Certified Ethical Hacker v9 Training


Certified Ethical Hacker v9 Training, Singapore SKillsFuture elarning online course

Course Description

CEH v9 Training readies students for EC-Council's CEH certificate exam which is paramount for any IT specialist and anyone trying to enhance their network's defenses. With top experts and an interactive, lab-filled environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system. This course prepares students for the EC-Council Certified Ethical Hacker v9 exam.


Course Objectives

Footprinting
Network Scanning
Enumeration
Packet Sniffing
Social Engineering
DoS/DDoS
Session Hijacking
Webserver And Web Application Attacks And Countermeasures
SQL Injection Attacks
Wireless Encryption
Cloud Computing Threats
Cryptography Ciphers
Penetration Testing


Related Courses

  • Certified Cyber Threat Intelligence Analyst

    Certified Cyber Threat Intelligence Analyst

    SGD $299.00

    Course Description

    The Cyber Security Threat Intelligence Researcher Certification will help you acquire the skills needed to find out who is behind an attack, what the specific threat group is, the nation from which the attack is being launched, as well as techniques being used to launch this attack. You will know how to take a small piece of malware, find out who is responsible for launching it, the threat actor location and also how to take down that threat actor, with the support of your local law enforcement. In today’s cyber security landscape, it isn't possible to prevent every attacks. Today’s attackers have significant funding, are patient, sophisticated, and target vulnerabilities in people and processes as well as technologies. With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. As a result, every company’s day-to-day operations, data and intellectual property are seriously at risk. In a corporate context, a cyber attack can not only damage your brand and reputation, it can also result in loss of competitive advantage, create legal/regulatory noncompliance and cause steep financial damage. Today’s secure environment will have vulnerabilities in it tomorrow, so an organization cannot allow itself to become complacent. There is only so much an organization can do by defending itself against threats that have already occurred. If an organization only reacts to new threats as they come up, are likely acting too late. It is important to understand and prioritize cyber threat intelligence processes, and how they can be integrated into an organization’s security operations in a way that adds value.  Cyber threat intelligence (CTI) is an advanced process enabling organizations to gather valuable insights based on analysis of contextual and situational risks. These processes can be tailored to the organization’s specific threat landscape, industry and market. This intelligence can make a significant difference to organizations' abilities to anticipate breaches before they occur. Giving organizations the ability to respond quickly, decisively and effectively to confirmed breaches allows them to proactively maneuver defense mechanisms into place, prior to and during the attack. In this course, we’ll introduce you to the 8 phases of threat intelligence: Hunting - The goal of hunting is to establish techniques to collect samples from different sources that help to start profiling malicious threat actors. Features Extraction - The goal of Features Extraction is to identify unique Static features in the binaries that help to classify them into a specific malicious group. Behavior Extraction - The goal of Behavior Extraction is to identify unique Dynamic features in the binaries that help to classify them into a specific malicious group. Clustering and Correlation -  The goal of Clustering and Correlation is to classify malware based on Features and Behavior extracted and correlate the information to understand the attack flow. Threat Actor Attribution - The goal of Threat Actors is to locate the threat actors behind the malicious clusters identified. Tracking - The goal of tracking is to anticipate new attacks and identify new variants proactively. Taking Down - The goal of Taking down is to Dismantled Organized Crime Operations

    Read more...

  • Certified Security Analyst Training

    Certified Security Analyst Training

    SGD $299.00

    Course Description

    The Certified Security Analyst Training course prepares students for gaining practical experience with conducting realistic penetration tests. Thought by top experts in the field, students learn advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information security penetration tests.  Students gain practical experience with the Licensed Penetration Tester in order to perform the intensive assessments required to effectively identify and mitigate risks to an infrastructure's security. Students not only learn to identify information security problems in this course, but also how to avoid and eliminate them with complete coverage of analysis and network security testing methods and tools.

    Read more...

  • Certified Ethical Hacker Bootcamp

    Certified Ethical Hacker Bootcamp

    SGD $299.00

    Course Description

    Penetration Testing and Ethical Hacker Bootcamp This bootcamp prepares aspiring and current security professionals for industry certification exams and interviews to enhance their careers. With top experts and an interactive environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. This bootcamp was designed for those who wish to take an immersive look at the various in-demand security professional careers. You'll examine not just the theories and tools a professional hacker would use when conducting a penetration test, but also gain an insight into the day to day workflow of an ethical hacker. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system

    Read more...


Content

CEH - Introduction to Ethical Hacking

+

CEH v9 Course Overview

Information Security Overview Part 1

Information Security Overview Part 2

Information Security Overview Part 3

Information Security Overview Part 4

Information Security Threats and Attack Vectors Part 1

Information Security Threats and Attack Vectors Part 2

Information Security Threats and Attack Vectors Part 3

Hacking Concepts, Types, and Phases Part 1

Hacking Concepts, Types, and Phases Part 2

Hacking Concepts, Types, and Phases Part 3

Ethical Hacking Concepts and Scope

Information Security Controls Part 1

Information Security Controls Part 2

Information Security Controls Part 3

Information Security Controls Part 4

Information Security Controls Part 5

Information Security Controls Part 6

Information Security Controls Part 7

Information Security Controls Part 8

Information Security Controls Part 9

Information Security Controls Part 10

Information Security Controls Part 11

Information Security Controls Part 12

Information Security Controls Part 13

Information Security Controls Part 14

Information Security Laws and Standards Part 1

Information Security Laws and Standards Part 2

CEH - Footprinting and Reconnaissance

+

Footprinting Concepts

Footprinting Methodology Part 1

Footprinting Methodology Part 2

Footprinting Methodology Part 3

Footprinting Methodology Part 4

Footprinting Methodology Part 5

Footprinting Methodology Part 6

Footprinting Tools & Countermeasures

Footprinting Penetration Testing

LAB: Open source information gathering using windows command line utilities

LAB: Gathering personal information using online people search services

LAB: Collecting information about a target website using firebug

LAB: Extracting a company’s data using web data extractor

LAB: Mirroring website using httrack web site copier

LAB: Collecting information about a target by using tracing emails

LAB: Gathering IP and domain name information using whois lookup

LAB: Advanced network route tracing using path analyzer pro

LAB: footprinting a target using maltego

LAB: Performing automated network reconnaissance using recon-ng

LAB: Using the open-souce reconnaissance tool recon-ng to gather personal information

LAB: Collecting information from social networking sites using recon-ng pushpin

LAB: Automated footprinting of an organization using foca

LAB: Identifying Vulnerablities & Information Disclosure in Search Engines using SiteDigger

CEH - Scanning Networks

+

Banner Grabbing and Vulnerability Scanning

Draw Network Diagram and Preparing Proxies Part 1

Draw Network Diagram and Preparing Proxies Part 2

Draw Network Diagram and Preparing Proxies Part 3

Scanning Pen Testing

LAB: UDP and TCP packet crafting techniques using hping3

LAB: Scanning the network using the colasoft packet builder

LAB: Basic network troubleshooting using megaping

LAB: Understanding network scanning using nmap

LAB: Exploring various network scanning techniques

LAB: Scanning a network using netscan tools pro

LAB: Avoiding scanning detection using multiple decoy IP addresses

LAB: Vulnerability analysis using nessus

LAB: Scanning for network vulnerabilities using the gfi languard

LAB: Drawing network diagrams using network topology mapper

LAB: Scanning devices in a network using the dude

LAB: Daisy Chaining using TOR

LAB: Anonymous browsing using Proxy Switcher

LAB: Anonymous Browsing using ULTRASURF

Scanning Networks

Checking for Live Systems Part 1

Checking for Live Systems Part 2

Checking for Live Systems Part 3

Checking for Live Systems Part 4

Checking for Live Systems Part 5

Port Scanning Countermeasures & Scanning Beyond IDS

Scanning Beyond IDS

CEH - Enumeration

+

Enumeration Concept & NetBIOS Enumeration

NetBIOS Enumeration and SNMP Enumeration

SNMP Enumeration and LDAP Enumeration

LDAP Enumeration, NTP Enumeration, SMTP/DNS Enumeration, and Enumeration Countermeasures

Enumeration Countermeasures and Enumeration Pen Testing

LAB: NETBIOS enumeration using global network inventory

LAB: Enumerating network resources using advanced ip scanner

LAB: Performing network enumeration using superscan

LAB: Enumerating resources in a local machine using hyena

LAB: Performing network enumeration using netbios enumerator

LAB: Enumerating a network using softperfect network scanner

LAB: Enumerating a target network using nmap and net use

LAB: Enumerating services on a target machine

LAB: SNMP enumeration using snmpcheck

LAB: Testing of SNMP Enumeration by using Paessler SNMP Tester

LAB: Performing network enumeration using various DNS interrogation tools

Introduction to Malware

Trojan Concepts Part 1

Trojan Concepts Part 2

Trojan Concepts Part 3

Trojan Concepts Part 4

Trojan Concepts Part 5

Trojan Concepts Part 6

Virus and Worm Concepts Part 1

Virus and Worm Concepts Part 2

Virus and Worm Concepts Part 3

Virus and Worm Concepts Part 4

Virus and Worm Concepts Part 5

Virus and Worm Concepts Part 6

Virus and Worm Concepts Part 7

Virus and Worm Concepts Part 8

CEH - Malware Threats

+

Malware Detection Part 1

Malware Detection Part 2

Malware Detection Part 3

Malware Detection Part 4

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Anti-malware Software

Penetration Testing Part 1

Penetration Testing Part 2

LAB: Monitoring TCP/IP Connections Using the CurrPorts
LAB: Creating a trojan server using theef
LAB: Creating an HTTP Trojan and Remote Controlling a Target Machine by using HTTP RAT
LAB: Creating a virus using the jps virus maker tool
LAB: Creating a worm using internet worm maker thing

LAB: Virus analysis using virus total

LAB: Virus analysis using ollydbg

LAB: Detecting trojans

CEH - Sniffing

+

Sniffing Concepts Part 1

Sniffing Concepts Part 2

Sniffing Concepts Part 3

Sniffing Concepts and MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack Part 1

Spoofing Attack Part 2

DNS Poisoning Part 1

DNS Poisoning Part 2

Sniffing Tools Part 1

Sniffing Tools Part 2

Sniffing Tools and Countermeasures

Sniffing Detection Techniques and Sniffing Pen Testing

LAB: Sniffing passwords using wireshark

LAB: Analyzing a network using capsa network analyzer

LAB: Sniffing the network using omnipeek network analyzer

LAB: Spoofing mac address using smac

LAB: Performing mitm attack using cain and abel

LAB: Detecting ARP poisoning in a switch based network

LAB: Detecting ARP attacks with xarp tool

LAB: Performing DNS poisoning in a switch based network

CEH - Social Engineering

+

Social Engineering

Social Engineering Concepts & Social Engineering Techniques

Social Engineering Techniques Part 1

Social Engineering Techniques Part 2

Social Engineering Techniques & Impersonation on Social Networking Sites

Impersonation on Social Networking Sites & Identity theft

Social Engineering Countermeasures

Social Engineering Penetration Testing

LAB: Detecting phishing using netcraft

LAB: Detecting phishing using phishtank

LAB: Anti Phishing by using PHISH DETECTOR

LAB: Creating a malicious payload using set and exploiting a windows machine

CEH - Denial of Service

+

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 1

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 2

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 3

Botnets Part 1

Botnets Part 2

Botnets Part 3

DoS/DDoS Attack Tools and Counter Measures Part 1

DoS/DDoS Attack Tools and Counter Measures Part 2

DoS/DDoS Attack Tools and Counter Measures Part 3

DoS/DDoS Protection Tools & DoS/DDoS Penetration Testing

LAB: SYN flooding a target host using metasploit

LAB: SYN flooding a target host using hping3

LAB: HTTP flooding using DOSHTTP

LAB: Implementing dos attack on a router using slowloris script

LAB: Performing DDOS using High Orbit Ion Cannon

LAB: Detecting and analyzing dos attack traffic using kfsensor and wireshark

CEH - System Hacking

+

System Hacking Intro

Cracking Passwords Part 1

Cracking Passwords Part 2

Cracking Passwords Part 3

Cracking Passwords Part 4

Cracking Passwords Part 5

Cracking Passwords Part 6

Escalating Privileges

Executing Applications Part 1

Executing Applications Part 2

Hiding Files Part 1

Hiding Files Part 2

Hiding Files Part 3

Hiding Files Part 4

Covering Tracks

LAB: Dumping and cracking sam hashes to extract plaintext passwords
LAB: Creating and using rainbow tables

LAB: Auditing system passwords using lophtcrack

LAB: Exploiting client side vulnerabilities and establishing a vnc session

LAB: Escalating privileges by exploiting client side vulnerabilities

LAB: Exploiting freesshd vulnerability and gaining access to a target system

LAB: Hacking windows using metasploit and post exploitation using meterpreter

LAB: System monitoring using remoteexec

LAB: User system monitoring and surveillance using spytech spyagent

LAB: Web Activity Monitoring and Recording Using Power Spy

LAB: Hiding files using ntfs streams

LAB: Find hidden files using ads spy

LAB: Image steganography using openstego

LAB: Image steganography using quickstego

LAB: Viewing, enabling and clearing audit policies using auditpol

CEH - Session Hijacking

+

Session Hijacking Part 1

Session Hijacking Part 2

Session Hijacking Part 3

Session Hijacking Part 4

Session Hijacking Part 5

Session Hijacking Part 6

LAB: Session Hijacking using the Zed Attack Proxy (ZAP)

LAB: Sniffing Web Cookies by using Web Cookie Sniffer

LAB: Cookie Hijacking by using Paros HTTP session Hijacking Tool

LAB: Parameter Tampering to change the session by using Burpsuite

CEH - Hacking Webservers

+

Webserver Concepts & Webserver Attacks Part 1

Webserver Attacks Part 2

Webserver Attacks Part 3

Attack Methodology

Webserver Attack Tools

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Patch Management & Webserver Security Tools

Webserver Security Tools & Webserver Pen Testing

LAB: Enumerating Web Server Information by using NMAP

LAB: foot printing a webserver using the httprecon tool

LAB: foot printing a webserver using id serve

LAB: Exploiting Java vulnerability using metasploit framework

LAB: Hacking FTP Server in the Local Network

CEH - Hacking Web Applications

+

Hacking Web Applications Part 1

Hacking Web Applications Part 2

Hacking Web Applications Part 3

Hacking Web Applications Part 4

Hacking Web Applications Part 5

Hacking Web Applications Part 6

Hacking Web Applications Part 7

Hacking Web Applications Part 8

Hacking Web Applications Part 9

Hacking Web Applications Part 10

Hacking Web Applications Part 11

Hacking Web Applications Part 12

Hacking Web Applications Part 13

Hacking Web Applications Part 14

Hacking Web Applications Part 15

Hacking Web Applications Part 16

Hacking Web Applications Part 17

Hacking Web Applications Part 18

Hacking Web Applications Part 19

LAB: Website vulnerability scanning using Acunetix web vulnerability scanner

LAB: Hack E-commerce website by using Burpsuite on Kali Linux

LAB: Web vulnerability scanning by using Nikto on Kali Linux

LAB: Auditing Web Application Framework by using W3af

CEH - SQL Injection

+

SQL Injection Part 1

SQL Injection Part 2

SQL Injection Part 3

SQL Injection Part 4

SQL Injection Part 5

SQL Injection Part 6

SQL Injection Part 7

SQL Injection Part 8

SQL Injection Part 9

SQL Injection Part 10

SQL Injection Part 11

SQL Injection Part 12

SQL Injection Part 13

SQL Injection Part 14

SQL Injection Part 15

SQL Injection Part 16

SQL Injection Part 17

SQL Injection Part 18

SQL Injection Part 19

SQL Injection Part 20

SQL Injection Part 21

SQL Injection Part 22

SQL Injection Part 23

LAB: SQL injection Attack on Database by using HAVIJ

LAB: Testing for SQL Injection by using IBM Security APPScan Tool

LAB: Testing for SQL injection using webcruiser tool

LAB: Scanning web applications using n-stalker tool

CEH - Hacking Wireless Networks

+

Hacking Wireless Networks Part 1

Hacking Wireless Networks Part 2

Hacking Wireless Networks Part 3

Hacking Wireless Networks Part 4

Hacking Wireless Networks Part 5

Hacking Wireless Networks Part 6

Hacking Wireless Networks Part 7

Hacking Wireless Networks Part 8

Hacking Wireless Networks Part 9

Hacking Wireless Networks Part 10

Hacking Wireless Networks Part 11

Hacking Wireless Networks Part 12

Hacking Wireless Networks Part 13

Hacking Wireless Networks Part 14

Hacking Wireless Networks Part 15

Hacking Wireless Networks Part 16

Hacking Wireless Networks Part 17

Hacking Wireless Networks Part 18

LAB: Wi-Fi packet sniffing using airpcap with wireshark

LAB Identifying vulnerabilities and information disclosure in search engines using searchdiggity

LAB: Cracking a WEP network

CEH - Hacking Mobile Platforms

+
LAB: Mobile vulnerability scanning by using HeartBleed security scanner on Android
LAB: Network Port scanning by using NetScan on Android
LAB: Using Mobile Platform to Enforce a DOS Attack on a Website

LAB: Securing Android devices from malicious applications

Hacking Mobile Platforms Part 1

Hacking Mobile Platforms Part 2

Hacking Mobile Platforms Part 3

Hacking Mobile Platforms Part 4

Hacking Mobile Platforms Part 5

Hacking Mobile Platforms Part 6

Hacking Mobile Platforms Part 7

Hacking Mobile Platforms Part 8

Hacking Mobile Platforms Part 9

Hacking Mobile Platforms Part 10

Hacking Mobile Platforms Part 11

Hacking Mobile Platforms Part 12

CEH - Evading IDS, Firewalls, and Honeypots

+

Evading IDS, Firewalls, and Honeypots Part 1

Evading IDS, Firewalls, and Honeypots Part 2

Evading IDS, Firewalls, and Honeypots Part 3

Evading IDS, Firewalls, and Honeypots Part 4

Evading IDS, Firewalls, and Honeypots Part 5

Evading IDS, Firewalls, and Honeypots Part 6

Evading IDS, Firewalls, and Honeypots Part 7

Evading IDS, Firewalls, and Honeypots Part 8

Evading IDS, Firewalls, and Honeypots Part 9

Evading IDS, Firewalls, and Honeypots Part 10

LAB: Detecting intrusions by using Snort on Windows

LAB: Detecting malicious network traffic using honeybot

LAB: Detecting intruders and worms using kfsensor honeypot IDS

LAB: Bypassing firewall rules using HTTP/FTP tunneling

CEH - Cloud Computing

+

Cloud Computing Part 1

Cloud Computing Part 2

Cloud Computing Part 3

Cloud Computing Part 4

Cloud Computing Part 5

Cloud Computing Part 6

Cloud Computing Part 7

Cloud Computing Part 8

Cloud Computing Part 9

Cloud Computing Part 10

Cloud Computing Part 11

Cloud Computing Part 12

Cloud Computing Part 13

LAB: Building a cloud using owncloud and wampserver

LAB: Transferring cloud data over secure channel

LAB: Performing Cloud Vulnerability Assessment using Mobile based security scanner Zanti

CEH - Cryptography

+

Cryptography Part 1

Cryptography Part 2

Cryptography Part 3

Cryptography Part 4

Cryptography Part 5

Cryptography Part 6

Cryptography Part 7

Cryptography Part 8

Cryptography Part 9

LAB: Calculating MD5 hashes and verifying file integrity using quick checksum verifier

LAB: Calculating one way hashes using hashcalc

LAB: Calculating MD5 hashes using MD5 calculator

LAB: Understanding file and text encryption using cryptoforge

LAB: Basic data encryption using advanced encryption package

LAB: Encrypting and decrypting the data using bctextencoder

LAB: Creating and using self-signed certificate

LAB: Basic disk encryption using veracrypt
LAB: Basic data encrypting using rohos disk encryption
SkillsFuture Credit Eligible
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.