P. 1
Certified Ethical Hacker Version 7

Certified Ethical Hacker Version 7

|Views: 111|Likes:
Published by passwordfortesting

More info:

Published by: passwordfortesting on Apr 06, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/23/2013

pdf

text

original

Certified Ethical Hacker Version 7 – Course Syllabus

Engineered by Hackers. Presented by Professionals CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

Exam Information:
CEH v7 Exam (312-50) Exam Details
• • • •

Number of Questions: 150 Passing Score: 70% Test Duration: 4 hours Test Format: Multiple choice

02-7101462 ‫ﺇﺷﺎﺭﺓ ﺍﻟﻧﺳﻳﻡ –ﻣﺟﻣﻊ ﺍﻟﺣﻣﺎﻳﺩﺓ ﺍﻟﺗﺟﺎﺭﻱ –ﻁ1 –ﺇﺭﺑﺩ-ﺍﻷﺭﺩﻥ ,ﻫﺎﺗﻑ 1641017-20, ﻓﺎﻛﺱ‬

ﻓﺎﻛﺱ‬ .Module 1: Introduction to Ethical Hacking • • • • • • Elements of Information Security Security Challenges Effects of Hacking Who is a Hacker? Hacking Phases Why do we need Ethical Hacking? Module 2: Footprinting and Reconnaissance • • • • • • Introduction to Footprinting WHOIS Footprinting DNS Footprinting Network Footprinting Website Footprinting Footprinting Tools ( LAB ) Module 3: Scanning Networks • • • • Introduction to Network Scanning Scanning Techniques Drawing Network Diagrams Scanning Countermeasures Module 4: Enumeration • • • • Introduction to Enumeration Enumeration Types Enumerating User Accounts. Module 5: System Hacking • • • • • • Password Cracking Types of Password Attacks Keyloggers Spyware Detecting RootKits Covering Tracks 02-7101462 ‫ﺇﺷﺎﺭﺓ ﺍﻟﻧﺳﻳﻡ –ﻣﺟﻣﻊ ﺍﻟﺣﻣﺎﻳﺩﺓ ﺍﻟﺗﺟﺎﺭﻱ –ﻁ1 –ﺇﺭﺑﺩ-ﺍﻷﺭﺩﻥ . Enumeration Countermeasures.ﻫﺎﺗﻑ 1641017-20.

Types of Sniffing. Module 8: Sniffers. How to deploy a Trojan Types of Trojans Anti-Trojans Software Penetration Testing Module 7: Viruses and Worms • • • • • • • Introduction to Viruses Stages of a Virus Life. Identify Theft. MAC Attacks DHCP Attacks ARP Poisoning. 02-7101462 ‫ﺇﺷﺎﺭﺓ ﺍﻟﻧﺳﻳﻡ –ﻣﺟﻣﻊ ﺍﻟﺣﻣﺎﻳﺩﺓ ﺍﻟﺗﺟﺎﺭﻱ –ﻁ1 –ﺇﺭﺑﺩ-ﺍﻷﺭﺩﻥ . Working with viruses.ﻫﺎﺗﻑ 1641017-20. Writing a Simple Virus Program Computer Worms Malware Analysis Procedure.Module 6: Trojans and Backdoors • • • • • • What is a Trojan ? Trojan Attacks and Indications. ﻓﺎﻛﺱ‬ . Countermeasures. Hardware Protocol Analyzers. Spoofing Attacks Sniffing Tools. • • • • • • What is Social Engineering? Phases of a Social Engineering Attack Social Engineering Through Impersonation on Social Networking Sites. Wiretapping. Module9: Social Engineering. • • • • • • • • • • Lawful Intercept. How to Steal Identity? Social Engineering Pen Testing. Anti-Virus Tools.

Spoofing vs. Web Server Attack Tools. Unvalidated Input Parameter / Form Tampering.Module 10: Denial Of Service. How Web Applications Work? Web Applications Architecture. Web Server Pen Testing. Injection Flaws. How to defend a web Server. Module 12: Hacking Web servers. ﻓﺎﻛﺱ‬ . DDoS Case Study. Module 11: Session Hijacking • • • • • • • • • • What is Session hijacking? Hijacking Techniques. Brute Forcing. IIS Web Server Architecture. Web Application Attacks. IPSec Architecture. Hidden and Manipulated Attacks. TCP/IP Hijacking. Hijacking Tools. Cross Site Scripting. 02-7101462 ‫ﺇﺷﺎﺭﺓ ﺍﻟﻧﺳﻳﻡ –ﻣﺟﻣﻊ ﺍﻟﺣﻣﺎﻳﺩﺓ ﺍﻟﺗﺟﺎﺭﻱ –ﻁ1 –ﺇﺭﺑﺩ-ﺍﻷﺭﺩﻥ . Types of Session Hijacking Session Hijacking in OSI Model. • • • • • • • • Open Source Web Server Architecture. Module 13: Hacking Web Applications. Penetration Testing. Protection Tools. • • • • • • • • Introduction to Web Applications. Hijacking.ﻫﺎﺗﻑ 1641017-20. • • • • • • What is a DoS and DDoS Attack ? How DDoS Attacks Work? Symptoms of a DoS Attack DoS Attack Techniques. Why Web Servers Are Compromised? Impact of a Web Server Attack.

How to defend against Wireless Attacks. Wi_FI Authentication Modes. Wireless Threats. • • • • • • • • • • Introduction to Wireless Networks. Honeypot. What is a Blind SQL Injection? SQL Injection Tools. WEP Encryption WPA / WPA2 Encryption. Types of Firewalls. Firewall Evading Tools. Web Application Pen Testing. ﻓﺎﻛﺱ‬ . Firewalls. Wireless Hacking Tools. and Honeypots. • • • • • • • • • • • Intursion Detection Systems ( IDS ). Ways to detect an Intrusion. Module15: Hacking Wireless Networks. Types of honeypot. Evading IDS. • • • • • • Introduction to SQL Injection. Threats of SQL Injection Attacks. 02-7101462 ‫ﺇﺷﺎﺭﺓ ﺍﻟﻧﺳﻳﻡ –ﻣﺟﻣﻊ ﺍﻟﺣﻣﺎﻳﺩﺓ ﺍﻟﺗﺟﺎﺭﻱ –ﻁ1 –ﺇﺭﺑﺩ-ﺍﻷﺭﺩﻥ . Wireless Hacking Methodology. Bluetooth Hacking.• • • • Hacking Mehodology Web Application Security Tools. Firewall Identification Techniques. Wireless Penetration Testing Framework. Web Application Firewalls.ﻫﺎﺗﻑ 1641017-20. Detecting Honeypots. Types of Intrusion Detection Systems. Simple / Union Injection Attacks. SQL Injection Detection. Module 16: Evading IDS . Module 14: SQL Injection. Evading Firewalls.

Risk Management . • • • • • • • • • • • • • Introduction to Cryptography Ciphers. RC5. • • • • • • • • • Penetration Testing ( PT ). Hacker Shield. Denial of Service Emulation. 02-7101462 ‫ﺇﺷﺎﺭﺓ ﺍﻟﻧﺳﻳﻡ –ﻣﺟﻣﻊ ﺍﻟﺣﻣﺎﻳﺩﺓ ﺍﻟﺗﺟﺎﺭﻱ –ﻁ1 –ﺇﺭﺑﺩ-ﺍﻷﺭﺩﻥ . • • • • • • • Buffer Overflows. Stack-Based / Heap Based Overflows. Disk Encryption. Public Key Infrastructure ( PKI ). SSS ( Secure Socket Layer). Advanced Encryption Standard ( AES ) RC4 . Rc6 Algorithms. Automated Testing. Stack Operations. Message Digest 5 ( MD5 ).ﻫﺎﺗﻑ 1641017-20.Module 17: Buffer Overflow. ﻓﺎﻛﺱ‬ . BoF Detection Tools. Examples of Buffer Overflow Attacks. Module 18: Cryptography. Module 19: Penetration Testing. Buffer overflow Steps. Secure Hashing Algorithm ( SHA ). Enumerating Devices. Digital Signatures. RSA ( Rivest Shamir Adleman ). Pentest using various Devices. Smashing the Stack. Manual Testing. Cryptography Attacks. Security Assessments. Cryptography Tools.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->