This training path covers everything you need to know about becoming an ethical hacker to pass the Certified Ethical Hacker exam. We will introduce the course by discussing liability, effective security programs, control types, methodology, and more.
Participants will learn about reconnaissance, by beginning with an overview of the Hacking “Life-Cycle“), and continuing onto footprinting, social access, domain names, and DNS databases.
We will then cover protocols by highlighting the OSI Model, TCP/IP, ICMP, UDP, ARP, DNS, SSH, SNMP, and SMTP.
The Windows hacking section will get into different types of attacks, LM Hash Encryption, hacking tools and techniques, firewalls, and attack types.
Attacking web technologies will cover common web application threats, components, URLs, cookies, SQL Injection, and much more.
Lastly, we will focus on pen testing wireless networks by discussing standards comparisons, wired equivalent privacy, TKIP, LEAP, various tools, malware, trojan horse, back doors, and more.
Career Paths include professional roles such as: Ethical Hackers, Security Consultants, IT Management, and Chief Security Officers.