Certified Ethical Hacker v9 Training

Certified Ethical Hacker v9 Training, Singapore elarning online course

Course Description

CEH v9 Training readies students for EC-Council's CEH certificate exam which is paramount for any IT specialist and anyone trying to enhance their network's defenses. With top experts and an interactive, lab-filled environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system. This course prepares students for the EC-Council Certified Ethical Hacker v9 exam.

Course Objectives

Network Scanning
Packet Sniffing
Social Engineering
Session Hijacking
Webserver And Web Application Attacks And Countermeasures
SQL Injection Attacks
Wireless Encryption
Cloud Computing Threats
Cryptography Ciphers
Penetration Testing

Related Courses

  • Computer Hacking Forensic Investigator Certification Preparation (CHFI)

    Computer Hacking Forensic Investigator Certification Preparation (CHFI)

    SGD $299.00

    Course Description

    The Computer Hacker and Forensic Investigator Training Course prepares students for industry specific disciplines in computer forensics and cybercrime investigation. With top experts and an interactive, lab-filled environment, students learn advanced knowledge and experience major forensic investigation scenarios enabling acquirement of hands-on experience on various forensic investigation. Students gain practical experience with the standard tools required to successfully carry out a computer forensic investigation. Students learn the skills which lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.


  • AWS Monitoring and Management

    AWS Monitoring and Management

    SGD $20.00

    Course Description

    The course also covers in detail Domain 3.0 of AWS System Operations Exam. So if your thinking of taking the hardest Associate exam this will certainly help in Domain 3.0. 3 Domain 3.0: Analysis3.1 Optimize the environment to ensure maximum performance3.2 Identify performance bottlenecks and implement remedies3.3 Identify potential issues on a given application deployment


  • Google Cloud Platform Data Storage Overview & Networking Fundamentals

    Google Cloud Platform Data Storage Overview & Networking Fundamentals

    SGD $20.00

    Course Description

    Google Cloud Platform which has you enterprise covered. GCP offers object storage for different needs and price points as well as managed MySQL and globally-scalable NoSQL databases. Our archival storage provides industry-leading pricing with the performance of disc. Different applications and workloads require different storage and database solutions. GCP offers a full suite of industry-leading storage services that are price performant and meet your needs for structured, unstructured, transactional, and relational data. This course will help you identify the solutions that fit your scenarios, whether they are mobile applications, hosting commercial software, data pipelines, or storing backups.   Google Cloud Platform enables developers to build, test and deploy applications on Google’s highly-scalable, secure, and reliable infrastructure. This course covers specifically Google Cloud Platform Networking services. This course will cover the features and functions of Google Cloud Platform Networking Services so that you will understand the GCP options available.. We will dive into GCP Networking fundamentals such as Software Defined Networking, Load Balancing, Autoscaling and Virtual Private Clouds. As an added bonus we also will dive into Identity and Access Management as well from a networking security perspective. After taking this class you should be able to understand what GCP Cloud services should enable your organization around networking services. Whether you’re a developer or architect this course will help understand the basic capabilities and some of the useful advanced features of GCP networking services and features.



CEH - Introduction to Ethical Hacking


CEH v9 Course Overview

Information Security Overview Part 1

Information Security Overview Part 2

Information Security Overview Part 3

Information Security Overview Part 4

Information Security Threats and Attack Vectors Part 1

Information Security Threats and Attack Vectors Part 2

Information Security Threats and Attack Vectors Part 3

Hacking Concepts, Types, and Phases Part 1

Hacking Concepts, Types, and Phases Part 2

Hacking Concepts, Types, and Phases Part 3

Ethical Hacking Concepts and Scope

Information Security Controls Part 1

Information Security Controls Part 2

Information Security Controls Part 3

Information Security Controls Part 4

Information Security Controls Part 5

Information Security Controls Part 6

Information Security Controls Part 7

Information Security Controls Part 8

Information Security Controls Part 9

Information Security Controls Part 10

Information Security Controls Part 11

Information Security Controls Part 12

Information Security Controls Part 13

Information Security Controls Part 14

Information Security Laws and Standards Part 1

Information Security Laws and Standards Part 2

CEH - Footprinting and Reconnaissance


Footprinting Concepts

Footprinting Methodology Part 1

Footprinting Methodology Part 2

Footprinting Methodology Part 3

Footprinting Methodology Part 4

Footprinting Methodology Part 5

Footprinting Methodology Part 6

Footprinting Tools & Countermeasures

Footprinting Penetration Testing

LAB: Open source information gathering using windows command line utilities

LAB: Gathering personal information using online people search services

LAB: Collecting information about a target website using firebug

LAB: Extracting a company’s data using web data extractor

LAB: Mirroring website using httrack web site copier

LAB: Collecting information about a target by using tracing emails

LAB: Gathering IP and domain name information using whois lookup

LAB: Advanced network route tracing using path analyzer pro

LAB: footprinting a target using maltego

LAB: Performing automated network reconnaissance using recon-ng

LAB: Using the open-souce reconnaissance tool recon-ng to gather personal information

LAB: Collecting information from social networking sites using recon-ng pushpin

LAB: Automated footprinting of an organization using foca

LAB: Identifying Vulnerablities & Information Disclosure in Search Engines using SiteDigger

CEH - Scanning Networks


Banner Grabbing and Vulnerability Scanning

Draw Network Diagram and Preparing Proxies Part 1

Draw Network Diagram and Preparing Proxies Part 2

Draw Network Diagram and Preparing Proxies Part 3

Scanning Pen Testing

LAB: UDP and TCP packet crafting techniques using hping3

LAB: Scanning the network using the colasoft packet builder

LAB: Basic network troubleshooting using megaping

LAB: Understanding network scanning using nmap

LAB: Exploring various network scanning techniques

LAB: Scanning a network using netscan tools pro

LAB: Avoiding scanning detection using multiple decoy IP addresses

LAB: Vulnerability analysis using nessus

LAB: Scanning for network vulnerabilities using the gfi languard

LAB: Drawing network diagrams using network topology mapper

LAB: Scanning devices in a network using the dude

LAB: Daisy Chaining using TOR

LAB: Anonymous browsing using Proxy Switcher

LAB: Anonymous Browsing using ULTRASURF

Scanning Networks

Checking for Live Systems Part 1

Checking for Live Systems Part 2

Checking for Live Systems Part 3

Checking for Live Systems Part 4

Checking for Live Systems Part 5

Port Scanning Countermeasures & Scanning Beyond IDS

Scanning Beyond IDS

CEH - Enumeration


Enumeration Concept & NetBIOS Enumeration

NetBIOS Enumeration and SNMP Enumeration

SNMP Enumeration and LDAP Enumeration

LDAP Enumeration, NTP Enumeration, SMTP/DNS Enumeration, and Enumeration Countermeasures

Enumeration Countermeasures and Enumeration Pen Testing

LAB: NETBIOS enumeration using global network inventory

LAB: Enumerating network resources using advanced ip scanner

LAB: Performing network enumeration using superscan

LAB: Enumerating resources in a local machine using hyena

LAB: Performing network enumeration using netbios enumerator

LAB: Enumerating a network using softperfect network scanner

LAB: Enumerating a target network using nmap and net use

LAB: Enumerating services on a target machine

LAB: SNMP enumeration using snmpcheck

LAB: Testing of SNMP Enumeration by using Paessler SNMP Tester

LAB: Performing network enumeration using various DNS interrogation tools

Introduction to Malware

Trojan Concepts Part 1

Trojan Concepts Part 2

Trojan Concepts Part 3

Trojan Concepts Part 4

Trojan Concepts Part 5

Trojan Concepts Part 6

Virus and Worm Concepts Part 1

Virus and Worm Concepts Part 2

Virus and Worm Concepts Part 3

Virus and Worm Concepts Part 4

Virus and Worm Concepts Part 5

Virus and Worm Concepts Part 6

Virus and Worm Concepts Part 7

Virus and Worm Concepts Part 8

CEH - Malware Threats


Malware Detection Part 1

Malware Detection Part 2

Malware Detection Part 3

Malware Detection Part 4

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Anti-malware Software

Penetration Testing Part 1

Penetration Testing Part 2

LAB: Monitoring TCP/IP Connections Using the CurrPorts
LAB: Creating a trojan server using theef
LAB: Creating an HTTP Trojan and Remote Controlling a Target Machine by using HTTP RAT
LAB: Creating a virus using the jps virus maker tool
LAB: Creating a worm using internet worm maker thing

LAB: Virus analysis using virus total

LAB: Virus analysis using ollydbg

LAB: Detecting trojans

CEH - Sniffing


Sniffing Concepts Part 1

Sniffing Concepts Part 2

Sniffing Concepts Part 3

Sniffing Concepts and MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack Part 1

Spoofing Attack Part 2

DNS Poisoning Part 1

DNS Poisoning Part 2

Sniffing Tools Part 1

Sniffing Tools Part 2

Sniffing Tools and Countermeasures

Sniffing Detection Techniques and Sniffing Pen Testing

LAB: Sniffing passwords using wireshark

LAB: Analyzing a network using capsa network analyzer

LAB: Sniffing the network using omnipeek network analyzer

LAB: Spoofing mac address using smac

LAB: Performing mitm attack using cain and abel

LAB: Detecting ARP poisoning in a switch based network

LAB: Detecting ARP attacks with xarp tool

LAB: Performing DNS poisoning in a switch based network

CEH - Social Engineering


Social Engineering

Social Engineering Concepts & Social Engineering Techniques

Social Engineering Techniques Part 1

Social Engineering Techniques Part 2

Social Engineering Techniques & Impersonation on Social Networking Sites

Impersonation on Social Networking Sites & Identity theft

Social Engineering Countermeasures

Social Engineering Penetration Testing

LAB: Detecting phishing using netcraft

LAB: Detecting phishing using phishtank

LAB: Anti Phishing by using PHISH DETECTOR

LAB: Creating a malicious payload using set and exploiting a windows machine

CEH - Denial of Service


Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 1

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 2

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 3

Botnets Part 1

Botnets Part 2

Botnets Part 3

DoS/DDoS Attack Tools and Counter Measures Part 1

DoS/DDoS Attack Tools and Counter Measures Part 2

DoS/DDoS Attack Tools and Counter Measures Part 3

DoS/DDoS Protection Tools & DoS/DDoS Penetration Testing

LAB: SYN flooding a target host using metasploit

LAB: SYN flooding a target host using hping3

LAB: HTTP flooding using DOSHTTP

LAB: Implementing dos attack on a router using slowloris script

LAB: Performing DDOS using High Orbit Ion Cannon

LAB: Detecting and analyzing dos attack traffic using kfsensor and wireshark

CEH - System Hacking


System Hacking Intro

Cracking Passwords Part 1

Cracking Passwords Part 2

Cracking Passwords Part 3

Cracking Passwords Part 4

Cracking Passwords Part 5

Cracking Passwords Part 6

Escalating Privileges

Executing Applications Part 1

Executing Applications Part 2

Hiding Files Part 1

Hiding Files Part 2

Hiding Files Part 3

Hiding Files Part 4

Covering Tracks

LAB: Dumping and cracking sam hashes to extract plaintext passwords
LAB: Creating and using rainbow tables

LAB: Auditing system passwords using lophtcrack

LAB: Exploiting client side vulnerabilities and establishing a vnc session

LAB: Escalating privileges by exploiting client side vulnerabilities

LAB: Exploiting freesshd vulnerability and gaining access to a target system

LAB: Hacking windows using metasploit and post exploitation using meterpreter

LAB: System monitoring using remoteexec

LAB: User system monitoring and surveillance using spytech spyagent

LAB: Web Activity Monitoring and Recording Using Power Spy

LAB: Hiding files using ntfs streams

LAB: Find hidden files using ads spy

LAB: Image steganography using openstego

LAB: Image steganography using quickstego

LAB: Viewing, enabling and clearing audit policies using auditpol

CEH - Session Hijacking


Session Hijacking Part 1

Session Hijacking Part 2

Session Hijacking Part 3

Session Hijacking Part 4

Session Hijacking Part 5

Session Hijacking Part 6

LAB: Session Hijacking using the Zed Attack Proxy (ZAP)

LAB: Sniffing Web Cookies by using Web Cookie Sniffer

LAB: Cookie Hijacking by using Paros HTTP session Hijacking Tool

LAB: Parameter Tampering to change the session by using Burpsuite

CEH - Hacking Webservers


Webserver Concepts & Webserver Attacks Part 1

Webserver Attacks Part 2

Webserver Attacks Part 3

Attack Methodology

Webserver Attack Tools

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Patch Management & Webserver Security Tools

Webserver Security Tools & Webserver Pen Testing

LAB: Enumerating Web Server Information by using NMAP

LAB: foot printing a webserver using the httprecon tool

LAB: foot printing a webserver using id serve

LAB: Exploiting Java vulnerability using metasploit framework

LAB: Hacking FTP Server in the Local Network

CEH - Hacking Web Applications


Hacking Web Applications Part 1

Hacking Web Applications Part 2

Hacking Web Applications Part 3

Hacking Web Applications Part 4

Hacking Web Applications Part 5

Hacking Web Applications Part 6

Hacking Web Applications Part 7

Hacking Web Applications Part 8

Hacking Web Applications Part 9

Hacking Web Applications Part 10

Hacking Web Applications Part 11

Hacking Web Applications Part 12

Hacking Web Applications Part 13

Hacking Web Applications Part 14

Hacking Web Applications Part 15

Hacking Web Applications Part 16

Hacking Web Applications Part 17

Hacking Web Applications Part 18

Hacking Web Applications Part 19

LAB: Website vulnerability scanning using Acunetix web vulnerability scanner

LAB: Hack E-commerce website by using Burpsuite on Kali Linux

LAB: Web vulnerability scanning by using Nikto on Kali Linux

LAB: Auditing Web Application Framework by using W3af

CEH - SQL Injection


SQL Injection Part 1

SQL Injection Part 2

SQL Injection Part 3

SQL Injection Part 4

SQL Injection Part 5

SQL Injection Part 6

SQL Injection Part 7

SQL Injection Part 8

SQL Injection Part 9

SQL Injection Part 10

SQL Injection Part 11

SQL Injection Part 12

SQL Injection Part 13

SQL Injection Part 14

SQL Injection Part 15

SQL Injection Part 16

SQL Injection Part 17

SQL Injection Part 18

SQL Injection Part 19

SQL Injection Part 20

SQL Injection Part 21

SQL Injection Part 22

SQL Injection Part 23

LAB: SQL injection Attack on Database by using HAVIJ

LAB: Testing for SQL Injection by using IBM Security APPScan Tool

LAB: Testing for SQL injection using webcruiser tool

LAB: Scanning web applications using n-stalker tool

CEH - Hacking Wireless Networks


Hacking Wireless Networks Part 1

Hacking Wireless Networks Part 2

Hacking Wireless Networks Part 3

Hacking Wireless Networks Part 4

Hacking Wireless Networks Part 5

Hacking Wireless Networks Part 6

Hacking Wireless Networks Part 7

Hacking Wireless Networks Part 8

Hacking Wireless Networks Part 9

Hacking Wireless Networks Part 10

Hacking Wireless Networks Part 11

Hacking Wireless Networks Part 12

Hacking Wireless Networks Part 13

Hacking Wireless Networks Part 14

Hacking Wireless Networks Part 15

Hacking Wireless Networks Part 16

Hacking Wireless Networks Part 17

Hacking Wireless Networks Part 18

LAB: Wi-Fi packet sniffing using airpcap with wireshark

LAB Identifying vulnerabilities and information disclosure in search engines using searchdiggity

LAB: Cracking a WEP network

CEH - Hacking Mobile Platforms

LAB: Mobile vulnerability scanning by using HeartBleed security scanner on Android
LAB: Network Port scanning by using NetScan on Android
LAB: Using Mobile Platform to Enforce a DOS Attack on a Website

LAB: Securing Android devices from malicious applications

Hacking Mobile Platforms Part 1

Hacking Mobile Platforms Part 2

Hacking Mobile Platforms Part 3

Hacking Mobile Platforms Part 4

Hacking Mobile Platforms Part 5

Hacking Mobile Platforms Part 6

Hacking Mobile Platforms Part 7

Hacking Mobile Platforms Part 8

Hacking Mobile Platforms Part 9

Hacking Mobile Platforms Part 10

Hacking Mobile Platforms Part 11

Hacking Mobile Platforms Part 12

CEH - Evading IDS, Firewalls, and Honeypots


Evading IDS, Firewalls, and Honeypots Part 1

Evading IDS, Firewalls, and Honeypots Part 2

Evading IDS, Firewalls, and Honeypots Part 3

Evading IDS, Firewalls, and Honeypots Part 4

Evading IDS, Firewalls, and Honeypots Part 5

Evading IDS, Firewalls, and Honeypots Part 6

Evading IDS, Firewalls, and Honeypots Part 7

Evading IDS, Firewalls, and Honeypots Part 8

Evading IDS, Firewalls, and Honeypots Part 9

Evading IDS, Firewalls, and Honeypots Part 10

LAB: Detecting intrusions by using Snort on Windows

LAB: Detecting malicious network traffic using honeybot

LAB: Detecting intruders and worms using kfsensor honeypot IDS

LAB: Bypassing firewall rules using HTTP/FTP tunneling

CEH - Cloud Computing


Cloud Computing Part 1

Cloud Computing Part 2

Cloud Computing Part 3

Cloud Computing Part 4

Cloud Computing Part 5

Cloud Computing Part 6

Cloud Computing Part 7

Cloud Computing Part 8

Cloud Computing Part 9

Cloud Computing Part 10

Cloud Computing Part 11

Cloud Computing Part 12

Cloud Computing Part 13

LAB: Building a cloud using owncloud and wampserver

LAB: Transferring cloud data over secure channel

LAB: Performing Cloud Vulnerability Assessment using Mobile based security scanner Zanti

CEH - Cryptography


Cryptography Part 1

Cryptography Part 2

Cryptography Part 3

Cryptography Part 4

Cryptography Part 5

Cryptography Part 6

Cryptography Part 7

Cryptography Part 8

Cryptography Part 9

LAB: Calculating MD5 hashes and verifying file integrity using quick checksum verifier

LAB: Calculating one way hashes using hashcalc

LAB: Calculating MD5 hashes using MD5 calculator

LAB: Understanding file and text encryption using cryptoforge

LAB: Basic data encryption using advanced encryption package

LAB: Encrypting and decrypting the data using bctextencoder

LAB: Creating and using self-signed certificate

LAB: Basic disk encryption using veracrypt
LAB: Basic data encrypting using rohos disk encryption
SGD $299.00
(Price excludes GST)
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.