• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Certified Professional Ethical Hacker

Certified Professional Ethical Hacker

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • 5 days

  • All levels

Description

Duration

5 Days

30 CPD hours

This course is intended for

This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers.

Overview

Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack.

Security Fundamentals

  • Overview

  • The Growth of

  • Environments and Security

  • Our Motivation?

  • The Goal: Protecting Information!

  • CIA Triad in Detail

  • Approach Security Holistically

  • Security Definitions

  • Definitions Relationships

  • Method: Ping

  • The TCP/IP Stack

  • Which Services Use Which Ports?

  • TCP 3-Way Handshake

  • TCP Flags

  • Malware

  • Types of Malware

  • Types of Malware Cont...

  • Types of Viruses

  • More Malware: Spyware

  • Trojan Horses

  • Back Doors

  • DoS

  • DDoS

  • Packet Sniffers

  • Passive Sniffing

  • Active Sniffing

  • Firewalls, IDS and IPS

  • Firewall ? First

  • Line of Defense

  • IDS ? Second Line of Defense

  • IPS ? Last Line of Defense?

  • Firewalls

  • Firewall Types:

  • (1) Packet Filtering

  • Firewall Types:

  • (2) Proxy Firewalls

  • Firewall Types ?

  • Circuit-Level Proxy Firewall

  • Type of Circuit-

  • Level Proxy ? SOCKS

  • Firewall Types ?

  • Application-Layer Proxy

  • Firewall Types: (3) Stateful

  • Firewall Types:

  • (4) Dynamic Packet-Filtering

  • Firewall Types:

  • (5) Kernel Proxies

  • Firewall Placement

  • Firewall Architecture

  • Types ? Screened Host

  • Multi- or Dual-Homed

  • Screened Subnet

  • Wi-Fi Network Types

  • Wi-Fi Network Types

  • Widely Deployed Standards

  • Standards Comparison

  • 802.11n - MIMO

  • Overview of Database Server

  • Review

Access Controls

  • Overview

  • Role of Access Control

  • Definitions

  • More Definitions

  • Categories of Access Controls

  • Physical Controls

  • Logical Controls

  • ?Soft? Controls

  • Security Roles

  • Steps to Granting Access

  • Access Criteria

  • Physical Access

  • Control Mechanisms

  • Biometric System Types

  • Synchronous Token

  • Asynchronous Token Device

  • Memory Cards

  • Smart Card

  • Cryptographic Keys

  • Logical Access Controls

  • OS Access Controls

  • Linux Access Controls

  • Accounts and Groups

  • Password &

  • Shadow File Formats

  • Accounts and Groups

  • Linux and UNIX Permissions

  • Set UID Programs

  • Trust Relationships

  • Review

Protocols

  • Protocols Overview

  • OSI ? Application Layer

  • OSI ? Presentation Layer

  • OSI ? Session Layer

  • Transport Layer

  • OSI ? Network Layer

  • OSI ? Data Link

  • OSI ? Physical Layer

  • Protocols at

  • Each OSI Model Layer

  • TCP/IP Suite

  • Port and Protocol Relationship

  • Conceptual Use of Ports

  • UDP versus TCP

  • Protocols ? ARP

  • Protocols ? ICMP

  • Network Service ? DNS

  • SSH Security Protocol

  • SSH

  • Protocols ? SNMP

  • Protocols ? SMTP

  • Packet Sniffers

  • Example Packet Sniffers

  • Review

Cryptography

  • Overview

  • Introduction

  • Encryption

  • Cryptographic Definitions

  • Encryption Algorithm

  • Implementation

  • Symmetric Encryption

  • Symmetric Downfalls

  • Symmetric Algorithms

  • Crack Times

  • Asymmetric Encryption

  • Public Key

  • Cryptography Advantages

  • Asymmetric

  • Algorithm Disadvantages

  • Asymmetric

  • Algorithm Examples

  • Key Exchange

  • Symmetric versus Asymmetric

  • Using the

  • Algorithm Types Together

  • Instructor Demonstration

  • Hashing

  • Common Hash Algorithms

  • Birthday Attack

  • Example of a Birthday Attack

  • Generic Hash Demo

  • Instructor Demonstration

  • Security Issues in Hashing

  • Hash Collisions

  • MD5 Collision Creates

  • Rogue Certificate Authority

  • Hybrid Encryption

  • Digital Signatures

  • SSL/TLS

  • SSL Connection Setup

  • SSL Hybrid Encryption

  • SSH

  • IPSec - Network Layer Protection

  • IPSec

  • IPSec

  • Public Key Infrastructure

  • Quantum Cryptography

  • Attack Vectors

  • Network Attacks

  • More Attacks (Cryptanalysis)

  • Review

Why Vulnerability Assessments?

  • Overview

  • What is a

  • Vulnerability Assessment?

  • Vulnerability Assessment

  • Benefits of a

  • Vulnerability Assessment

  • What are Vulnerabilities?

  • Security Vulnerability Life Cycle

  • Compliance and Project Scoping

  • The Project

  • Overview Statement

  • Project Overview Statement

  • Assessing Current

  • Network Concerns

  • Vulnerabilities in Networks

  • More Concerns

  • Network Vulnerability

  • Assessment Methodology

  • Network Vulnerability

  • Assessment Methodology

  • Phase I: Data Collection

  • Phase II: Interviews, Information Reviews, and Hands-On Investigation

  • Phase III: Analysis

  • Analysis cont.

  • Risk Management

  • Why Is Risk

  • Management Difficult?

  • Risk Analysis Objectives

  • Putting Together

  • the Team and Components

  • What Is the Value of an Asset?

  • Examples of Some Vulnerabilities that Are Not Always Obvious

  • Categorizing Risks

  • Some Examples

  • of Types of Losses

  • Different Approaches

  • to Analysis

  • Who Uses What?

  • Qualitative Analysis Steps

  • Quantitative Analysis

  • ALE Values Uses

  • ALE Example

  • ARO Values and Their Meaning

  • ALE Calculation

  • Can a Purely Quantitative Analysis Be Accomplished?

  • Comparing Cost and Benefit

  • Countermeasure Criteria

  • Calculating Cost/Benefit

  • Cost of a Countermeasure

  • Can You Get Rid of All Risk?

  • Management?s Response to Identified Risks

  • Liability of Actions

  • Policy Review

  • (Top-Down) Methodology

  • Definitions

  • Policy Types

  • Policies with Different Goals

  • Industry Best

  • Practice Standards

  • Components that Support the Security Policy

  • Policy Contents

  • When Critiquing a Policy

  • Technical (Bottom-Up)

  • Methodology

  • Review

Vulnerability Tools of the Trade

  • Vulnerability Scanners

  • Nessus

  • SAINT ? Sample Report

  • Tool: Retina

  • Qualys Guard

  • http://www.qualys.com/products/overview/

  • Tool: LANguard

  • Microsoft Baseline Analyzer

  • MBSA Scan Report

  • Dealing with Assessment Results

  • Patch Management Options

  • Review

Output Analysis and Reports

  • Overview

  • Staying Abreast: Security Alerts

  • Vulnerability Research Sites

  • Nessus

  • SAINT

  • SAINT Reports

  • GFI Languard

  • GFI Reports

  • MBSA

  • MBSA Reports

  • Review

Reconnaissance, Enumeration & Scanning

  • Reconnaissance Overview

  • Step One in the

  • Hacking ?Life-Cycle?

  • What Information is

  • Gathered by the Hacker?

  • Passive vs. Active Reconnaissance

  • Footprinting Defined

  • Social Access

  • Social Engineering Techniques

  • Social Networking Sites

  • People Search Engines

  • Internet Archive:

  • The WayBack Machine

  • Footprinting Tools Overview

  • Maltego GUI

  • Johnny.Ihackstuff.com

  • Google (cont.)

  • Domain Name Registration

  • WHOIS Output

  • DNS Databases

  • Using Nslookup

  • Traceroute Operation

  • Web Server Info Tool: Netcraft

  • Introduction to Port Scanning

  • Which Services

  • use Which Ports?

  • Port Scan Tips

  • Port Scans Shou

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews