Passing the Certified Ethical Hacker exam fulfills an important the mission. Our program supports that effort and more. Candidates can become powerful ethical penetration testers who succeed because they learn to think like an adversary. Our CEH course prepares candidates for the EC-Council Certified Ethical Hacker v.8 exam. This certification fulfills multiple DOD8570 Computer Network Defense [CND] requirements. Our hands-on course offers the best books, reference materials, and Expanding Security’s unparalleled customized labs which navigate through the endless tools to the critical, useful tools. Our customized presentations and interactions insure a successful exam experience with built-in quizzing. Our course equips the candidate for effective system penetration testing long after they pass the exam.
We offer any delivery format. For example, one weekend with pre-class prepwork, or a 2-week intensive with lecture and lab 4 hours before or after work, or a 10-week Live Online class. Tell us what your goals are: We get it done. For everyone who has followed our plan, they have passed.
This hands-on class uses both Backtrack 5R3 and the OWASP WTE with three levels of labs: You may be great at Windows hacking, she is great at databases, he is great at something you have never heard of before. Our labs are designed to push the candidate forward to their next level.
You get what no one else gives: Our template for a world class penetration testing setup. We build a robust attack lab with three attackers, one listener, and three victims. Having a system that just sits there with no client server activity is crap; you might as well hack a punching bag. Our way, you do the pen test like you would if it were on live systems. But we protect your live enterprise by working in a virtual enclosed bubble. The mission is more than the exam or the class.
Course Author, Lead Instructor and Certified ECCouncil Instructor: Dean Bushmiller 44 three 86 five 326 five…with Freedom, Responsibility, and Security for All. Yes- you can call him!
Our hands-0n, lab intensive classes at Expanding Security for this important cert incorporates the EC Council official outline; the EC Council official course book, with Expanding Security’s customized labs and customized live presentations to insure not only a successful exam experience, but our courses equip the candidate for confident and effective system penetration testing.
Our live online CEH classes offer the best opportunity to practice your labs in a safe environment, engaging and pointed discussion, presentations, quizzes, all laid out on a step by step live interaction designed by the lead instructor who has more than 15 security certifications and more than 12 years in the information security industry, including pen testing and risk assessment. Under our instructions, everything you need for an ethical approach to pen testing and security is available. We put all the necessary tools at your fingertips and make it easy.
Our face to face CEH instruction is done at your location on your timeframe. We offer what no one else does: 14 days where we hold classes and labs half days so candidates are still available to run business ops. Labs are essential and ours are the best available for getting the experience you need to be successful and effective.
In our CEH course, we cover hacking and pen testing essentials including: Policy Check, Virus Creation, Intrusion Detection, Social Engineering, DDoS Attacks, and Buffer Overflows.This class covers what you need to know to be a pen tester based on all the current knowledge and techniques available including the EC Council’s CEH.
This class covers what you need to know to be a CEH and pen tester based on all the current knowledge and techniques available including the EC Council’s CEH.
Expanding Security offers CEH study tools, online class, and face to face Boot Camp. Email course author and CEH certified instructor: email@example.com
Email logistics and scheduling questions: firstname.lastname@example.org.
These are the topics covered in the Expanding Security Course CEH v.7:
Introduction to Ethical Hacking: how and why.
Hacking Laws: Cyber Laws around the globe like SPY ACT, U.S. Federal Laws, United Kingdom’s Cyber Laws, European Laws, Japan’s Cyber Laws, Australia Cybercrime Act 2001, and Indian Law: The Information Technology Act, Germany’s Cyber Laws, Singapore’s Cyber Laws, Belgium Law, Brazilian Law, Canadian Laws, France Laws and Italian Laws.
Footprinting: defend resources in a proactively. Readers must possess programming skills and be familiar with various technical environments.
Google Hacking: how an attacker gathers critical information through Google search field.
Scanning: not limited to intrusion; reconnaissance is used on services run on the systems and configuration lapses.
Enumeration: countermeasures suggested here are proposed in the light of the generic approach of hackers toward a system.
System Hacking: various methods of password cracking, password attacks, various types of password cracking tools, privilege escalating, role of key loggers and other spy ware that the attackers use for hiding files and methods for erasing evidences.
Trojans and Backdoors: dealing with malicious code in the form of Trojans and backdoors, effect on Business, Types, and ports they use, avoid a Trojan infection.
Viruses and Worms: function; classification and the manner in which it affects systems, countermeasures.
Sniffers: concepts and its use in hacking activities, tools and techniques used in securing the network from anomalous traffic.
Social Engineering: there is no one defense against social engineering.
Phishing and Identity Theft: various phishing attacks and tools to prevent them.
Denial-of-Service: real world scenarios highlight the implications of such attacks.
Look at countermeasures, viruses and worms and their use in such attacks.
Session Hijacking: spoofing methods, three-way TCP handshake, man-in-the-middle attacks, various tools and countermeasures.
Hacking Web Servers: security concerns in a vast domain, the importance of various mailing lists such as Bugtraq and security bulletins by third party vendors.
Web Application Vulnerabilities: attacks exploiting vulnerabilities, various hacking tools, countermeasures.
Web-Based Password Cracking Techniques: authentication methods and how they are compromised.
SQL Injection: attack methodology, Scripts, SQL Injection in Oracle, SQL Injection in MySQL, prevention, countermeasures.
Hacking Wireless Networks: detection tools, business implications of wireless hacks, and how to protect a wireless network such as the WIDZ and RADIUS model against wireless attacks
Multiple Operating Systems for attack and defense
Evading IDS, Firewalls and Detecting Honey Pots: Common hacking and computer system attacks; Intrusion Detection Systems (IDS), Firewalls and Honeypots.
Buffer Overflows: Buffer overflow attacks and different aspects of buffer overflow exploits.
Cryptography: use of cryptography over the Internet; the effort required to crack encryption techniques, attacker methodologies. Encryption must be combined with good security policies and practices.
Penetration Testing: the paradox of pen testing is that the inability to breach a target does not necessarily indicate the absence of vulnerability. The tester must reduce the area of attack as much as possible. Look at a pen test: guideline only.
Assembly Language Tutorial
Windows Based Buffer Overflow Exploit Writing
VoIP Hacking: Denial of Service attack, Replay Attack, ARP Spoofing Attack, H.323-Specific Attack, SIP Attacks.
Spamming: methods, anti-spam techniques, service ISPs and the top spamming countries.
Hacking Database Servers: security issues and types of Database attacks.
Cyber Warfare- Hacking, Al-Qaida and Terrorism: Cyber terrorism, Cyber crime and criminal impacts, common forms such as Distributed Denial of Service attacks, hate websites and hate emails, attacks on sensitive computer networks.
Internet Content Filtering Techniques: tools to filter Internet content, safety guidelines for children.
Privacy on Internet- Anonymous: Internet privacy tools, proxy, email privacy, cookies, IRC, web browsers, electronic commerce, and web bugs, anonymizer tools, protecting search privacy and tips for online privacy.
Proxy Server Technologies: role, types, technologies.
Computer Forensics and Incident Handling: incident handling methodology to capture, process and investigate data from computers so the evidence is acceptable in a Court of Law.”
Firewall Technologies: vendors providing firewall technologies.
Expanding Security offers CEH study tools, online class, and face to face Boot Camps. If you need a 5-day Boot Camp, please email or call the office with your parameters.
CEH Quizzer available now on Iphone Ipad; videos available soon.