Certified Ethical Hacker (CEH) – Network Security Track Training Course
Course Overview
This training course provides participants with hands-on skills and knowledge in ethical hacking techniques and tools to test and secure networks. It prepares participants for the globally recognized EC-Council Certified Ethical Hacker (CEH) certification. Participants will learn to identify vulnerabilities, understand attacker methodologies, and implement countermeasures to protect organizational networks effectively.
Format of Training
- Instructor-led sessions with real-world hacking scenarios
- Certification preparation and practice exams
- Interactive Q&A sessions
- Hands-On Lab: Performing network penetration testing and securing systems
Course Objectives
- Understand the core concepts of ethical hacking and penetration testing.
- Use industry-standard tools to identify and exploit vulnerabilities in networks.
- Analyze attacker methodologies and techniques.
- Implement countermeasures to secure systems and networks.
- Apply ethical and legal principles in penetration testing.
- Develop reports outlining findings and remediation strategies.
- Successfully prepare for and pass the EC-Council CEH certification exam.
Prerequisites
- Basic knowledge of networking and operating systems
- Familiarity with cybersecurity concepts is recommended
- No prior ethical hacking experience required
Course Outline
Day 1
Session 1: Introduction to Ethical Hacking
- Importance of ethical hacking in cybersecurity
- Key concepts: attacker methodologies and ethical guidelines
- Overview of the CEH certification exam
Session 2: Reconnaissance Techniques
- Passive and active information gathering
- Tools for reconnaissance (e.g., Whois, Nmap, Maltego)
Session 3: Hands-On Lab
- Conducting reconnaissance on a simulated network
Day 2
Session 1: Scanning and Enumeration
- Identifying open ports and services
- Network scanning tools and techniques
Session 2: Network Vulnerability Analysis
- Understanding vulnerabilities and exploit paths
- Using tools like Nessus and OpenVAS for assessment
Session 3: Hands-On Lab
- Performing vulnerability scanning on a sample network
Day 3
Session 1: Exploitation and Gaining Access
- Exploit development basics and payloads
- Tools like Metasploit for exploiting vulnerabilities
Session 2: Maintaining Access and Covering Tracks
- Techniques attackers use to persist in systems
- Detecting and mitigating persistent threats
Session 3: Hands-On Lab
- Gaining access to a simulated system and securing it
Day 4
Session 1: Web Application Security
- Testing for SQL injection, cross-site scripting, and other web vulnerabilities
- Tools and methodologies for web application testing
Session 2: Defensive Measures and Countermeasures
- Implementing firewalls, IDS/IPS, and monitoring tools
- Best practices for securing networks
Session 3: Hands-On Lab
- Securing a network from simulated attacks
Day 5
Session 1: Advanced Techniques and Emerging Threats
- Social engineering and phishing techniques
- Overview of IoT and cloud vulnerabilities
Session 2: Certification Preparation
- Review of exam objectives and practice questions
- Study tips and resources for CEH certification
Session 3: Final Lab and Wrap-Up
- Comprehensive ethical hacking simulation
- Q&A session and action plan for certification
Bespoke Option
We are open to customizing this program to align with your specific learning objectives. If your team has particular goals or areas they wish to focus on, we would be happy to tailor the course outline to meet those needs and ensure the program supports the achievement of your desired outcomes.
Need help with the right course to choose?
support@skillvotech.com
Explore more opportunities
- Duration: 5 Days
- 4.5 Ratings
Certified Ethical Hacker (CEH) – Network Security Track Training Course
- Duration: 4 Days
- 4.5 Ratings
Cisco Certified CyberOps Associate Training Course
- Duration: 3 Days
- 4.5 Ratings