• CATALOG
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN
      Forget your password?
  • Open Search Dialog
State University of New York - Canton
Home > Training Programs > Security > Certified Ethical Hacker (Voucher Included)
CALL
NOW

855.520.6806

Fill out the form below

By continuing you are agreeing to have ed2go contact you.
Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Certified Ethical Hacker (Voucher Included)

Certified Ethical Hacker (Voucher Included)
$2,895.00 (USD)

DETAILS

OUTLINE

  1. Introduction to Ethical Hacking
    1. Key issues plaguing the information security world
    2. Incident Management Process
    3. Penetration Testing
  2. Footprinting and Reconnaissance
    1. Various types of footprinting
    2. Footprinting tools
    3. Countermeasures
  3. Scanning Networks
    1. Network scanning techniques
    2. Scanning countermeasures
  4. Enumeration
    1. Enumeration techniques
    2. Enumeration countermeasures
  5. System Hacking
    1. System hacking methodology
    2. Steganography
    3. Steganalysis
    4. Attacks and covering tracks
  6. Malware Threats
    1. Different types of Trojans
    2. Trojan Analysis
    3. Trojan Countermeasures
    4. Working of Viruses
    5. Virus Analysis
    6. Computer Worms
    7. Malware Analysis Procedure
  7. Evading IDS, Firewalls and Honeypots
    1. Firewall
    2. IDS and Honeypot Evasion Techniques
    3. Evasion Tools
    4. Countermeasures
  8. Sniffing
    1. Packet sniffing techniques
    2. How to defend against sniffing
  9. Social Engineering
    1. Social Engineering techniques
    2. Identify theft
    3. Social Engineering
    4. Countermeasures
  10. Denial of Service
    1. DoS/DDoS attack techniques
    2. Botnets
    3. DDoS attack tools
    4. DoS/DDoS Countermeasures
  11. Session Hijacking
    1. Session hijacking techniques
    2. Countermeasures
  12. Hacking Web Servers
    1. Different types of webserver attacks
    2. Attack methodology
    3. Countermeasures
  13. Hacking Web Applications
    1. Different types of web application attacks
    2. Web Application
    3. Hacking Methodology
    4. Countermeasures
  14. SQL Injection
    1. SQL injection attacks
    2. Injection detection tools
  15. Hacking Wireless Networks
    1. Wireless Encryption
    2. Wireless hacking methodology
    3. Wireless Hacking Tools
    4. Wi-Fi- Security Tools
  16. Hacking Mobile Platforms
    1. Mobile Platform Attack Vector
    2. Android Vulnerabilities
    3. Jailbreaking
    4. iOS, windows phone 8 vulnerabilities
    5. Mobile Security Guidelines and Tools
  17. Cloud Computing
    1. Various Cloud Computing Concepts
    2. Threats, Attacks, and Security
    3. Techniques and Tools
  18. Cryptography
    1. Different types of Cryptography Ciphers
    2. Public Key Infrastructure (PKI)
    3. Cryptography Attacks
    4. Cryptanalysis Tools

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

State University of New York - Canton
CREST
34 Cornell Drive
Canton, NY 13617 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.