Certified Ethical Hacker v9 Training


Certified Ethical Hacker v9 Training, Singapore elarning online course

Course Description

CEH v9 Training readies students for EC-Council's CEH certificate exam which is paramount for any IT specialist and anyone trying to enhance their network's defenses. With top experts and an interactive, lab-filled environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system. This course prepares students for the EC-Council Certified Ethical Hacker v9 exam.


Course Objectives

Footprinting
Network Scanning
Enumeration
Packet Sniffing
Social Engineering
DoS/DDoS
Session Hijacking
Webserver And Web Application Attacks And Countermeasures
SQL Injection Attacks
Wireless Encryption
Cloud Computing Threats
Cryptography Ciphers
Penetration Testing


Related Courses

  • Become a High Earning Cloud Architect

    Become a High Earning Cloud Architect

    SGD $20.00

    Course Description

    The demand for Cloud Architects is very high and you as a technical guru can take advantage of this. If your currently a Solutions Architect, System Administrator or Developer this course is a great transition. As your well credentialed instructor I will be working with you for over 10 hours going through what a Cloud Architect needs to know. We will cover the basics of cloud, then we will cover cloud frameworks, cloud ecosystems, cloud migrations, cloud analysis, etc. This is a vendor neutral course where you will learn the basics but i will apply the fundamentals to the three major providers so you can take this knowledge and run. We will touch on Google Cloud, Amazon Web Services and MS Azure for IaaS/PaaS. Salesforce and Servicenow for SaaS as well as O365 briefly. Lastly, I will go through what you need to look for in a Cloud role and the best resources for finding a new job or gig. The materials are based on the The Professional Cloud Solutions Architect certification which equips solution architects with insights and familiarity with the topology and ecosystems that are being created as a result of cloud technology adoption and operating models. These materials are Vendor neutral.

    Read more...

  • Certified Cyber Threat Intelligence Analyst

    Certified Cyber Threat Intelligence Analyst

    SGD $299.00

    Course Description

    The Cyber Security Threat Intelligence Researcher Certification will help you acquire the skills needed to find out who is behind an attack, what the specific threat group is, the nation from which the attack is being launched, as well as techniques being used to launch this attack. You will know how to take a small piece of malware, find out who is responsible for launching it, the threat actor location and also how to take down that threat actor, with the support of your local law enforcement. In today’s cyber security landscape, it isn't possible to prevent every attacks. Today’s attackers have significant funding, are patient, sophisticated, and target vulnerabilities in people and processes as well as technologies. With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. As a result, every company’s day-to-day operations, data and intellectual property are seriously at risk. In a corporate context, a cyber attack can not only damage your brand and reputation, it can also result in loss of competitive advantage, create legal/regulatory noncompliance and cause steep financial damage. Today’s secure environment will have vulnerabilities in it tomorrow, so an organization cannot allow itself to become complacent. There is only so much an organization can do by defending itself against threats that have already occurred. If an organization only reacts to new threats as they come up, are likely acting too late. It is important to understand and prioritize cyber threat intelligence processes, and how they can be integrated into an organization’s security operations in a way that adds value.  Cyber threat intelligence (CTI) is an advanced process enabling organizations to gather valuable insights based on analysis of contextual and situational risks. These processes can be tailored to the organization’s specific threat landscape, industry and market. This intelligence can make a significant difference to organizations' abilities to anticipate breaches before they occur. Giving organizations the ability to respond quickly, decisively and effectively to confirmed breaches allows them to proactively maneuver defense mechanisms into place, prior to and during the attack. In this course, we’ll introduce you to the 8 phases of threat intelligence: Hunting - The goal of hunting is to establish techniques to collect samples from different sources that help to start profiling malicious threat actors. Features Extraction - The goal of Features Extraction is to identify unique Static features in the binaries that help to classify them into a specific malicious group. Behavior Extraction - The goal of Behavior Extraction is to identify unique Dynamic features in the binaries that help to classify them into a specific malicious group. Clustering and Correlation -  The goal of Clustering and Correlation is to classify malware based on Features and Behavior extracted and correlate the information to understand the attack flow. Threat Actor Attribution - The goal of Threat Actors is to locate the threat actors behind the malicious clusters identified. Tracking - The goal of tracking is to anticipate new attacks and identify new variants proactively. Taking Down - The goal of Taking down is to Dismantled Organized Crime Operations

    Read more...

  • Intro to Blockchain Technology, Blockchain Security  and R3 Corda

    Intro to Blockchain Technology, Blockchain Security and R3 Corda

    SGD $29.00

    Course Description

    This course will help you identify and differentiate between security threats and attacks on a Blockchain network. Blockchain security methods, best practices, risk mitigation, and all known (to date) cyber-attack vectors on the Blockchain will be covered. You will also learn how to perform a Blockchain network security risk analysis and glean a complete understanding of Blockchain's inherent security features and risks. You will learn the key aspects around Blockchain and Bitcoin, including: What is a blockchain? What is Bitcoin? What are smart contracts? What is a cryptocurrency? What are digital tokens? How blockchain and Bitcoin are related and why it is so important to know the relationship. Some common misconceptions about blockchain and Bitcoin. R3 Corda Blockchain is an enterprise blockchain distributed ledger. A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platform  

    Read more...


Content

CEH - Introduction to Ethical Hacking

+

CEH v9 Course Overview

Information Security Overview Part 1

Information Security Overview Part 2

Information Security Overview Part 3

Information Security Overview Part 4

Information Security Threats and Attack Vectors Part 1

Information Security Threats and Attack Vectors Part 2

Information Security Threats and Attack Vectors Part 3

Hacking Concepts, Types, and Phases Part 1

Hacking Concepts, Types, and Phases Part 2

Hacking Concepts, Types, and Phases Part 3

Ethical Hacking Concepts and Scope

Information Security Controls Part 1

Information Security Controls Part 2

Information Security Controls Part 3

Information Security Controls Part 4

Information Security Controls Part 5

Information Security Controls Part 6

Information Security Controls Part 7

Information Security Controls Part 8

Information Security Controls Part 9

Information Security Controls Part 10

Information Security Controls Part 11

Information Security Controls Part 12

Information Security Controls Part 13

Information Security Controls Part 14

Information Security Laws and Standards Part 1

Information Security Laws and Standards Part 2

CEH - Footprinting and Reconnaissance

+

Footprinting Concepts

Footprinting Methodology Part 1

Footprinting Methodology Part 2

Footprinting Methodology Part 3

Footprinting Methodology Part 4

Footprinting Methodology Part 5

Footprinting Methodology Part 6

Footprinting Tools & Countermeasures

Footprinting Penetration Testing

LAB: Open source information gathering using windows command line utilities

LAB: Gathering personal information using online people search services

LAB: Collecting information about a target website using firebug

LAB: Extracting a company’s data using web data extractor

LAB: Mirroring website using httrack web site copier

LAB: Collecting information about a target by using tracing emails

LAB: Gathering IP and domain name information using whois lookup

LAB: Advanced network route tracing using path analyzer pro

LAB: footprinting a target using maltego

LAB: Performing automated network reconnaissance using recon-ng

LAB: Using the open-souce reconnaissance tool recon-ng to gather personal information

LAB: Collecting information from social networking sites using recon-ng pushpin

LAB: Automated footprinting of an organization using foca

LAB: Identifying Vulnerablities & Information Disclosure in Search Engines using SiteDigger

CEH - Scanning Networks

+

Banner Grabbing and Vulnerability Scanning

Draw Network Diagram and Preparing Proxies Part 1

Draw Network Diagram and Preparing Proxies Part 2

Draw Network Diagram and Preparing Proxies Part 3

Scanning Pen Testing

LAB: UDP and TCP packet crafting techniques using hping3

LAB: Scanning the network using the colasoft packet builder

LAB: Basic network troubleshooting using megaping

LAB: Understanding network scanning using nmap

LAB: Exploring various network scanning techniques

LAB: Scanning a network using netscan tools pro

LAB: Avoiding scanning detection using multiple decoy IP addresses

LAB: Vulnerability analysis using nessus

LAB: Scanning for network vulnerabilities using the gfi languard

LAB: Drawing network diagrams using network topology mapper

LAB: Scanning devices in a network using the dude

LAB: Daisy Chaining using TOR

LAB: Anonymous browsing using Proxy Switcher

LAB: Anonymous Browsing using ULTRASURF

Scanning Networks

Checking for Live Systems Part 1

Checking for Live Systems Part 2

Checking for Live Systems Part 3

Checking for Live Systems Part 4

Checking for Live Systems Part 5

Port Scanning Countermeasures & Scanning Beyond IDS

Scanning Beyond IDS

CEH - Enumeration

+

Enumeration Concept & NetBIOS Enumeration

NetBIOS Enumeration and SNMP Enumeration

SNMP Enumeration and LDAP Enumeration

LDAP Enumeration, NTP Enumeration, SMTP/DNS Enumeration, and Enumeration Countermeasures

Enumeration Countermeasures and Enumeration Pen Testing

LAB: NETBIOS enumeration using global network inventory

LAB: Enumerating network resources using advanced ip scanner

LAB: Performing network enumeration using superscan

LAB: Enumerating resources in a local machine using hyena

LAB: Performing network enumeration using netbios enumerator

LAB: Enumerating a network using softperfect network scanner

LAB: Enumerating a target network using nmap and net use

LAB: Enumerating services on a target machine

LAB: SNMP enumeration using snmpcheck

LAB: Testing of SNMP Enumeration by using Paessler SNMP Tester

LAB: Performing network enumeration using various DNS interrogation tools

Introduction to Malware

Trojan Concepts Part 1

Trojan Concepts Part 2

Trojan Concepts Part 3

Trojan Concepts Part 4

Trojan Concepts Part 5

Trojan Concepts Part 6

Virus and Worm Concepts Part 1

Virus and Worm Concepts Part 2

Virus and Worm Concepts Part 3

Virus and Worm Concepts Part 4

Virus and Worm Concepts Part 5

Virus and Worm Concepts Part 6

Virus and Worm Concepts Part 7

Virus and Worm Concepts Part 8

CEH - Malware Threats

+

Malware Detection Part 1

Malware Detection Part 2

Malware Detection Part 3

Malware Detection Part 4

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Anti-malware Software

Penetration Testing Part 1

Penetration Testing Part 2

LAB: Virus analysis using virus total

LAB: Virus analysis using ollydbg

LAB: Detecting trojans

CEH - Sniffing

+

Sniffing Concepts Part 1

Sniffing Concepts Part 2

Sniffing Concepts Part 3

Sniffing Concepts and MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack Part 1

Spoofing Attack Part 2

DNS Poisoning Part 1

DNS Poisoning Part 2

Sniffing Tools Part 1

Sniffing Tools Part 2

Sniffing Tools and Countermeasures

Sniffing Detection Techniques and Sniffing Pen Testing

LAB: Sniffing passwords using wireshark

LAB: Analyzing a network using capsa network analyzer

LAB: Sniffing the network using omnipeek network analyzer

LAB: Spoofing mac address using smac

LAB: Performing mitm attack using cain and abel

LAB: Detecting ARP poisoning in a switch based network

LAB: Detecting ARP attacks with xarp tool

LAB: Performing DNS poisoning in a switch based network

CEH - Social Engineering

+

Social Engineering

Social Engineering Concepts & Social Engineering Techniques

Social Engineering Techniques Part 1

Social Engineering Techniques Part 2

Social Engineering Techniques & Impersonation on Social Networking Sites

Impersonation on Social Networking Sites & Identity theft

Social Engineering Countermeasures

Social Engineering Penetration Testing

LAB: Detecting phishing using netcraft

LAB: Detecting phishing using phishtank

LAB: Creating a malicious payload using set and exploiting a windows machine

CEH - Denial of Service

+

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 1

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 2

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 3

Botnets Part 1

Botnets Part 2

Botnets Part 3

DoS/DDoS Attack Tools and Counter Measures Part 1

DoS/DDoS Attack Tools and Counter Measures Part 2

DoS/DDoS Attack Tools and Counter Measures Part 3

DoS/DDoS Protection Tools & DoS/DDoS Penetration Testing

LAB: SYN flooding a target host using metasploit

LAB: SYN flooding a target host using hping3

LAB: HTTP flooding using DOSHTTP

LAB: Implementing dos attack on a router using slowloris script

LAB: Performing DDOS using High Orbit Ion Cannon

LAB: Detecting and analyzing dos attack traffic using kfsensor and wireshark

CEH - System Hacking

+

System Hacking Intro

Cracking Passwords Part 1

Cracking Passwords Part 2

Cracking Passwords Part 3

Cracking Passwords Part 4

Cracking Passwords Part 5

Cracking Passwords Part 6

Escalating Privileges

Executing Applications Part 1

Executing Applications Part 2

Hiding Files Part 1

Hiding Files Part 2

Hiding Files Part 3

Hiding Files Part 4

Covering Tracks

LAB: Dumping and cracking sam hashes to extract plaintext passwords

LAB: Creating and using rainbow tables

LAB: Auditing system passwords using lophtcrack

LAB: Exploiting client side vulnerabilities and establishing a vnc session

LAB: Escalating privileges by exploiting client side vulnerabilities

LAB: Exploiting freesshd vulnerability and gaining access to a target system

LAB: Hacking windows using metasploit and post exploitation using meterpreter

LAB: System monitoring using remoteexec

LAB: User system monitoring and surveillance using spytech spyagent

LAB: Web Activity Monitoring and Recording Using Power Spy

LAB: Hiding files using ntfs streams

LAB: Find hidden files using ads spy

LAB: Image steganography using openstego

LAB: Image steganography using quickstego

LAB: Viewing, enabling and clearing audit policies using auditpol

CEH - Session Hijacking

+

Session Hijacking Part 1

Session Hijacking Part 2

Session Hijacking Part 3

Session Hijacking Part 4

Session Hijacking Part 5

Session Hijacking Part 6

LAB: Session Hijacking using the Zed Attack Proxy (ZAP)

LAB: Sniffing Web Cookies by using Web Cookie Sniffer

LAB: Cookie Hijacking by using Paros HTTP session Hijacking Tool

LAB: Parameter Tampering to change the session by using Burpsuite

CEH - Hacking Webservers

+

Webserver Concepts & Webserver Attacks Part 1

Webserver Attacks Part 2

Webserver Attacks Part 3

Attack Methodology

Webserver Attack Tools

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Patch Management & Webserver Security Tools

Webserver Security Tools & Webserver Pen Testing

LAB: Enumerating Web Server Information by using NMAP

LAB: foot printing a webserver using the httprecon tool

LAB: foot printing a webserver using id serve

LAB: Exploiting Java vulnerability using metasploit framework

LAB: Hacking FTP Server in the Local Network

CEH - Hacking Web Applications

+

Hacking Web Applications Part 1

Hacking Web Applications Part 2

Hacking Web Applications Part 3

Hacking Web Applications Part 4

Hacking Web Applications Part 5

Hacking Web Applications Part 6

Hacking Web Applications Part 7

Hacking Web Applications Part 8

Hacking Web Applications Part 9

Hacking Web Applications Part 10

Hacking Web Applications Part 11

Hacking Web Applications Part 12

Hacking Web Applications Part 13

Hacking Web Applications Part 14

Hacking Web Applications Part 15

Hacking Web Applications Part 16

Hacking Web Applications Part 17

Hacking Web Applications Part 18

Hacking Web Applications Part 19

LAB: Website vulnerability scanning using Acunetix web vulnerability scanner

LAB: Hack E-commerce website by using Burpsuite on Kali Linux

LAB: Web vulnerability scanning by using Nikto on Kali Linux

LAB: Auditing Web Application Framework by using W3af

CEH - SQL Injection

+

SQL Injection Part 1

SQL Injection Part 2

SQL Injection Part 3

SQL Injection Part 4

SQL Injection Part 5

SQL Injection Part 6

SQL Injection Part 7

SQL Injection Part 8

SQL Injection Part 9

SQL Injection Part 10

SQL Injection Part 11

SQL Injection Part 12

SQL Injection Part 13

SQL Injection Part 14

SQL Injection Part 15

SQL Injection Part 16

SQL Injection Part 17

SQL Injection Part 18

SQL Injection Part 19

SQL Injection Part 20

SQL Injection Part 21

SQL Injection Part 22

SQL Injection Part 23

LAB: SQL injection Attack on Database by using HAVIJ

LAB: Testing for SQL Injection by using IBM Security APPScan Tool

LAB: Testing for SQL injection using webcruiser tool

LAB: Scanning web applications using n-stalker tool

CEH - Hacking Wireless Networks

+

Hacking Wireless Networks Part 1

Hacking Wireless Networks Part 2

Hacking Wireless Networks Part 3

Hacking Wireless Networks Part 4

Hacking Wireless Networks Part 5

Hacking Wireless Networks Part 6

Hacking Wireless Networks Part 7

Hacking Wireless Networks Part 8

Hacking Wireless Networks Part 9

Hacking Wireless Networks Part 10

Hacking Wireless Networks Part 11

Hacking Wireless Networks Part 12

Hacking Wireless Networks Part 13

Hacking Wireless Networks Part 14

Hacking Wireless Networks Part 15

Hacking Wireless Networks Part 16

Hacking Wireless Networks Part 17

Hacking Wireless Networks Part 18

LAB: Wi-Fi packet sniffing using airpcap with wireshark

LAB Identifying vulnerabilities and information disclosure in search engines using searchdiggity

LAB: Cracking a WEP network

CEH - Hacking Mobile Platforms

+

LAB: Mobile vulnerability scanning by using HeartBleed security scanner on Android

LAB: Network Port scanning by using NetScan on Android

LAB: Using Mobile Platform to Enforce a DOS Attack on a Website

LAB: Securing Android devices from malicious applications

Hacking Mobile Platforms Part 1

Hacking Mobile Platforms Part 2

Hacking Mobile Platforms Part 3

Hacking Mobile Platforms Part 4

Hacking Mobile Platforms Part 5

Hacking Mobile Platforms Part 6

Hacking Mobile Platforms Part 7

Hacking Mobile Platforms Part 8

Hacking Mobile Platforms Part 9

Hacking Mobile Platforms Part 10

Hacking Mobile Platforms Part 11

Hacking Mobile Platforms Part 12

CEH - Evading IDS, Firewalls, and Honeypots

+

Evading IDS, Firewalls, and Honeypots Part 1

Evading IDS, Firewalls, and Honeypots Part 2

Evading IDS, Firewalls, and Honeypots Part 3

Evading IDS, Firewalls, and Honeypots Part 4

Evading IDS, Firewalls, and Honeypots Part 5

Evading IDS, Firewalls, and Honeypots Part 6

Evading IDS, Firewalls, and Honeypots Part 7

Evading IDS, Firewalls, and Honeypots Part 8

Evading IDS, Firewalls, and Honeypots Part 9

Evading IDS, Firewalls, and Honeypots Part 10

LAB: Detecting intrusions by using Snort on Windows

LAB: Detecting malicious network traffic using honeybot

LAB: Detecting intruders and worms using kfsensor honeypot IDS

LAB: Bypassing firewall rules using HTTP/FTP tunneling

CEH - Cloud Computing

+

Cloud Computing Part 1

Cloud Computing Part 2

Cloud Computing Part 3

Cloud Computing Part 4

Cloud Computing Part 5

Cloud Computing Part 6

Cloud Computing Part 7

Cloud Computing Part 8

Cloud Computing Part 9

Cloud Computing Part 10

Cloud Computing Part 11

Cloud Computing Part 12

Cloud Computing Part 13

LAB: Building a cloud using owncloud and wampserver

LAB: Transferring cloud data over secure channel

LAB: Performing Cloud Vulnerability Assessment using Mobile based security scanner Zanti

CEH - Cryptography

+

Cryptography Part 1

Cryptography Part 2

Cryptography Part 3

Cryptography Part 4

Cryptography Part 5

Cryptography Part 6

Cryptography Part 7

Cryptography Part 8

Cryptography Part 9

LAB: Calculating MD5 hashes and verifying file integrity using quick checksum verifier

LAB: Calculating one way hashes using hashcalc

LAB: Calculating MD5 hashes using MD5 calculator

LAB: Understanding file and text encryption using cryptoforge

LAB: Basic data encryption using advanced encryption package

LAB: Encrypting and decrypting the data using bctextencoder

LAB: Creating and using self-signed certificate

LAB: Basic disk encryption using veracrypt

LAB: Basic data encrypting using rohos disk encryption

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.