Search in
Courses Providers, List Your Courses for FREE
Menu

Certified Ethical Hacker (CEH)


Accord infoMatrix
Certificate

by Accord infoMatrix


Chennai
Request Info
Subjects Covered & Categories
Learn: Certified Ethical Hacker (CEH) | Ethical Hacking

Category: IT Certification | IT Security and Ethical Hacking


Basic Details
Medium of instruction:English
Overview, Content & Syllabus

Accord infor Matrix offers best CEH training in chennai. We offer internship in real -life business application of our clients. Students are given practical training in the below mentioned syllabus. The syallbus can be customized according to individual needs.

Hacking

  • Explaining the certicication

  • Introducing security

  • Introducing Hacking

  • Introduction to Ethical Hacking

Lesson 2: Foot Printing

  • Defining Foot Printing

  • Information Gathering Methodology

  • Locate the Network Range

  • Hacking Tools

Lesson 3: Scanning

  • Definition of scanning

  • Types of scanning

  • Objectives of Scanning

  • Scanning Methodology

  • Classification of Scaning

  • Hacking Tools

  • Countermeasures

Lesson 4: Enumeration

  • What is Enumeration?

  • NetBIOS Null Sessions

  • Hacking Tools

  • Enumerating User Accounts

  • Oactive Directoru Enumeration and Countermeasures

Lesson 5: System Hacking

  • Administrator Password Guessing

  • Manual Password Cracking Algorithm

  • Automated Password Cracking

  • Password Types

  • Tupes of Password Atacks

  • Hacking Tools

  • Countermeasures: IP Security

Lesson 6: Trojans and Backdoors

  • Effect on Business

  • What is a Trojan?

  • Overt and Covert Channels

  • Indications of a Trojan Attack

  • Reverse Engineering Tojans

  • Backdoor Countermeasures

Lesson 7: Sniffers

  • Definition of sniffing

  • How a sniffing wors?

  • Passive Sniffing

  • Active Sniffing

  • Hacking Tools

  • Sniffing Countermeasures

Lesson 8: Denial of Service

  • What is Denial of Srvice?

  • Goal of Dos (Denial of Service)

  • Impact and modes of Attack

  • DOS Attack Classification

  • Hacking Tools

  • Countermeasures for Reflected DOS

  • Tools for Detecting DDOS Attacks

Lesson 9: Social Enginnering

  • What is social Engineering

  • Art of Maipulation

  • Human Weakness

  • Common Types of socail Engineering

  • Human Based Impresonation

Lesson 10: Session Hijacking

  • Understanding Session Hijacking

  • Spofing vs Hijacking

  • Steps in Session Hijacking

  • Hacking Tools

  • Proctection agains session Hijacking

  • Sniffing Tools

  • Securing Wireless Newtorks

Lesson 11: Hacking Web Servers

  • Popular Web Servers and common security Threats

  • Apache Vulnerability

  • Attack against IIS console

  • Hacking Tools

  • Countermeasures

  • Increasing Web Server Security

Lesson 12: Web Application Vulnerability

  • Web Apploication Hacking

  • Anatomy of an attack

  • Web Appliocation Threats

  • Carnivore

  • Google Hacking

  • Countermeasures

Lesson 13: Web Based Password Cracking Techniques

  • Authentication – Definition

  • Authentication Mechanisms

  • Passwors Guessing

  • Query String

  • Cookies

  • Password Crackers Available

  • Hacking Tools

  • Countermeasures

SQL Injection

  • Attacking SQL Servers

  • SQL Server Resolution Service(SSRS)

  • Osql – L Probing

  • Port Scanning

  • SQL Server Tallks

  • Preventive Measures

Lesson 15: Hacking Wireless Networks

  • Wireless Basics

  • Commponents of Wireless Network

  • Access Point Positioning

  • Rogue Access Points

  • Tools to Generate Rough Access Points

  • Scanning Tools

  • Digital Cerificate

  • RSA (Rivest Shamir Adleman)

  • RSA Attacks

Lesson 16: Worms and Viruses

  • Virus Characteristics

  • Symptoms of 'Virus-like' Attack

  • Indications of a Virus Attack

  • Virus / Worms found in the wild

  • Virus Checkers

  • Virus Analyzers

Lesson 17: Physical Security

  • Understaning Physical Security

  • Factots Affecting Physical Security

  • Wiretapping

  • Lock Picking Techniques

  • Spying Technologies

Lesson18: Linus Hacking

  • Linus Basics

  • Linus Vulnerabilities

  • Scanning Newtorks

  • Scanning Tools

  • Linux Security Tools

  • Advanced Intrusion Detection System

  • Linux Security Auditing Tool

  • Linux Security Countermeasures

Lesson 19: Evading Firewalls. IDS and Honeypots

  • Intrusion Detection Systems

  • Ways to Detect Intrusion

  • Mapping IP Addresses to Milticast MAC Addresses

  • Types of Intrusion Detection System

  • Intrusion Detectin Tools

  • Honeypot Project

  • Tools to Detect Honeypot

Lesson 21: Cryptography

  • Public-Key Cryptography

  • Working of Encryption

  • Digital Signature

Lesson 22: Penetration Testing

  • Penetration Test vs. Vulnerability Test

  • Reliance on Checklists and Templates

  • Shell codePhases of Penetration Testing

  • Risk analysis

  • Types of Penetration Testing

  • Types of Ethical Hacking

  • SANS Institute Top 20 Security Vulnerabilities

  • Penetration Testing Deliverable Templates

  • Active reconnaissance


Course Schedule & Price
Classroom - Regular
When Duration Where Remarks Price
Not Specified 1 Months
All Venues Not Specified Price On Request
Online
When Duration Where Remarks Price
Not Specified Not Specified Study Online (on your computer) Not Specified Price On Request

Venues (Locations)
Chennai, Saidapet (Head Office):- No.2, Anna Salai, Near Little Mount Bus Stop, 3rd Floor, Above Reebok Showroom, Opposite to New Life AG Church Saidapet, Chennai - 600 015, Tamil Nadu, India


About Course Provider

Accord infoMatrix


Accord Info Matrix is a Chennai based Software Firm. Our main focus areas are Software Training and Software Development. Accord started with the ambitious aim of providing QUALITY training to Students and Corporate. We are integrated as an organization of talented trainers having extensive expertise in all facets of providing quality training.

Browse similar courses by category


Subscribe & get details about interesting courses & events free in your mail