Certified Ethical Hacker

he five-day training course will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Join us to learn and reinforce your skills on how global leaders have done this effectively at the CEH Workshop, Kingdom of Bahrain. At the Workshop, you will explore the major shifts in IT Security and network management segments. You not only will learn first-hand how to recognize and respond to these shifts, but also can network with colleagues who are successfully navigating these areas of development. In this practical, intensive, hands-on workshop, our experts will teach how to excel in the field of IT, network and web security implementations, and more importantly how to keep hackers away.

Learning Objectives

At the end of the Training program you will
  • Apply countermeasures to secure your system against threats
  • Test access to your data using ethical hacking techniques
  • Implement real-world hacking techniques to test system security
  • Employ complex tools to identify and analyze your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure
  • The course will provide great learning and networking opportunities to delegates and industry experts. Here is a list of some of the top areas that will be covered at the training program. Ethical Hacking Fundamentals
    Considering the effects of hacking
    Reviewing the elements of information security
    The security, functionality and usability triangle
    Outlining the methods of hackers
    Reconnaissance
    Scanning
    Gaining access
    Maintaining access
    Covering tracks
    Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration
    Functions of an ethical hacker
    Conducting vulnerability research
    Identifying elements of information warfare
    Applying Covert Techniques to Scan and Attack a Network
    Footprinting and reconnaissance
    Objectives and methods of footprinting
    Searching for information with Google Hacking
    Employing footprinting countermeasures
    Scanning networks
    Adopting multiple scanning techniques
    Identifying IDS–evasion and IP–fragmentation tools
    Leveraging vulnerability scanning tools
    Applying IP spoofing detection
    Examining enumeration techniques
    Enumerating user accounts using default passwords
    Simple Network Management Protocol (SNMP) enumeration
    Analyzing System Risks and Weaknesses to Apply Countermeasures
    System hacking
    CEH Hacking Methodology (CHM)
    Cracking passwords and escalating privileges
    Defending against password cracking and keyloggers
    Hiding information with steganography
    Uncovering Trojans and backdoors
    Injecting a Trojan into a host
    Analyzing Trojan activity
    Dissecting viruses, worms and sniffers
    Distributing malware on the web
    Recognizing key indicators of a virus attack
    Analyzing worms and malware
    Social engineering and Denial–of–Service (DoS)
    Targets, intrusion tactics and strategies for prevention
    Mitigating the risks of social networking to networks
    Recognizing symptoms and techniques of a DoS attack
    Implementing tools to defend against DoS attacks
    Assessing and Preventing Gaps in a Network Infrastructure
    Hacking web applications and wireless networks
    Cross–Site Scripting (XSS) and web application DoS attacks
    Defending against SQL injection
    Implementing a man–in–the–middle attack
    Hijacking sessions and web servers
    Spoofing a site to steal credentials
    Preventing hijacking by implementing countermeasures
    Leveraging Metasploit in an attack
    Evading IDS, firewalls and honeypots
    Assessing various types of Intrusion Detection Systems (IDS) and tools
    Bypassing firewalls and accessing blocked sites
    Buffer overflow and cryptography
    Exploiting input validation failures
    Defending against memory corruption attacks
    Performing Penetration Testing
    Performing security and vulnerability assessments
    Determining testing points and locations
    Announced vs. unannounced testing
  • Benefits of the CEH for Professionals

    The Certified Ethical Hacking Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. The five-day training course will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

    What does an Ethical Hacker do?

    An ethical hacker's evaluation of a system's security seeks answers to these basic questions:
  • What can an intruder see on the target systems?
  • What can an intruder do with that information?
  • Does anyone at the target notice the intruder's attempts or successes?
  • What are you trying to protect?
  • What are you trying to protect against?
  • How much time, effort, and money are you willing to expend to obtain adequate protection?

    Once answers to these questions have been determined, a security evaluation plan is drawn up that identifies the systems to be tested, how they should be tested, and any limitations on that testing.

  • IT Management Professionals, Security Professionals, Information Systems Auditors, IT Service personnel, (Anyone responsible or keen to bring visible breakthrough improvements in keeping your organisation's information assets safe and secure). This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This class is a must for networking professionals, IT managers and decision-makers that need to understand the security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people that know information security. This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.