Duration: 5 Days
About the Course
This is the worlds most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers.
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Who Is It For?
Target Audience
- Information Security Analyst / Administrator
- Information Assurance (IA) Security Officer
- Information Security Manager / Specialist
- Information Systems Security Engineer / Manager
- Information Security Professionals / Officers
- Information Security / IT Auditors
- Risk / Threat / Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
About The Exam
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
Passing Score: In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.
Course Outline
Module 01: Introduction to Ethical Hacking
|
Module 02: Footprinting and Reconnaissance
|
Module 03: Scanning Networks
|
Module 04: Enumeration
|
Module 05: Vulnerability Analysis
|
Module 06: System Hacking
|
Module 07: Malware Threats
|
Module 08: Sniffing
|
Module 09: Social Engineering
|
Module 10: Denial-of-Service
|
Module 11: Session Hijacking
|
Module 12: Evading IDS, Firewalls, and Honeypots
|
Module 13: Hacking Web Servers
|
Module 14: Hacking Web Applications
|
Module 15: SQL Injection
|
Module 16: Hacking Wireless Networks
|
Module 17: Hacking Mobile Platforms
|
Module 18: IoT Hacking
|
Module 19: Cloud Computing
|
Module 20: Cryptography
|