You are on page 1of 6

8/30/2017 ICT Training

Course List
Home (home) - Course List

Certi ed Ethical Hacking

(CEH) program is the core of the most desired information security training system any
information security professional

Description Course Outline Instructor CV Comments

Certi ed Ethical Hacking

http://www.ict-training.mn/course/7 1/6
8/30/2017 ICT Training

CEHv9 consists of 20 core modules designed to facilitate a comprehensive


ethical hacking and penetration testing training.

Introduction to Ethical Hacking


Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Malware Threats
Evading IDS Firwall and Honeypots
Sni ng
Social Engineering
Denial of Service
Session Hijacking
Hacking Web servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Cloud Computing
Cryptography Verdena

VIdeo Course Content

1. Welcome
2. Building a LAB Concepts
3. Building a LAB Networking
4. Deploy a Kali Linux VM
5. Adding Metasploitable to your Lab
6. Adding Windows to your Lab
7. Con gure a Static IP on Kali Linux
8. Windows Evaluations
9. Deploy Windows 8.1
10. Deploy Windows 2012
11. Deploy Windows 10
12. Deploy Windows 2016
13. Ethics and Hacking
14. Hacking Vocabulary
15. InfoSec Concepts
16. Attack Categories, Types and , Vector
17. 5 Phases of Hacking
18. Footprinting and Reconnaissance
19. Search Engine Tools
20. Hacking using Google
21. WebSite Recon Tools
http://www.ict-training.mn/course/7 2/6
8/30/2017 ICT Training

22. Metagoo l Metadata Tool


23. Email Headers for Footprinting
24. Using WHOIS for Recon
25. DNS TOOLS
26. Network Scanning Overview
27. Network Scanning Mehodology
28. Port Discovery
29. Network Scanning tools
30. Stealth Idle Scanning
31. OS and Application Fingerprinting
32. Vulnerability Scanning
33. Network Mapping Tools
34. Proxy Servers
35. Using Public Proxy Services
36. Enumeration Concepts
37. NetBIOS Enumeration
38. SNMP Enumeration Concepts
39. SNMP Enumeration
40. LDAP Enumeration Concepts
41. LDAP Enumeration Example
42. NTP Enumeration
43. SMTP Enumeration
44. System Hacking Overview
45. Password Cracking Concepts
46. Password Attack Example MITM and Sni ng
47. Rainbow Crack Lab Setup
48. Rainbow Crack demonstration
49. Password Reset Hacking
50. DHCP Starvation
51. Remote Access
52. Spyware
53. NTFS Alternate Data Steams Exploit
54. Steganography with SNOW
55. Steganography with OpenPuff
56. Covering Tracks
57. Malware Overview
58. Trojan Overview
59. Creating a Trojan
60. Virus Overview
61. Virus Creation
62. Detecting Malware
63. Malware Analysis
64. Hash File Veri cation
65. Sni ng Overview

http://www.ict-training.mn/course/7 3/6
8/30/2017 ICT Training

66. Cam table Attack Port Security


67. DHCP Snooping
68. Dynamic ARP Inspection
69. Social Engineering
70. Denial of Service (DOS)Attacks
71. Social hijacking
+97672. Hacking
75759997 Web Server
(tel:+976 75759997) info@ict-training.mn (mailto:info@ict-training.mn)
73. Buffer Over ow
74. OWASP Broken Web Application
75. Shellshock
76. SQL Introduction
(home)
77. SQL Injection
78. Web App Vulnerabilities Wordpress
79. Wireless Hacking
HOME (HOME)
80. Using an AndroidCOURSE
VM LIBRARY (ALLCOURSE) ABOUT (ABOUT) NEWS (NEWS/C/2)
81. Malware for Mobile
82. Mobile Device Risks and Best Practic
83. Firewall Evasion
84. Firewall ACL ExampleGALLERY (GALLERY) BLOG (BLOG) WALL OF SUCCESS (WALL)
85. IDS IPS Evasion
86. NAT and PAT fundementals
87. Honeypots
CONTACT US (CONTACT)
88. Cloud Computing
89. CIA Con dentially, Integrity, and Availability
90. Policies
91. Quantifying Risk
92. Separation of Duties
93. Symmetrical Encryption Concepts
94. Asymmetrical Encryption Concepts
95. Control Types
96. Multifactor Authentication
97. Centralized Identity Management
98. Kerberos and Single Sign on
99. Backups and Media Management
100. Operations Security Control
101. Physical Security Controls
102. Incident Response
103. VPNs
104. Disaster Recovery Planning
105. Pen Testing Tips
106. Useful Tools
107. Case Study
108. Additional Resources and Exam Prep

http://www.ict-training.mn/course/7 4/6
8/30/2017 ICT Training

Related Courses

Mikrotik MTCNA CCNA Security CCNP Routing


Certi cate Training. (Course/3) (Course/2)
(Course/8)
Install, operate, and troubleshoot a Learn to how to con gure,
medium-sized network, including implement advanced Dyna
Mikrotik Certi ed Network
connecting to a WAN and Routing protocols, PBR, IP
Associate.
implementing network security and IPv6

: 3
Instructor: CCIE Security Hours: 48 Instructor: CCIE R&S
: 810'000 ()
Lab: Real Firewall 18:30-21:30
: MTCNA

Course Menu


(ENROLL THIS COURSE)

(REGISTER/7)

http://www.ict-training.mn/course/7 5/6
8/30/2017 ICT Training

: 2,750,000

312-50

42

2016

Certi ed EC-Council Instructor [CEI]

EC-Council Circle Of Excellence Instructor

O cial guide book + Prepare Exam + Take the Exam


http://www.ict-training.mn/course/7 6/6

You might also like