You are on page 1of 3

Certified Ethical Hacker

Course Code: CEHD


Duration: Full time – 5 Days, 9am to 5pm
Page: 1 of 3

AIM Scanning

This course will show you how to scan, test, • War Dialers
hack and secure your own systems. The • TCP Three Way Handshake
intensive lab demonstrations gives each • Demo - SuperScan
student in-depth knowledge and practical • Port Scanning Techniques
experience with the current security systems. • Port Scanning Tools
You will begin by understanding how • Scanning Tools
• Demo - Cheops & nMap
perimeter defences work and then be lead into
scanning and attacking your own networks. Enumeration
You will then learn how intruders escalate
privileges and what steps can be taken to • Enumeration
secure a system. Students will also learn about • Net Bios Null Sessions
Intrusion Detection, Policy Creation, Social • Demo - Creating a Null User Session
Engineering, DDoS Attacks, Buffer Overflows • Countermeasure to Null Sessions
and Virus Creation • Hacking Tools
• Demo - Using SolarWinds
• How to Identify Accounts
Who Should Attend: • More Hacking Tools
• Demo - Cain Enable
Network Administrators, LAN professionals,
System Hacking
Application developers, programmers, project
leaders and other technical individuals that
• Password Guessing
need to acquire the necessary skills to thwart • Hacking Tool - KerbCrack
hacker assaults on corporate networks. • Demo - LoftCrack
• Privilege Escalation
Introduction to Ethical Hacking • Password Cracking
• Demo - Metasploit Project
• Can Hacking be Ethical • SMBRelay
• What does a Malicious Hacker Do? • Man-In-The-Middle Scenario
• Classification of Hackers • More Hacking Tools
• What do Ethical Hackers Do? • Countermeasures to Installing a Rootkit
• Modes of Ethical Hacking • Demo - Using an Alternate Data Stream
• Demo - BlindSide • Demo - BlindSide

Footprinting Trojans and Backdoors

• Revisiting Reconnaissance • Trojans & Different Types of Malware


• Demo - Sam Spade & VisualRoute • Demo - EliteWrap
• Demo - Using Google • Tools
• Network Range, Traceroute & Tools • BOSniffer and FireKiller
• Demo - Email Tracking
• Information Gathering Methodology

…a better way to learn


Further Information For course details and further information please visit our website www.clickstart.com.au or contact us by e-mail courses@clickstart.com.au or by phone on 1 300 73 73 74.
Certified Ethical Hacker
Course Code: CEHD
Duration: Full time – 5 Days, 9am to 5pm
Page: 3 of 3

Sniffers • XXS Web Application


• Demo - Performing Reconnaissance
• Introduction to Sniffers
• Demo - Ethereal Web Based Password Cracking
• Passive & Active Sniffing Programs Techniques
• Demo - Using SMAC
• Sniffing HTTPS and SSH • Web Based Password Cracking Overview
• Demo - Sniffing with Kaine Enable • Password Guessing
• Demo - SnadBoy's Revelation
Denial of Service
SQL Injection
• Denial of Service Overview
• Denial of Service Attacks • What is SQL Injection?
• IDS Companies & Firewalls • Shutting Down SQL Server
• Demo - Ping of Death DOS • Demo - SQL Injection
• SQL Dictionary
Social Engineering
Hacking Wireless Networks
• Social Engineering Overview
• What is Social Engineering? • Wireless Networking
• Adding Extra Security into your • Network Hacking Tools
Corporation • Demo - "The Broken" Wireless Hacking &
Cracking
Session Hijacking
Evading IDS, Firewalls and Honey Pots
• Session Hijacking Overview
• Understanding Session Hijacking
• Demo - T-Sight • Intrusion Detection Systems Overview
• Protect against Session Hijacking • Application Protocol Verification
• Demo - Engage Packet Builder
Hacking Web Servers • TCP Replay
• Bypassing Firewalls
• What is a Web Server? • Demo – KFSensor
• Hacking Tools & Countermeasures • IDS, Firewall and Honey Pots Review
• Demo - Simple Internet Client Attack
• Unicode Attacks & IIS Log Files Linux Hacking
• Directory Traversal Tools
• Demo - N-Stealth Security Scanner • Linux Hacking Overview
• Hacking Web Servers Review • Compiling Programs in Linux
• Demo - Nmap Front End
Web Application Vulnerabilities • Linux Hacking Tool
• Linux Hacking Review
• Web Application
• Vulnerabilities Overview Buffer Overflows
• Understanding Web Application Security
• Demo - BlackWidow and BurpSpider • Buffer Overflows Overview
• Hidden Fields • Preventing Buffer Overflows
• Demo - Man-In-The-Middle Attack • Demo - RPC Exploit

…a better way to learn


Further Information For course details and further information please visit our website www.clickstart.com.au or contact us by e-mail courses@clickstart.com.au or by phone on 1 300 73 73 74.
Certified Ethical Hacker
Course Code: CEHD
Duration: Full time – 5 Days, 9am to 5pm
Page: 3 of 3

Cryptography

• Cryptography Overview
• Different Types of Cryptography
• RC5 & Rainbow Tables
• Demo - How to Create Rainbow Table
• Ethical Hacker Course Closure

Virus and Worms

• Virus and Worms


• Terminologies
• How is a worm different from virus?
• Access Methods & Modes of Infections
• Life Cycle of a Virus
• Writing a Simple Virus Program
• Prevention is Better Than a Cure
• Anti-Virus Software

Physical Security

• Physical Security
• Understanding Physical Security
• What is the need of Physical Security?
• Company Surroundings & Premises
• Reception
• Wireless Access Points
• Security of Other Equipment
• Wiretapping, Remote Access & Spying

Penetration Testing

• Penetration Testing
• Penetration Testing Methodology
• Open Source vs Proprietary Methodologies
• Starting Point and Ending Points of
Testing
• Selecting the Right Tools
• Penetration Testing Tools
• Gathering Network Information
• Different Types of Threats
• More Tools
• Demo - Nessus Security Analyzer
• Reports and Logs
• Ethical Hacker Course Closure

…a better way to learn


Further Information For course details and further information please visit our website www.clickstart.com.au or contact us by e-mail courses@clickstart.com.au or by phone on 1 300 73 73 74.

You might also like