Certified Ethical Hacker Bootcamp


Certified Ethical Hacker Bootcamp, Singapore elarning online course

Course Description

Penetration Testing and Ethical Hacker Bootcamp

This bootcamp prepares aspiring and current security professionals for industry certification exams and interviews to enhance their careers. With top experts and an interactive environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing.

This bootcamp was designed for those who wish to take an immersive look at the various in-demand security professional careers. You'll examine not just the theories and tools a professional hacker would use when conducting a penetration test, but also gain an insight into the day to day workflow of an ethical hacker.

Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system


Course Objectives

1. CEH – Introduction to Ethical Hacking
2. CEH – Enumeration
3. CEH – Sniffing
4. CEH – Denial of Service
5. CEH – Session Hijacking
6. CEH – Hacking Web Applications
7. CEH – SQL Injection
8. CEH – Hacking Wireless Networks
9. CEH – Evading IDS, Firewalls, and Honeypots
10. CEH – Cryptography
11. CEH – Trojans and Backdoors
12. CEH – Viruses and Worms
13. CEH – Buffer Overflow
14. CEH – Payment Card Industry (PCI)
15. CEH – Penetration Testing
16. CEH – Test Prep Questions
17. Bonus Section: Ethical Hacking Labs


Related Courses

  • Certified Blockchain Solutions Architect

    Certified Blockchain Solutions Architect

    SGD $29.00

    Course Description

    Welcome to the Certified Blockchain Solutions Architect (CBSA) LiveLessons Course. This course is ideal for technology-focused engineers, application developers, IT administrators, or anyone wanting to obtain the Blockchain Training Alliance Certified Blockchain Solutions Architect Certifications.  In this course, we will provide an exam overview of the Blockchain Training Alliance Certification, Certified Blockchain Solutions Architect (CBSA). This will include Blockchain basics such as components, terminology, and ledgers, as well as why Blockchain is revolutionizing how businesses and governments are looking at technology to create efficiencies. We will cover the top ten areas to focus on for the exam and what topics to study, as well as the exam process and what to expect before, during, and after the exam.

    Read more...

  • Security Professional (CISSP)

    Security Professional (CISSP)

    SGD $299.00

    Course Description

    The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, nonprofit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

    Read more...

  • Google Cloud Platform for AWS Professionals & GCP Security Fundamentals

    Google Cloud Platform for AWS Professionals & GCP Security Fundamentals

    SGD $20.00

    Course Description

    AWS Professionals. This course is meant for IT professionals that are knowledgeable in AWS and are looking to get a quick ramp up in comparing Google Cloud Platform to Amazon Web Services at a functional level. This course covers most of the services. The Services covered are. 1)  Networking   2)  Storage   3)  Data Services   4)  Management Security in the cloud is much like security in your on-premise data centers, only without the costs of maintaining facilities and hardware. In the cloud, security is generally a shared responsibility between the provider and the customer. With Google Cloud Platform there are many facets of maintaining a secure cloud environment and in this course we will cover them.  

    Read more...


Content

CEH - Introduction to Ethical Hacking

+

CEH Bootcamp Course Overview

Introduction

TCP, UDP and Networking

Firewalls

Hacker, Cracker and Types of Hackers

Network Penetration and NMAP

5 Distinct Phases of Ethical Hacking

CEH - Enumeration

+

Open Mail Relay, IP Sec and SSO

NBTSTAT & SID

CEH - Sniffing

+

OSI Model and CIA

Angry IP and Scans

Spoofing and Hijacking

DNS, DNS:Domain and Zone Transfer, DNS:Zone and Cache Poisoning and Reflection DoS

Split Horizon and CIDR

MAC Address & IPv4/IPv6 Addressing

Interrupts & DHCP (Dynamic Host Control Protocol)

Wireshark and Wireless Hacking

CEH - Denial of Service

+

Smurf/Fraggle/Teardrop Attacks

CEH - Session Hijacking

+

Burp Proxy and Hping

CEH - Hacking Web Applications

+

Cross Site Scripting & Cross Site Request Forgery

Firesheep, DSLAM/Cable Modem Architecture

Basic HTML

CEH - SQL Injection

+

Nikto Web Scanner, BT Crack, and Havij

SQL Injection CEH

SQL (Structured Query Language)

CEH - Hacking Wireless Networks

+

WarDialing and OS

ACLs & Proximity Card

Kismet, WebGoat and WebScarab Signs a System is Hacked

Wireless Network Security

CEH - Evading IDS, Firewalls, and Honeypots

+

Hardening and IDS

Firewalk, Firewalls

Hexadecimal & ASCII

CEH - Cryptography

+

Ciphers and Data Center Humidity

Encryption DPI and SOAP

SSL & TLS

Renegotiation, Version Rollback, and BEAST Attacks

Truncation, Freak and Logjam, and Heartbleed Bug Attacks

Encryption Analysis

NAT (Network address Translation) & PKI (Public Key Infrastructure)

Symmetric & Asymmetric Ciphers

CEH - Trojans and Backdoors

+

IRC and Network Shells

CEH - Viruses and Worms

+

VIRI Part 1

VIRI Part 2

VIRI Part 3

Malware Types Part 2

Common Malware

Malware Types Part 1

CEH - Buffer Overflow

+

Buffer Overflow Protection

CEH - Payment Card Industry (PCI)

+

Payment Card Industry (PCI)

Build and Maintain Secure Networks and Systems

Protect Cardholder Data

Encrypt Transmission of Cardholder Data Across Open Public Networks

Restrict Access to Cardholder Data by Business Need-to-Know

Regularly Test Security Systems and Processes

CEH - Penetration Testing

+

EAP and Kali Linux

Misc. Tools

SSDLC & Threat Modeling

Repudiation & Kali Linux

Three phases of security testing

CEH - Test Prep Questions

+

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

Simulated Practice Environment

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.