Certified Ethical Hacker v9 Training

Certified Ethical Hacker v9 Training, Singapore elarning online course

Course Description

CEH v9 Training readies students for EC-Council's CEH certificate exam which is paramount for any IT specialist and anyone trying to enhance their network's defenses. With top experts and an interactive, lab-filled environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system. This course prepares students for the EC-Council Certified Ethical Hacker v9 exam.

Course Objectives

Network Scanning
Packet Sniffing
Social Engineering
Session Hijacking
Webserver And Web Application Attacks And Countermeasures
SQL Injection Attacks
Wireless Encryption
Cloud Computing Threats
Cryptography Ciphers
Penetration Testing

Related Courses

  • Google Cloud Professional Cloud Architect Bootcamp

    Google Cloud Professional Cloud Architect Bootcamp

    SGD $29.00

    Course Description

    In this course we start with a brief overview to ensure everyone has the same understanding of the platform. The understanding you NEED to pass this challenging exam. We will cover the aspects of the GCP you MUST KNOW to pass the exam such as migrating Virtual Machines, determining the proper data storage requirements, analyzing performance, and monitoring the GCP.


  • Network+ Certification Prep

    Network+ Certification Prep

    SGD $299.00

    Course Description

    The Network+ Certification Prep Course readies students for CompTIA's Network+ Certification exam which is a vendor-neutral certification allowing IT professionals to gain expertise in configuring, managing, installing, troubleshooting and maintaining basic computer networks. With top experts and an interactive, lab-filled environment, students gather essential knowledge of network configuration, technologies and installations as well as topologies and media security and management. The Network+ certification by CompTIA is an internationally recognized and coveted credential providing proof of a student's knowledge, skills and ability to manage, maintain, troubleshoot, install, operate and configure a basic network infrastructure. This course prepares the student for the CompTIA Network+ Certification exam N10-006.


  • Certified Advanced Persistent Threat Analyst

    Certified Advanced Persistent Threat Analyst

    SGD $299.00

    Course Description

    Cyber-attacks have become so sophisticated over the years, that a new term has emerged - Advanced Persistent Threat, which we will refer to as APT. An APT is a group of individuals that have both the means and the intent to launch persistent attacks against specific targets. Understanding these groups and their behavior is important when evaluating threats against any organization.   Hackers have traditionally targeted large corporations, but today small to midsize businesses are being attacked with the same type of highly sophisticated malware. These new strains of advanced malware are often referred to as APTs   Modern malware uses Advanced techniques such as encrypted communication channels, kernel-level rootkits, and sophisticated evasion capabilities to get past a network’s defenses. More importantly, they often leverage zero day vulnerabilities – flaws for which no patch is available yet and no signature has been written.   Modern malware is often Persistent and designed to stick around. It’s stealthy and carefully hides its communications. It lives in a victim’s network for as long as possible, often cleaning up after itself by deleting logs, using strong encryption, and only reporting back to its controller in small, obfuscated bursts of communication.   Many attacks are now blended combinations of different techniques. A common tactic for hackers is to initiate an APT with spear phishing. This involves sending a carefully crafted email that appears to be in the from of a known individual or business with a link to a malicious website or an infected download.    Once the initial breach is successful, attackers can further damage defenses by disabling security protocols, changing security settings or stealing passwords. Groups of highly skilled, motivated, and very well-funded attackers represent significant Threats because they have very specific targets and goals in mind – often financial gain from theft of credit cards and other valuable account information.   Here are the topics that we will be covering in this course. We will begin by going over the APT Lifecycle and teach you a structured approach to analyze and assess inherent vulnerabilities. We will teach you mitigation and countermeasures that may prevent an attacker from gaining a foothold into an organization.   Next, we will get you familiar with APT1 Group and some common ATPs we have seen in the last few years like Stuxnet, and two new ones, Adwind and Poseidon. Lastly, we will get you familiar with the Cyber World War.



CEH - Introduction to Ethical Hacking


CEH v9 Course Overview

Information Security Overview Part 1

Information Security Overview Part 2

Information Security Overview Part 3

Information Security Overview Part 4

Information Security Threats and Attack Vectors Part 1

Information Security Threats and Attack Vectors Part 2

Information Security Threats and Attack Vectors Part 3

Hacking Concepts, Types, and Phases Part 1

Hacking Concepts, Types, and Phases Part 2

Hacking Concepts, Types, and Phases Part 3

Ethical Hacking Concepts and Scope

Information Security Controls Part 1

Information Security Controls Part 2

Information Security Controls Part 3

Information Security Controls Part 4

Information Security Controls Part 5

Information Security Controls Part 6

Information Security Controls Part 7

Information Security Controls Part 8

Information Security Controls Part 9

Information Security Controls Part 10

Information Security Controls Part 11

Information Security Controls Part 12

Information Security Controls Part 13

Information Security Controls Part 14

Information Security Laws and Standards Part 1

Information Security Laws and Standards Part 2

CEH - Footprinting and Reconnaissance


Footprinting Concepts

Footprinting Methodology Part 1

Footprinting Methodology Part 2

Footprinting Methodology Part 3

Footprinting Methodology Part 4

Footprinting Methodology Part 5

Footprinting Methodology Part 6

Footprinting Tools & Countermeasures

Footprinting Penetration Testing

LAB: Open source information gathering using windows command line utilities

LAB: Gathering personal information using online people search services

LAB: Collecting information about a target website using firebug

LAB: Extracting a company’s data using web data extractor

LAB: Mirroring website using httrack web site copier

LAB: Collecting information about a target by using tracing emails

LAB: Gathering IP and domain name information using whois lookup

LAB: Advanced network route tracing using path analyzer pro

LAB: footprinting a target using maltego

LAB: Performing automated network reconnaissance using recon-ng

LAB: Using the open-souce reconnaissance tool recon-ng to gather personal information

LAB: Collecting information from social networking sites using recon-ng pushpin

LAB: Automated footprinting of an organization using foca

LAB: Identifying Vulnerablities & Information Disclosure in Search Engines using SiteDigger

CEH - Scanning Networks


Banner Grabbing and Vulnerability Scanning

Draw Network Diagram and Preparing Proxies Part 1

Draw Network Diagram and Preparing Proxies Part 2

Draw Network Diagram and Preparing Proxies Part 3

Scanning Pen Testing

LAB: UDP and TCP packet crafting techniques using hping3

LAB: Scanning the network using the colasoft packet builder

LAB: Basic network troubleshooting using megaping

LAB: Understanding network scanning using nmap

LAB: Exploring various network scanning techniques

LAB: Scanning a network using netscan tools pro

LAB: Avoiding scanning detection using multiple decoy IP addresses

LAB: Vulnerability analysis using nessus

LAB: Scanning for network vulnerabilities using the gfi languard

LAB: Drawing network diagrams using network topology mapper

LAB: Scanning devices in a network using the dude

LAB: Daisy Chaining using TOR

LAB: Anonymous browsing using Proxy Switcher

LAB: Anonymous Browsing using ULTRASURF

Scanning Networks

Checking for Live Systems Part 1

Checking for Live Systems Part 2

Checking for Live Systems Part 3

Checking for Live Systems Part 4

Checking for Live Systems Part 5

Port Scanning Countermeasures & Scanning Beyond IDS

Scanning Beyond IDS

CEH - Enumeration


Enumeration Concept & NetBIOS Enumeration

NetBIOS Enumeration and SNMP Enumeration

SNMP Enumeration and LDAP Enumeration

LDAP Enumeration, NTP Enumeration, SMTP/DNS Enumeration, and Enumeration Countermeasures

Enumeration Countermeasures and Enumeration Pen Testing

LAB: NETBIOS enumeration using global network inventory

LAB: Enumerating network resources using advanced ip scanner

LAB: Performing network enumeration using superscan

LAB: Enumerating resources in a local machine using hyena

LAB: Performing network enumeration using netbios enumerator

LAB: Enumerating a network using softperfect network scanner

LAB: Enumerating a target network using nmap and net use

LAB: Enumerating services on a target machine

LAB: SNMP enumeration using snmpcheck

LAB: Testing of SNMP Enumeration by using Paessler SNMP Tester

LAB: Performing network enumeration using various DNS interrogation tools

Introduction to Malware

Trojan Concepts Part 1

Trojan Concepts Part 2

Trojan Concepts Part 3

Trojan Concepts Part 4

Trojan Concepts Part 5

Trojan Concepts Part 6

Virus and Worm Concepts Part 1

Virus and Worm Concepts Part 2

Virus and Worm Concepts Part 3

Virus and Worm Concepts Part 4

Virus and Worm Concepts Part 5

Virus and Worm Concepts Part 6

Virus and Worm Concepts Part 7

Virus and Worm Concepts Part 8

CEH - Malware Threats


Malware Detection Part 1

Malware Detection Part 2

Malware Detection Part 3

Malware Detection Part 4

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Anti-malware Software

Penetration Testing Part 1

Penetration Testing Part 2

LAB: Monitoring TCP/IP Connections Using the CurrPorts
LAB: Creating a trojan server using theef
LAB: Creating an HTTP Trojan and Remote Controlling a Target Machine by using HTTP RAT
LAB: Creating a virus using the jps virus maker tool
LAB: Creating a worm using internet worm maker thing

LAB: Virus analysis using virus total

LAB: Virus analysis using ollydbg

LAB: Detecting trojans

CEH - Sniffing


Sniffing Concepts Part 1

Sniffing Concepts Part 2

Sniffing Concepts Part 3

Sniffing Concepts and MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack Part 1

Spoofing Attack Part 2

DNS Poisoning Part 1

DNS Poisoning Part 2

Sniffing Tools Part 1

Sniffing Tools Part 2

Sniffing Tools and Countermeasures

Sniffing Detection Techniques and Sniffing Pen Testing

LAB: Sniffing passwords using wireshark

LAB: Analyzing a network using capsa network analyzer

LAB: Sniffing the network using omnipeek network analyzer

LAB: Spoofing mac address using smac

LAB: Performing mitm attack using cain and abel

LAB: Detecting ARP poisoning in a switch based network

LAB: Detecting ARP attacks with xarp tool

LAB: Performing DNS poisoning in a switch based network

CEH - Social Engineering


Social Engineering

Social Engineering Concepts & Social Engineering Techniques

Social Engineering Techniques Part 1

Social Engineering Techniques Part 2

Social Engineering Techniques & Impersonation on Social Networking Sites

Impersonation on Social Networking Sites & Identity theft

Social Engineering Countermeasures

Social Engineering Penetration Testing

LAB: Detecting phishing using netcraft

LAB: Detecting phishing using phishtank

LAB: Anti Phishing by using PHISH DETECTOR

LAB: Creating a malicious payload using set and exploiting a windows machine

CEH - Denial of Service


Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 1

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 2

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 3

Botnets Part 1

Botnets Part 2

Botnets Part 3

DoS/DDoS Attack Tools and Counter Measures Part 1

DoS/DDoS Attack Tools and Counter Measures Part 2

DoS/DDoS Attack Tools and Counter Measures Part 3

DoS/DDoS Protection Tools & DoS/DDoS Penetration Testing

LAB: SYN flooding a target host using metasploit

LAB: SYN flooding a target host using hping3

LAB: HTTP flooding using DOSHTTP

LAB: Implementing dos attack on a router using slowloris script

LAB: Performing DDOS using High Orbit Ion Cannon

LAB: Detecting and analyzing dos attack traffic using kfsensor and wireshark

CEH - System Hacking


System Hacking Intro

Cracking Passwords Part 1

Cracking Passwords Part 2

Cracking Passwords Part 3

Cracking Passwords Part 4

Cracking Passwords Part 5

Cracking Passwords Part 6

Escalating Privileges

Executing Applications Part 1

Executing Applications Part 2

Hiding Files Part 1

Hiding Files Part 2

Hiding Files Part 3

Hiding Files Part 4

Covering Tracks

LAB: Dumping and cracking sam hashes to extract plaintext passwords
LAB: Creating and using rainbow tables

LAB: Auditing system passwords using lophtcrack

LAB: Exploiting client side vulnerabilities and establishing a vnc session

LAB: Escalating privileges by exploiting client side vulnerabilities

LAB: Exploiting freesshd vulnerability and gaining access to a target system

LAB: Hacking windows using metasploit and post exploitation using meterpreter

LAB: System monitoring using remoteexec

LAB: User system monitoring and surveillance using spytech spyagent

LAB: Web Activity Monitoring and Recording Using Power Spy

LAB: Hiding files using ntfs streams

LAB: Find hidden files using ads spy

LAB: Image steganography using openstego

LAB: Image steganography using quickstego

LAB: Viewing, enabling and clearing audit policies using auditpol

CEH - Session Hijacking


Session Hijacking Part 1

Session Hijacking Part 2

Session Hijacking Part 3

Session Hijacking Part 4

Session Hijacking Part 5

Session Hijacking Part 6

LAB: Session Hijacking using the Zed Attack Proxy (ZAP)

LAB: Sniffing Web Cookies by using Web Cookie Sniffer

LAB: Cookie Hijacking by using Paros HTTP session Hijacking Tool

LAB: Parameter Tampering to change the session by using Burpsuite

CEH - Hacking Webservers


Webserver Concepts & Webserver Attacks Part 1

Webserver Attacks Part 2

Webserver Attacks Part 3

Attack Methodology

Webserver Attack Tools

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Patch Management & Webserver Security Tools

Webserver Security Tools & Webserver Pen Testing

LAB: Enumerating Web Server Information by using NMAP

LAB: foot printing a webserver using the httprecon tool

LAB: foot printing a webserver using id serve

LAB: Exploiting Java vulnerability using metasploit framework

LAB: Hacking FTP Server in the Local Network

CEH - Hacking Web Applications


Hacking Web Applications Part 1

Hacking Web Applications Part 2

Hacking Web Applications Part 3

Hacking Web Applications Part 4

Hacking Web Applications Part 5

Hacking Web Applications Part 6

Hacking Web Applications Part 7

Hacking Web Applications Part 8

Hacking Web Applications Part 9

Hacking Web Applications Part 10

Hacking Web Applications Part 11

Hacking Web Applications Part 12

Hacking Web Applications Part 13

Hacking Web Applications Part 14

Hacking Web Applications Part 15

Hacking Web Applications Part 16

Hacking Web Applications Part 17

Hacking Web Applications Part 18

Hacking Web Applications Part 19

LAB: Website vulnerability scanning using Acunetix web vulnerability scanner

LAB: Hack E-commerce website by using Burpsuite on Kali Linux

LAB: Web vulnerability scanning by using Nikto on Kali Linux

LAB: Auditing Web Application Framework by using W3af

CEH - SQL Injection


SQL Injection Part 1

SQL Injection Part 2

SQL Injection Part 3

SQL Injection Part 4

SQL Injection Part 5

SQL Injection Part 6

SQL Injection Part 7

SQL Injection Part 8

SQL Injection Part 9

SQL Injection Part 10

SQL Injection Part 11

SQL Injection Part 12

SQL Injection Part 13

SQL Injection Part 14

SQL Injection Part 15

SQL Injection Part 16

SQL Injection Part 17

SQL Injection Part 18

SQL Injection Part 19

SQL Injection Part 20

SQL Injection Part 21

SQL Injection Part 22

SQL Injection Part 23

LAB: SQL injection Attack on Database by using HAVIJ

LAB: Testing for SQL Injection by using IBM Security APPScan Tool

LAB: Testing for SQL injection using webcruiser tool

LAB: Scanning web applications using n-stalker tool

CEH - Hacking Wireless Networks


Hacking Wireless Networks Part 1

Hacking Wireless Networks Part 2

Hacking Wireless Networks Part 3

Hacking Wireless Networks Part 4

Hacking Wireless Networks Part 5

Hacking Wireless Networks Part 6

Hacking Wireless Networks Part 7

Hacking Wireless Networks Part 8

Hacking Wireless Networks Part 9

Hacking Wireless Networks Part 10

Hacking Wireless Networks Part 11

Hacking Wireless Networks Part 12

Hacking Wireless Networks Part 13

Hacking Wireless Networks Part 14

Hacking Wireless Networks Part 15

Hacking Wireless Networks Part 16

Hacking Wireless Networks Part 17

Hacking Wireless Networks Part 18

LAB: Wi-Fi packet sniffing using airpcap with wireshark

LAB Identifying vulnerabilities and information disclosure in search engines using searchdiggity

LAB: Cracking a WEP network

CEH - Hacking Mobile Platforms

LAB: Mobile vulnerability scanning by using HeartBleed security scanner on Android
LAB: Network Port scanning by using NetScan on Android
LAB: Using Mobile Platform to Enforce a DOS Attack on a Website

LAB: Securing Android devices from malicious applications

Hacking Mobile Platforms Part 1

Hacking Mobile Platforms Part 2

Hacking Mobile Platforms Part 3

Hacking Mobile Platforms Part 4

Hacking Mobile Platforms Part 5

Hacking Mobile Platforms Part 6

Hacking Mobile Platforms Part 7

Hacking Mobile Platforms Part 8

Hacking Mobile Platforms Part 9

Hacking Mobile Platforms Part 10

Hacking Mobile Platforms Part 11

Hacking Mobile Platforms Part 12

CEH - Evading IDS, Firewalls, and Honeypots


Evading IDS, Firewalls, and Honeypots Part 1

Evading IDS, Firewalls, and Honeypots Part 2

Evading IDS, Firewalls, and Honeypots Part 3

Evading IDS, Firewalls, and Honeypots Part 4

Evading IDS, Firewalls, and Honeypots Part 5

Evading IDS, Firewalls, and Honeypots Part 6

Evading IDS, Firewalls, and Honeypots Part 7

Evading IDS, Firewalls, and Honeypots Part 8

Evading IDS, Firewalls, and Honeypots Part 9

Evading IDS, Firewalls, and Honeypots Part 10

LAB: Detecting intrusions by using Snort on Windows

LAB: Detecting malicious network traffic using honeybot

LAB: Detecting intruders and worms using kfsensor honeypot IDS

LAB: Bypassing firewall rules using HTTP/FTP tunneling

CEH - Cloud Computing


Cloud Computing Part 1

Cloud Computing Part 2

Cloud Computing Part 3

Cloud Computing Part 4

Cloud Computing Part 5

Cloud Computing Part 6

Cloud Computing Part 7

Cloud Computing Part 8

Cloud Computing Part 9

Cloud Computing Part 10

Cloud Computing Part 11

Cloud Computing Part 12

Cloud Computing Part 13

LAB: Building a cloud using owncloud and wampserver

LAB: Transferring cloud data over secure channel

LAB: Performing Cloud Vulnerability Assessment using Mobile based security scanner Zanti

CEH - Cryptography


Cryptography Part 1

Cryptography Part 2

Cryptography Part 3

Cryptography Part 4

Cryptography Part 5

Cryptography Part 6

Cryptography Part 7

Cryptography Part 8

Cryptography Part 9

LAB: Calculating MD5 hashes and verifying file integrity using quick checksum verifier

LAB: Calculating one way hashes using hashcalc

LAB: Calculating MD5 hashes using MD5 calculator

LAB: Understanding file and text encryption using cryptoforge

LAB: Basic data encryption using advanced encryption package

LAB: Encrypting and decrypting the data using bctextencoder

LAB: Creating and using self-signed certificate

LAB: Basic disk encryption using veracrypt
LAB: Basic data encrypting using rohos disk encryption
SGD $299.00
(Price excludes GST)
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.