Ethical Hacking – (Pentest+ / CEH)

Ethical Hacking

Course Description:  

This course helps the student master the skill of an Ethical Hacker and Penetration Tester. Ethical hacks and penetration testers are a skilled professionals who understands and know how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).
This course helps the student prepare for the CompTIA Pentest+ (PT0-001) exam or the EC-Council Certified Ethical Hacker (312-50) exam.

Course Objectives: Upon successful completion of this course, the student will be able to:

Prepare

    Given a scenario, perform reconnaissance
    • Perform reconnaissance with operating system tools
    • Perform reconnaissance with hacking tools
  • Given a scenario, perform scanning
    • Scan for network devices
    • Discover wireless devices
    • Scan for IoT devices
    • Detect operating systems and applications
    • Identify open ports
    • Scan for vulnerabilities
  • Given a scenario, perform enumeration
    • Enumerate network resources
    • Enumerate device information

Gain Access

    Given a scenario, obtain login credentials
    • Obtain credentials using tools
    • Use Social Engineering
  • Given a scenario, gain administrative access and escalate privileges
    • Gain access through a backdoor
    • Escalate privileges
    • Hijack a web session
    • Crack Wi-Fi devices

Attack

    Given a scenario, perform passive online attacks
    • Examine hidden web form fields
    • Conduct a man-in-the-middle attack
    • Perform passive sniffing
  • Given a scenario, perform active online attacks
    • Perform an SQL injection
    • Execute a DoS or DDoS attack
    • Perform active sniffing
  • Given a scenario, perform infrastructure attacks
    • Attack a web server
    • Access wireless networks
    • Evade firewalls, IDSs, and honeypots

Cover Up

    Given a scenario, cover up access
    • Disable auditing
    • Clear logs
    • Remove or hide files and folders
    • Change MAC address

Defend a System

    Given a scenario, defend systems and devices
    • Hide a web server banner broadcast
    • Discover rogue hosts and configure protection
    • Secure mobile devices
    • Configure account policies and account control
    • Ensure file integrity
    • Implement drive encryption
    • Use malware protection
  • Given a scenario, implement defensive systems
    • Implement an Intrusion Detection System (IDS)
    • Create a honeypot
    • Prevent DNS zone transfer
    • Disable unnecessary services
    • Implement physical security countermeasures
    • Configure a perimeter firewall

Comments are closed.