Certified Ethical Hacker v9 Training


Certified Ethical Hacker v9 Training, Singapore elarning online course

Course Description

CEH v9 Training readies students for EC-Council's CEH certificate exam which is paramount for any IT specialist and anyone trying to enhance their network's defenses. With top experts and an interactive, lab-filled environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system. This course prepares students for the EC-Council Certified Ethical Hacker v9 exam.


Course Objectives

Footprinting
Network Scanning
Enumeration
Packet Sniffing
Social Engineering
DoS/DDoS
Session Hijacking
Webserver And Web Application Attacks And Countermeasures
SQL Injection Attacks
Wireless Encryption
Cloud Computing Threats
Cryptography Ciphers
Penetration Testing


Related Courses

  • Google Cloud Professional Cloud Developer

    Google Cloud Professional Cloud Developer

    SGD $29.00

    Course Description

    "A Professional Cloud Developer builds scalable and highly available applications using Google recommended practices and tools that leverage fully managed services. This individual has experience with next generation databases, runtime environments and developer tools. They also have proficiency with at least one general purpose programming language and are skilled with using Stackdriver to produce meaningful metrics and logs to debug and trace code. Course is meant to be a Crash Course for taking the Google Cloud Professional Cloud Developer Exam. It would be expected or at a minimum to have experience with Google Cloud and be a developer. Course has compressed the study objectives listed by Google Cloud and we have taken the beta exam. The exam is very challenging and will challenge the ""average"" developer.

    Read more...

  • A+ Certification Prep

    A+ Certification Prep

    SGD $299.00

    Course Description

    The A+ Certification Prep Course readies students for CompTIA's A+ certification which validates an understanding of the most common hardware and software technologies in business as well as the skills necessary to support complex IT infrastructures. With top experts and an interactive, lab-filled enviornment students gain essential competencies with the equivalent understanding of at least one year of hands-on experience in the field/lab. The A+ Certification by CompTIA is a powerful credential helping IT professionals, worldwide, ignite their careers by proving knowledge needed to assemble elements based on install, customer requirements, configuration and maintenance of software as well as PCs and devices for end users. Students will also gain an understanding of the basics of security, forensics and networking and finally learn to safely and properly diagnose, document and resolve common software and hardware issues while applying troubleshooting expertise. This course prepares students for the CompTIA A+ Certification exams 220-802 and 220-801.

    Read more...

  • Oracle Java SE7 Programmer Level 1 Certification

    Oracle Java SE7 Programmer Level 1 Certification

    SGD $50.00

    Course Description

    Have you ever wondered how all those cool applications and games around the web are made? The answer is: Java. Java is the most commonly used programming language in the world. Get started learning Java today, and in a few days with this Java Tutorial for Beginners you'll be a pro. To make your life a bit easier, you will learn Java from scratch using the NetBeans environment. Java allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few. It's also integral to the intranet applications and other e-business solutions that are the foundation of corporate computing.Everything you need to know for Java Certification. - Know the basics of Java programming language - Learn the the topics in this course to pass Oracle's Java Programmer Level 1 Exam- Know how to code using Java after the completion of this course- Be able to apply the knowledge into your own projects after this course 

    Read more...


Content

CEH - Introduction to Ethical Hacking

+

CEH v9 Course Overview

Information Security Overview Part 1

Information Security Overview Part 2

Information Security Overview Part 3

Information Security Overview Part 4

Information Security Threats and Attack Vectors Part 1

Information Security Threats and Attack Vectors Part 2

Information Security Threats and Attack Vectors Part 3

Hacking Concepts, Types, and Phases Part 1

Hacking Concepts, Types, and Phases Part 2

Hacking Concepts, Types, and Phases Part 3

Ethical Hacking Concepts and Scope

Information Security Controls Part 1

Information Security Controls Part 2

Information Security Controls Part 3

Information Security Controls Part 4

Information Security Controls Part 5

Information Security Controls Part 6

Information Security Controls Part 7

Information Security Controls Part 8

Information Security Controls Part 9

Information Security Controls Part 10

Information Security Controls Part 11

Information Security Controls Part 12

Information Security Controls Part 13

Information Security Controls Part 14

Information Security Laws and Standards Part 1

Information Security Laws and Standards Part 2

CEH - Footprinting and Reconnaissance

+

Footprinting Concepts

Footprinting Methodology Part 1

Footprinting Methodology Part 2

Footprinting Methodology Part 3

Footprinting Methodology Part 4

Footprinting Methodology Part 5

Footprinting Methodology Part 6

Footprinting Tools & Countermeasures

Footprinting Penetration Testing

LAB: Open source information gathering using windows command line utilities

LAB: Gathering personal information using online people search services

LAB: Collecting information about a target website using firebug

LAB: Extracting a company’s data using web data extractor

LAB: Mirroring website using httrack web site copier

LAB: Collecting information about a target by using tracing emails

LAB: Gathering IP and domain name information using whois lookup

LAB: Advanced network route tracing using path analyzer pro

LAB: footprinting a target using maltego

LAB: Performing automated network reconnaissance using recon-ng

LAB: Using the open-souce reconnaissance tool recon-ng to gather personal information

LAB: Collecting information from social networking sites using recon-ng pushpin

LAB: Automated footprinting of an organization using foca

LAB: Identifying Vulnerablities & Information Disclosure in Search Engines using SiteDigger

CEH - Scanning Networks

+

Banner Grabbing and Vulnerability Scanning

Draw Network Diagram and Preparing Proxies Part 1

Draw Network Diagram and Preparing Proxies Part 2

Draw Network Diagram and Preparing Proxies Part 3

Scanning Pen Testing

LAB: UDP and TCP packet crafting techniques using hping3

LAB: Scanning the network using the colasoft packet builder

LAB: Basic network troubleshooting using megaping

LAB: Understanding network scanning using nmap

LAB: Exploring various network scanning techniques

LAB: Scanning a network using netscan tools pro

LAB: Avoiding scanning detection using multiple decoy IP addresses

LAB: Vulnerability analysis using nessus

LAB: Scanning for network vulnerabilities using the gfi languard

LAB: Drawing network diagrams using network topology mapper

LAB: Scanning devices in a network using the dude

LAB: Daisy Chaining using TOR

LAB: Anonymous browsing using Proxy Switcher

LAB: Anonymous Browsing using ULTRASURF

Scanning Networks

Checking for Live Systems Part 1

Checking for Live Systems Part 2

Checking for Live Systems Part 3

Checking for Live Systems Part 4

Checking for Live Systems Part 5

Port Scanning Countermeasures & Scanning Beyond IDS

Scanning Beyond IDS

CEH - Enumeration

+

Enumeration Concept & NetBIOS Enumeration

NetBIOS Enumeration and SNMP Enumeration

SNMP Enumeration and LDAP Enumeration

LDAP Enumeration, NTP Enumeration, SMTP/DNS Enumeration, and Enumeration Countermeasures

Enumeration Countermeasures and Enumeration Pen Testing

LAB: NETBIOS enumeration using global network inventory

LAB: Enumerating network resources using advanced ip scanner

LAB: Performing network enumeration using superscan

LAB: Enumerating resources in a local machine using hyena

LAB: Performing network enumeration using netbios enumerator

LAB: Enumerating a network using softperfect network scanner

LAB: Enumerating a target network using nmap and net use

LAB: Enumerating services on a target machine

LAB: SNMP enumeration using snmpcheck

LAB: Testing of SNMP Enumeration by using Paessler SNMP Tester

LAB: Performing network enumeration using various DNS interrogation tools

Introduction to Malware

Trojan Concepts Part 1

Trojan Concepts Part 2

Trojan Concepts Part 3

Trojan Concepts Part 4

Trojan Concepts Part 5

Trojan Concepts Part 6

Virus and Worm Concepts Part 1

Virus and Worm Concepts Part 2

Virus and Worm Concepts Part 3

Virus and Worm Concepts Part 4

Virus and Worm Concepts Part 5

Virus and Worm Concepts Part 6

Virus and Worm Concepts Part 7

Virus and Worm Concepts Part 8

CEH - Malware Threats

+

Malware Detection Part 1

Malware Detection Part 2

Malware Detection Part 3

Malware Detection Part 4

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Anti-malware Software

Penetration Testing Part 1

Penetration Testing Part 2

LAB: Monitoring TCP/IP Connections Using the CurrPorts
LAB: Creating a trojan server using theef
LAB: Creating an HTTP Trojan and Remote Controlling a Target Machine by using HTTP RAT
LAB: Creating a virus using the jps virus maker tool
LAB: Creating a worm using internet worm maker thing

LAB: Virus analysis using virus total

LAB: Virus analysis using ollydbg

LAB: Detecting trojans

CEH - Sniffing

+

Sniffing Concepts Part 1

Sniffing Concepts Part 2

Sniffing Concepts Part 3

Sniffing Concepts and MAC Attacks

DHCP Attacks

ARP Poisoning

Spoofing Attack Part 1

Spoofing Attack Part 2

DNS Poisoning Part 1

DNS Poisoning Part 2

Sniffing Tools Part 1

Sniffing Tools Part 2

Sniffing Tools and Countermeasures

Sniffing Detection Techniques and Sniffing Pen Testing

LAB: Sniffing passwords using wireshark

LAB: Analyzing a network using capsa network analyzer

LAB: Sniffing the network using omnipeek network analyzer

LAB: Spoofing mac address using smac

LAB: Performing mitm attack using cain and abel

LAB: Detecting ARP poisoning in a switch based network

LAB: Detecting ARP attacks with xarp tool

LAB: Performing DNS poisoning in a switch based network

CEH - Social Engineering

+

Social Engineering

Social Engineering Concepts & Social Engineering Techniques

Social Engineering Techniques Part 1

Social Engineering Techniques Part 2

Social Engineering Techniques & Impersonation on Social Networking Sites

Impersonation on Social Networking Sites & Identity theft

Social Engineering Countermeasures

Social Engineering Penetration Testing

LAB: Detecting phishing using netcraft

LAB: Detecting phishing using phishtank

LAB: Anti Phishing by using PHISH DETECTOR

LAB: Creating a malicious payload using set and exploiting a windows machine

CEH - Denial of Service

+

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 1

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 2

Denial-of-Service / Distributed Denial-of-Service Attacks (DoS / DDoS) Attack Techniques Part 3

Botnets Part 1

Botnets Part 2

Botnets Part 3

DoS/DDoS Attack Tools and Counter Measures Part 1

DoS/DDoS Attack Tools and Counter Measures Part 2

DoS/DDoS Attack Tools and Counter Measures Part 3

DoS/DDoS Protection Tools & DoS/DDoS Penetration Testing

LAB: SYN flooding a target host using metasploit

LAB: SYN flooding a target host using hping3

LAB: HTTP flooding using DOSHTTP

LAB: Implementing dos attack on a router using slowloris script

LAB: Performing DDOS using High Orbit Ion Cannon

LAB: Detecting and analyzing dos attack traffic using kfsensor and wireshark

CEH - System Hacking

+

System Hacking Intro

Cracking Passwords Part 1

Cracking Passwords Part 2

Cracking Passwords Part 3

Cracking Passwords Part 4

Cracking Passwords Part 5

Cracking Passwords Part 6

Escalating Privileges

Executing Applications Part 1

Executing Applications Part 2

Hiding Files Part 1

Hiding Files Part 2

Hiding Files Part 3

Hiding Files Part 4

Covering Tracks

LAB: Dumping and cracking sam hashes to extract plaintext passwords
LAB: Creating and using rainbow tables

LAB: Auditing system passwords using lophtcrack

LAB: Exploiting client side vulnerabilities and establishing a vnc session

LAB: Escalating privileges by exploiting client side vulnerabilities

LAB: Exploiting freesshd vulnerability and gaining access to a target system

LAB: Hacking windows using metasploit and post exploitation using meterpreter

LAB: System monitoring using remoteexec

LAB: User system monitoring and surveillance using spytech spyagent

LAB: Web Activity Monitoring and Recording Using Power Spy

LAB: Hiding files using ntfs streams

LAB: Find hidden files using ads spy

LAB: Image steganography using openstego

LAB: Image steganography using quickstego

LAB: Viewing, enabling and clearing audit policies using auditpol

CEH - Session Hijacking

+

Session Hijacking Part 1

Session Hijacking Part 2

Session Hijacking Part 3

Session Hijacking Part 4

Session Hijacking Part 5

Session Hijacking Part 6

LAB: Session Hijacking using the Zed Attack Proxy (ZAP)

LAB: Sniffing Web Cookies by using Web Cookie Sniffer

LAB: Cookie Hijacking by using Paros HTTP session Hijacking Tool

LAB: Parameter Tampering to change the session by using Burpsuite

CEH - Hacking Webservers

+

Webserver Concepts & Webserver Attacks Part 1

Webserver Attacks Part 2

Webserver Attacks Part 3

Attack Methodology

Webserver Attack Tools

Countermeasures Part 1

Countermeasures Part 2

Countermeasures Part 3

Patch Management & Webserver Security Tools

Webserver Security Tools & Webserver Pen Testing

LAB: Enumerating Web Server Information by using NMAP

LAB: foot printing a webserver using the httprecon tool

LAB: foot printing a webserver using id serve

LAB: Exploiting Java vulnerability using metasploit framework

LAB: Hacking FTP Server in the Local Network

CEH - Hacking Web Applications

+

Hacking Web Applications Part 1

Hacking Web Applications Part 2

Hacking Web Applications Part 3

Hacking Web Applications Part 4

Hacking Web Applications Part 5

Hacking Web Applications Part 6

Hacking Web Applications Part 7

Hacking Web Applications Part 8

Hacking Web Applications Part 9

Hacking Web Applications Part 10

Hacking Web Applications Part 11

Hacking Web Applications Part 12

Hacking Web Applications Part 13

Hacking Web Applications Part 14

Hacking Web Applications Part 15

Hacking Web Applications Part 16

Hacking Web Applications Part 17

Hacking Web Applications Part 18

Hacking Web Applications Part 19

LAB: Website vulnerability scanning using Acunetix web vulnerability scanner

LAB: Hack E-commerce website by using Burpsuite on Kali Linux

LAB: Web vulnerability scanning by using Nikto on Kali Linux

LAB: Auditing Web Application Framework by using W3af

CEH - SQL Injection

+

SQL Injection Part 1

SQL Injection Part 2

SQL Injection Part 3

SQL Injection Part 4

SQL Injection Part 5

SQL Injection Part 6

SQL Injection Part 7

SQL Injection Part 8

SQL Injection Part 9

SQL Injection Part 10

SQL Injection Part 11

SQL Injection Part 12

SQL Injection Part 13

SQL Injection Part 14

SQL Injection Part 15

SQL Injection Part 16

SQL Injection Part 17

SQL Injection Part 18

SQL Injection Part 19

SQL Injection Part 20

SQL Injection Part 21

SQL Injection Part 22

SQL Injection Part 23

LAB: SQL injection Attack on Database by using HAVIJ

LAB: Testing for SQL Injection by using IBM Security APPScan Tool

LAB: Testing for SQL injection using webcruiser tool

LAB: Scanning web applications using n-stalker tool

CEH - Hacking Wireless Networks

+

Hacking Wireless Networks Part 1

Hacking Wireless Networks Part 2

Hacking Wireless Networks Part 3

Hacking Wireless Networks Part 4

Hacking Wireless Networks Part 5

Hacking Wireless Networks Part 6

Hacking Wireless Networks Part 7

Hacking Wireless Networks Part 8

Hacking Wireless Networks Part 9

Hacking Wireless Networks Part 10

Hacking Wireless Networks Part 11

Hacking Wireless Networks Part 12

Hacking Wireless Networks Part 13

Hacking Wireless Networks Part 14

Hacking Wireless Networks Part 15

Hacking Wireless Networks Part 16

Hacking Wireless Networks Part 17

Hacking Wireless Networks Part 18

LAB: Wi-Fi packet sniffing using airpcap with wireshark

LAB Identifying vulnerabilities and information disclosure in search engines using searchdiggity

LAB: Cracking a WEP network

CEH - Hacking Mobile Platforms

+
LAB: Mobile vulnerability scanning by using HeartBleed security scanner on Android
LAB: Network Port scanning by using NetScan on Android
LAB: Using Mobile Platform to Enforce a DOS Attack on a Website

LAB: Securing Android devices from malicious applications

Hacking Mobile Platforms Part 1

Hacking Mobile Platforms Part 2

Hacking Mobile Platforms Part 3

Hacking Mobile Platforms Part 4

Hacking Mobile Platforms Part 5

Hacking Mobile Platforms Part 6

Hacking Mobile Platforms Part 7

Hacking Mobile Platforms Part 8

Hacking Mobile Platforms Part 9

Hacking Mobile Platforms Part 10

Hacking Mobile Platforms Part 11

Hacking Mobile Platforms Part 12

CEH - Evading IDS, Firewalls, and Honeypots

+

Evading IDS, Firewalls, and Honeypots Part 1

Evading IDS, Firewalls, and Honeypots Part 2

Evading IDS, Firewalls, and Honeypots Part 3

Evading IDS, Firewalls, and Honeypots Part 4

Evading IDS, Firewalls, and Honeypots Part 5

Evading IDS, Firewalls, and Honeypots Part 6

Evading IDS, Firewalls, and Honeypots Part 7

Evading IDS, Firewalls, and Honeypots Part 8

Evading IDS, Firewalls, and Honeypots Part 9

Evading IDS, Firewalls, and Honeypots Part 10

LAB: Detecting intrusions by using Snort on Windows

LAB: Detecting malicious network traffic using honeybot

LAB: Detecting intruders and worms using kfsensor honeypot IDS

LAB: Bypassing firewall rules using HTTP/FTP tunneling

CEH - Cloud Computing

+

Cloud Computing Part 1

Cloud Computing Part 2

Cloud Computing Part 3

Cloud Computing Part 4

Cloud Computing Part 5

Cloud Computing Part 6

Cloud Computing Part 7

Cloud Computing Part 8

Cloud Computing Part 9

Cloud Computing Part 10

Cloud Computing Part 11

Cloud Computing Part 12

Cloud Computing Part 13

LAB: Building a cloud using owncloud and wampserver

LAB: Transferring cloud data over secure channel

LAB: Performing Cloud Vulnerability Assessment using Mobile based security scanner Zanti

CEH - Cryptography

+

Cryptography Part 1

Cryptography Part 2

Cryptography Part 3

Cryptography Part 4

Cryptography Part 5

Cryptography Part 6

Cryptography Part 7

Cryptography Part 8

Cryptography Part 9

LAB: Calculating MD5 hashes and verifying file integrity using quick checksum verifier

LAB: Calculating one way hashes using hashcalc

LAB: Calculating MD5 hashes using MD5 calculator

LAB: Understanding file and text encryption using cryptoforge

LAB: Basic data encryption using advanced encryption package

LAB: Encrypting and decrypting the data using bctextencoder

LAB: Creating and using self-signed certificate

LAB: Basic disk encryption using veracrypt
LAB: Basic data encrypting using rohos disk encryption
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.