Training Programs Cybersecurity Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
cart-icn

You already have a course in your cart

You can only add one course to your cart at a time! By adding this course, you will replace the existing course from your cart. How would you like to proceed?

Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)

Discover vulnerabilities before the bad guys do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs.

Infosec-Ethical-Hacking-Dual-Certification-Boot-Camp-CEH-and-PenTest-Plus
$4,599.00 (USD)

Have a question?We're here to help

Overview

Objective

Outline

  1. Day 1- Ethical Hacking & Penetration Testing Methodologies
    1. Security testing methodologies
    2. The ethical hacking profession
    3. Planning and scoping an engagement
    4. Legal and compliance considerations
    5. Ethical hacking methodologies
    6. Tools of the trade
    7. Linux overview
    8. Passive intelligence gathering
    9. Abusing DNS and SNMP
    10. Security testing methodologies
  2. Day 2 - Network Scanning and Service Identification
    1. Understanding TCP packets and structures
    2. Passive network discovery and scanning
    3. TCP scanning
    4. Using differences in RFC implementations to your advantage
    5. Scanning through firewalls
    6. How to prevent the discovery of your reconnaissance activities
    7. Using zombies to mask network scanning
    8. Avoiding IDS/IPS detection
    9. Proper identification of services
    10. Vulnerability identification
  3. Day 3 - Vulnerabilities
    1. Vulnerability life cycles
    2. Types of vulnerabilities
    3. Flaws in encryption
    4. Configuration errors
    5. Buffer overflows
    6. Stack overflows
    7. Vulnerability mapping
    8. Exploit utilization and delivery methods
    9. Client side exploits
    10. Server side exploits
    11. Password security
    12. Social engineering techniques
    13. Attacking physical controls
    14. Hashing
    15. Rainbow tables
    16. Attacking Windows password security
    17. Weaknesses in Windows authentication protocols
  4. Day 4 - Exfiltration of Data & SQL Injection
    1. Use of Trojans
    2. Redirecting ports to thwart firewall rules
    3. Avoiding anti-virus detection
    4. Lateral movement and persistence
    5. Use of keyloggers
    6. IDS operations and avoidance
    7. Encrypting your communications
    8. Protocol abuse for covert communications
    9. Creating custom encryption tunneling applications
    10. E-shoplifting
    11. XSS attacks
    12. Cross site forgery
    13. Circumventing authentication
    14. SQL injection discovery and exploitation
    15. SQL data extraction
  5. Day 5 - Wireless Security, Basic Scripts for Ethical Hacking & Covering Your Tracks
    1. Sniffing in different environments
    2. Attack sniffers
    3. Man-in-the-middle attacks
    4. Wireless networking
    5. Shared key authentication weaknesses
    6. WEP/WPA/WPA2 cracking
    7. Anti-forensics
    8. Log modification/deletion
    9. Rootkits
    10. Introduction to scripting
    11. Common script components
    12. Writing effective reports
    13. Providing mitigation recommendations
    14. CEH exam review
    15. PenTest+ exam review

Requirements

Prerequisites

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO

Instructor

FAQs

Reviews

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO
Georgia Southern University

PO Box 8124
Continuing Education
Statesboro, GA 30460 US
MAIN CONTENT

Copyright © 1997 - 2024 All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Cengage Learning. Privacy Policy