This course will include but is not limited to the following objectives: Introduction to Ethical Hacking and the importance in our digital world.
Foot printing and Reconnaissance in the client environment.
The use of different types of scanning methodologies and tools.
Scanning networks, methodologies, draw networks diagrams and configure proxies.
Enumeration concepts and techniques, and enumeration countermeasures.
System hacking methodologies, password cracking, escalating privileges, types of key loggers, types of Spyware, and types of Rootkits and how to detect them.
Trojans and Backdoors concepts, detection, and countermeasures.
Viruses and Worms concepts and types, malware analysis, penetration testing for Viruses.
Sniffers fundamentals, MAC and DHCP Attacks, ARP and DNS Poisoning, Spoofing Attacks, Sniffing Tools, Countermeasures and Sniffing Pen Testing.
Social Engineering Fundamentals and Techniques, Impersonation on social networking sites, and identity theft.
Denial of Service Concepts and Countermeasures.
Session Hijacking Concepts, Session Hijacking Tools, and Countermeasures.
Hijacking Webservers and Attacks Tools, Countermeasures, Patch Management and Webserver Security Tools.
Hijacking Web Applications, Web App Threats, Web App Hacking Methodology, and Web App Pen Testing.
SQL Injection and Types, Testing for SQL Injection and Countermeasures.. This course will prepare the student to take the exam certification for C)PEH Certified Professional Ethical Hacker.
Learning Objectives
- Hacking Wireless Networks Concepts and Types, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Man-in-the-Middle Attack, Countermeasures and Wireless Security Tools.
- Penetration Testing Types and Concepts, Phases, Techniques, and Pen Testing Roadmap. and more.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.