CEH: Certified Ethical Hacker Course Content
Total Page:16
File Type:pdf, Size:1020Kb
CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 Course Content Course Description: The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The ve phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and x the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security. www.tcworkshop.com Pages 1 of 29 800.639.3535 CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 Target Student: This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure. Prerequisites: N/A Topics: Module 1: Introduction to Ethical Hacking . Application-Level Attacks Internet is Integral Part of Business and Examples of Personal Life - What Happens Online in 60 Application-Level Seconds Attacks Information Security Overview . Shrink Wrap Code Attacks o Case Study o Information Warfare . eBay Data Breach Hacking Concepts, Types, and Phases . Google Play Hack o What is Hacking . The Home Depot Data o Who is a Hacker? Breach o Hacker Classes o Year of the Mega Breach o Hacking Phases o Data Breach Statistics . Reconnaissance o Malware Trends in 2014 . Scanning o Essential Terminology . Gaining Access o Elements of Information Security . Maintaining Access o The Security, Functionality, and . Clearing Tracks Usability Triangle Ethical Hacking Concepts and Scope Information Security Threats and Attack o What is Ethical Hacking? Vectors o Why Ethical Hacking is Necessary o Motives, Goals, and Objectives of o Scope and Limitations of Ethical Information Security Attacks Hacking o Top Information Security Attack o Skills of an Ethical Hacker Vectors Information Security Controls o Information Security Threat o Information Assurance (IA) Categories o Information Security Management o Types of Attacks on a System Program . Operating System Attacks o Threat Modeling Examples of OS o Enterprise Information Security Vulnerabilities Architecture (EISA) . Misconfiguration Attacks o Network Security Zoning www.tcworkshop.com Pages 2 of 29 800.639.3535 CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 o Defense in Depth o ISO/IEC 27001:2013 o Information Security Policies o Health Insurance Portability and . Types of Security Policies Accountability Act (HIPAA) . Examples of Security Policies o Sarbanes Oxley Act (SOX) . Privacy Policies at o The Digital Millennium Copyright Workplace Act (DMCA) and Federal . Steps to Create and Information Security Management Implement Security Policies Act (FISMA) . HR/Legal Implications of o Cyber Law in Different Countries Security Policy Enforcement o Physical Security Module 02: Footprinting and Reconnaissance . Physical Security Controls Footprinting Concepts o Incident Management o What is Footprinting? . Incident Management o Objectives of Footprinting Process Footprinting Methodology . Responsibilities of an o Footprinting through Search Incident Response Team Engines o What is Vulnerability Assessment? . Finding Company’s Public . Types of Vulnerability and Restricted Websites Assessment . Determining the Operating . Network Vulnerability System Assessment Methodology . Collect Location Information . Vulnerability Research . People Search: Social . Vulnerability Research Networking Services Websites . People Search Online o Penetration Testing Services . Why Penetration Testing . Gather Information from . Comparing Security Audit, Financial Services Vulnerability Assessment, . Footprinting through Job and Penetration Testing Sites . Blue Teaming/Red Teaming . Monitoring Target Using . Types of Penetration Testing Alerts . Phases of Penetration Testing . Information Gathering Using . Security Testing Groups, Forums, and Blogs Methodology o Footprinting using Advanced . Penetration Testing Google Hacking Techniques Methodology . Google Advance Search Information Security Laws and Standards Operators o Payment Card Industry Data . Finding Resources Using Security Standard (PCI-DSS) Google Advance Operator www.tcworkshop.com Pages 3 of 29 800.639.3535 CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 . Google Hacking Database . Competitive Intelligence - (GHDB) What Expert Opinions Say . Information Gathering Using About the Company Google Advanced Search . Monitoring Website Traffic o Footprinting through Social of Target Company Networking Sites . Tracking Online Reputation . Collect Information through of the Target Social Engineering on Social Tools for Tracking Networking Sites Online Reputation of . Information Available on the Target Social Networking Sites o WHOIS Footprinting o Website Footprinting . WHOIS Lookup . Website Footprinting using . WHOIS Lookup Result Web Spiders Analysis . Mirroring Entire Website . WHOIS Lookup Tools Website Mirroring . WHOIS Lookup Tools for Tools Mobile . Extract Website Information o DNS Footprinting from http://www.archive.org . Extracting DNS Information . Monitoring Web Updates . DNS Interrogation Tools Using Website Watcher o Network Footprinting Web Updates . Locate the Network Range Monitoring Tools . Traceroute o Email Footprinting . Traceroute Analysis . Tracking Email . Traceroute Tools Communications o Footprinting through Social Collecting Engineering Information from . Footprinting through Social Email Header Engineering Email Tracking Tools . Collect Information Using o Competitive Intelligence Eavesdropping, Shoulder . Competitive Intelligence Surfing, and Dumpster Gathering Diving . Competitive Intelligence - Footprinting Tools When Did this Company o Footprinting Tool Begin? How Did it Develop? . Maltego . Competitive Intelligence - . Recon-ng What Are the Company's o Additional Footprinting Tools Plans? www.tcworkshop.com Pages 4 of 29 800.639.3535 CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 Footprinting Countermeasures IDLE/IPID Header Footprinting Penetration Testing Scan o Footprinting Pen Testing IDLE Scan: Step 1 o Footprinting Pen Testing Report Templates IDLE Scan: Step 2 and 3 Module 03: Scanning Networks UDP Scanning Overview of Network Scanning ICMP Echo o TCP Communication Flags Scanning/List Scan o TCP/IP Communication . Scanning Tool: NetScan o Creating Custom Packet Using TCP Tools Pro Flags . Scanning Tools CEH Scanning Methodology . Scanning Tools for Mobile o Check for Live Systems . Port Scanning . Checking for Live Systems - Countermeasures ICMP Scanning o Scanning Beyond IDS . Ping Sweep . IDS Evasion Techniques Ping Sweep Tools . SYN/FIN Scanning Using IP o Check for Open Ports Fragments . SSDP Scanning o Banner Grabbing . Scanning IPv6 Network . Banner Grabbing Tools . Scanning Tool . Banner Grabbing Nmap Countermeasures Hping2 / Hping3 Disabling or Hping Commands Changing Banner . Scanning Techniques Hiding File TCP Connect / Full Extensions from Web Open Scan Pages Stealth Scan (Half- o Scan for Vulnerability open Scan) . Vulnerability Scanning Inverse TCP Flag . Vulnerability Scanning Tool Scanning Nessus Xmas Scan GAFI LanGuard ACK Flag Probe Qualys FreeScan Scanning . Network Vulnerability Scanners . Vulnerability Scanning Tools for Mobile www.tcworkshop.com Pages 5 of 29 800.639.3535 CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 o Draw Network Diagrams Module 04: Enumeration . Drawing Network Diagrams Enumeration Concepts . Network Discovery Tool o What is Enumeration? Network Topology o Techniques for Enumeration Mapper o Services and Ports to Enumerate OpManager and NetBIOS Enumeration NetworkView o NetBIOS Enumeration Tool . Network Discovery and . SuperScan Mapping Tools . Hyena . Network Discovery