase in the number of cybersecurity incidents, every business, startup, organization, and the industry requires a skilled team of cyber experts and ethical hackers to dodge data breach attempts.

 

This Certified Ethical Hacking (CEH) Program is designed in close consultation with industry veterans, technology experts and professional cybersecurity experts to give you deep insights into the world of ethical hacking. With the help of this program, you will learn how to achieve optimal efficiency in the field of cybersecurity.

 

The inclusive course teaches you about the modern techniques used by hackers and cybercriminals. You learn to go inside the mind of a hacker that gives you the skills and knowledge of how to dodge complex hacks and data breach attacks. After the successful completion of this course, you will be able to create a detailed security framework that has the ability to deal with hacking attempts. You will learn the five phases of Ethical Hacking in detail and will gain hands-on experience of scanning, testing, hacking and securing IT systems within an organization.

 

Learn The Essence of Ethical Hacking, The Smart Way with SierraTec Secure

 

 

Exam Info

Certified Ethical Hacking (CEH) program will prepare students for the flowing cybersecurity and network defense exams with a global recognition:

  • 312-50 – Certified Ethical Hacker (ANSI)
    • Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
  • 312-99 – Certified Network Defense Architect (CNDA)

Prerequisites

  • Deep Knowledge of TCP/IP Framework and Networking Protocols
  • Experience of working on Network Systems and Technologies

 

Target Audience

The Certified Ethical Hacking (CEH) Program is suitable for IT professionals, security experts, network admins and individuals working in the cybersecurity industry. This course is design to prepare cybersecurity professional on the needed skill required to deal with cyber-attacks and sophisticated hacking challenges.

 

IT Professionals | Cybersecurity Professionals | Network Engineers | IT Engineers | Network Infrastructure Managers | Cybersecurity Enthusiasts

What's Included

Our CEH program equips enrollees with the theoretical knowledge, technical skills, and hands-on experience of dealing with cyber threats and hacking attempts. A student enrolled in Certified Ethical Hacking Program would learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.

 

Essentially, the program teaches a student on how to develop a hacker mindset to dodge hacking attempts. Further, the program also prepares a student to appear for EC-Council Certified Ethical Hacker v10 exam 312-50and other Global Ethical Hacking Certifications.

 

 

Topics Covered in the Program

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

 

Why Sign Up

  • Highly-qualified Team of Professional Instructors 

Our expert team of cybersecurity specialists and network architects are well-versed in modern cybersecurity practices as well as hacking techniques. With an in-house team consisting of ethical hackers and security professionals, we offer in-depth knowledge of all the aspects associated with hacking, cybersecurity and data breach instances.

  • Official & Authorized Training Partner 

SierraTec Secure have a team of dedicated training professional that are certified, experience and accredited to teach ethical hacking courses globally. Our strong associations with leading agencies and professional cybersecurity training authorities make us better equipped to prepare students for global certification examinations.

 

Hands-on Labs

This course hand-on Lab is designed to offer all students practical exposure and experience of working as ethical hacker to secure systems as well as network infrastructure. Our hands-on Lab is design in line of attacks and countermeasure to help student acquire ethical hacking skill and understand how hackers penetrate a network.

Syllabus

Module 1 0/7

Introduction to Ethical Hacking

6 readings
Reading: Overview of Information Security
minutes
Reading: Information Security Threats and Attack Vectors
minutes
Reading: Hacking Concepts
minutes
Reading: Information Security Controls
minutes
Reading: Penetration Testing Concepts
minutes
Reading: Information Security Laws and Standards
minutes
Graded: Module 1 Introduction to Ethical Hacking Quiz
1 Question

Module 2 0/15

Footprinting and Reconnaissance

14 readings
Reading: Footprinting Concepts
minutes
Reading: Footprinting through Search Engines
minutes
Reading: Footprinting through Web Services
minutes
Reading: Footprinting through Social Networking Sites
minutes
Reading: Website Footprinting
minutes
Reading: Email Footprinting
minutes
Reading: Competitive Intelligence
minutes
Reading: Whois Footprinting
minutes
Reading: DNS Footprinting
minutes
Reading: Network Footprinting
minutes
Reading: Footprinting through Social Engineering
minutes
Reading: Footprinting Tools
minutes
Reading: Footprinting Countermeasures
minutes
Reading: Footprinting Penetration Testing
minutes
Graded: Module 2 Footprinting and Reconnaissance Quiz
1 Question

Module 3 0/8

Scanning Networks

7 readings
Reading: Network Scanning Concept
minutes
Reading: Scanning Tools
minutes
Reading: Scanning Techniques
minutes
Reading: Scanning Beyond IDS and Firewall
minutes
Reading: Banner Grabbing
minutes
Reading: Draw Network Diagrams
minutes
Reading: Scanning Pen Testing
minutes
Graded: Module 3 Scanning Networks Quiz
1 Question

Module 4 0/10

Enumeration

9 readings
Reading: Enumeration Concepts
minutes
Reading: NetBIOS Enumeration
minutes
Reading: SNMP Enumeration
minutes
Reading: LDAP Enumeration
minutes
Reading: NTP Enumeration
minutes
Reading: SMTP and DNS Enumeration
minutes
Reading: Other Enumeration Techniques
minutes
Reading: Enumeration Countermeasures
minutes
Reading: Enumeration Pen Testing
minutes
Graded: Module 4 Enumeration Quiz
1 Question

Module 5 0/6

Vulnerability Analysis

5 readings
Reading: Vulnerability Assessment Concept
minutes
Reading: Vulnerability Assessment Solution
minutes
Reading: Vulnerability Scoring Systems
minutes
Reading: Vulnerability Assessment Tools
minutes
Reading: Vulnerability Assessment Reports
minutes
Graded: Module 5 Vulnerability Analysis Quiz
1 Question

Module 6 0/8

System Hacking

7 readings
Reading: System Hacking Concepts
minutes
Reading: Cracking Passwords
minutes
Reading: Escalating Privileges
minutes
Reading: Executing Applications
minutes
Reading: Hiding Files
minutes
Reading: Covering Tracks
minutes
Reading: Penetration Testing
minutes
Graded: Module 6 System Hacking Quiz
1 Question

Module 7 0/8

Malware Threats

7 readings
Reading: Malware Concepts
minutes
Reading: Trojan Concepts
minutes
Reading: Virus and Worms Concepts
minutes
Reading: Malware Analysis
minutes
Reading: Countermeasures
minutes
Reading: Anti-Malware Software
minutes
Reading: Malware Penetration Testing
minutes
Graded: Module 7 Malware Threats Quiz
1 Question

Module 8 0/11

Sniffing

10 readings
Reading: Sniffing Concepts
minutes
Reading: Sniffing Techniques: MAC Attacks
minutes
Reading: Sniffing Techniques: DHCP Attacks
minutes
Reading: Sniffing Techniques: ARP Poisoning
minutes
Reading: Sniffing Techniques: Spoofing Attacks
minutes
Reading: Sniffing Techniques: DNS Poisoning
minutes
Reading: Sniffing Tools
minutes
Reading: Countermeasures
minutes
Reading: Sniffing Detection Techniques
minutes
Reading: Sniffing Pen Testing
minutes
Graded: Module 8 Sniffing Quiz
1 Question

Module 9 0/8

Social Engineering

7 readings
Reading: Social Engineering Concepts
minutes
Reading: Social Engineering Techniques
minutes
Reading: Insider Threats
minutes
Reading: Impersonation on Social Networking Sites
minutes
Reading: Identity Theft
minutes
Reading: Countermeasures
minutes
Reading: Social Engineering Pen Testing
minutes
Graded: Module 9 Social Engineering Quiz
1 Question

Module 10 0/9

Denial-of-Service

8 readings
Reading: DoS and DDoS Concepts
minutes
Reading: DoS and DDoS Attacks Techniques
minutes
Reading: Botnets
minutes
Reading: DDoS Case Study
minutes
Reading: DoS and DDoS Attack Tools
minutes
Reading: Countermeasures
minutes
Reading: DoS and DDoS Protection Tools
minutes
Reading: Dos and DDoS Penetration Testing
minutes
Graded: Module 10 Denial-of-Service Quiz
1 Question

Module 11 0/7

Session Hijacking

6 readings
Reading: Session Hijacking Concepts
minutes
Reading: Application Level Session Hijacking
minutes
Reading: Network Level Session Hijacking
minutes
Reading: Session Hijacking Tools
minutes
Reading: Countermeasures
minutes
Reading: Penetration Testing
minutes
Graded: Module 11 Session Hijacking Quiz
1 Question

Module 12 0/9

Evading IDS,Firewalls, and Honeypots

8 readings
Reading: IDS, Firewall and Honeypot Concepts
minutes
Reading: IDS, Firewall and Honeypot Solutions
minutes
Reading: Evading IDS
minutes
Reading: Evading Firewalls
minutes
Reading: IDS/Firewall Evading Tools
minutes
Reading: Detecting Honeypots
minutes
Reading: IDS and Firewall Evasion Countermeasures
minutes
Reading: Penetration Testing
minutes
Graded: Module 12 Evading IDS,Firewalls, and Honeypots Quiz
1 Question

Module 13 0/9

Hacking Web Servers

8 readings
Reading: Web Server Concepts
minutes
Reading: Web Server Attacks
minutes
Reading: Web Server Attack Methodology
minutes
Reading: Web Server Attack Tools
minutes
Reading: Countermeasures
minutes
Reading: Patch Management
minutes
Reading: Web Server Security Tools
minutes
Reading: Web Server Pen Testing
minutes
Graded: Module 13 Hacking Web Servers Quiz
1 Question

Module 14 0/8

Hacking Web Applications

7 readings
Reading: Web App Concepts
minutes
Reading: Web App Threats
minutes
Reading: Hacking Methodology
minutes
Reading: Web App Hacking Tools
minutes
Reading: Countermeasures
minutes
Reading: Web App Security Testing Tools
minutes
Reading: Web App Pen Testing
minutes
Graded: Module 14 Hacking Web Applications Quiz
1 Question

Module 15 0/7

SQL Injection

6 readings
Reading: SQL Injection Concepts
minutes
Reading: Types of SQL Injection
minutes
Reading: SQL Injection Methodology
minutes
Reading: SQL Injection Tools
minutes
Reading: Evasion Techniques
minutes
Reading: Countermeasures
minutes
Graded: Module 15 SQL Injection Quiz
1 Question

Module 16 0/10

Hacking Wireless Networks

9 readings
Reading: Wireless Concepts
minutes
Reading: Wireless Encryption
minutes
Reading: Wireless Threats
minutes
Reading: Wireless Hacking Methodology
minutes
Reading: Wireless Security Tools
minutes
Reading: Bluetooth Hacking
minutes
Reading: Countermeasures
minutes
Reading: Wireless Security Tools
minutes
Reading: Wireless Pen Testing
minutes
Graded: Module 16 Hacking Wireless Networks Quiz
1 Question

Module 17 0/8

Hacking Mobile Platforms

7 readings
Reading: Mobile Platform Attack Vectors
minutes
Reading: Hacking Android OS
minutes
Reading: Hacking iOS
minutes
Reading: Mobile Spyware
minutes
Reading: Mobile Device Management
minutes
Reading: Mobile Security Guidelines and Tools
minutes
Reading: Mobile Pen Testing
minutes
Graded: Module 17 Hacking Mobile Platforms Quiz
1 Question

Module 18 0/7

IoT Hacking

6 readings
Reading: IoT Concepts
minutes
Reading: IoT Attacks
minutes
Reading: IoT Hacking Methodology
minutes
Reading: IoT Hacking Tools
minutes
Reading: Countermeasures
minutes
Reading: IoT Pen Testing
minutes
Graded: Module 18 IoT Hacking Quiz
1 Question

Module 19 0/7

Cloud Computing

6 readings
Reading: Cloud Computing Concepts
minutes
Reading: Cloud Computing Threats
minutes
Reading: Cloud Computing Attacks
minutes
Reading: Cloud Security
minutes
Reading: Cloud Security Tools
minutes
Reading: Cloud Penetration Testing
minutes
Graded: Module 19 Cloud Computing Quiz
1 Question

Module 20 0/9

Cryptography

8 readings
Reading: Cryptography Concepts
minutes
Reading: Encryption Algorithms
minutes
Reading: Cryptography Tools
minutes
Reading: Public Key Infrastructure (PKI)
minutes
Reading: Email Encryption
minutes
Reading: Disk Encryption
minutes
Reading: Cryptanalysis
minutes
Reading: Countermeasures
minutes
Graded: Module 20 Cryptography Quiz
1 Question

User registration

Reset Password