251-478-6848

The Direct Path to Success

 

HomeForumContact Us  DirectionsBlog Corporate elearning

 

 
     

 
 

Subscribe to Our Newsletter!

We'll send you a FREE Bonus eBook:

50 Career Success Tips

 

Click Below For Training Programs:

 

Microsoft

MCSE - 2003

MCSA - 2003

MCDBA - 2003

MCSE 2003 Messaging

MCSE 2003 Security

MCSD.NET VB

MCSD.NET C#

MCAD.NET VB Track

MCAD.NET C# Track

MCTS-SQL Server 2005

MCTS-.NET Framework 2.0 Windows Applications

MCTS-.NET Framework 2.0 Web Applications

MCITP-Database Administrator

MCPD-Windows Developer

MCPD-Web Developer

 

CompTIA

A+ Certification 2007 Series

Network+

Security+

 

Security

Certified Ethical Hacker

Computer Forensics

 

Special Projects

Project Management Professional Certification

 

Admissions

Admissions Process

Financial Assistance

Lab Hours

Employee Training

Request Additional Info  

Ethical Hacker Training Program Outline

"If you want to stop hackers from invading your network, first you've got to invade their minds." - EC-Council.org

Our training will show you how to scan, test, hack and secure your own systems. The intensive lab demonstrations give each student in-depth knowledge and practical experience with the current security system. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

This program prepares you for EC-Council Certified Ethical Hacker
exam 312-50.

Chapter 1

Introduction to Ethical Hacking

Can Hacking be Ethical

What does a Malicious Hacker Do?

Classification of Hackers

What do Ethical Hackers Do?

Modes of Ethical Hacking

Chapter 2

Footprinting

Revisiting Reconnaissance

Demo - Sam Spade & VisualRoute

Demo - Using Google

Network Range, Traceroute & Tools

Demo - Email Tracking

Information Gathering Methodology

Chapter 3

Scanning

War Dialers

TCP Three Way Handshake

Demo - SuperScan

Port Scanning Techniques

Port Scanning Tools

Scanning Tools

Demo - Cheops & nMap

Chapter 4

Enumeration

Net Bios Null Sessions

Demo - Creating a Null User Session

Countermeasure to Null Sessions

Hacking Tools

Demo - Using SolarWinds

How to Identify Accounts

More Hacking Tools

Demo - Cain Enable

Chapter 5

System Hacking

Password Guessing

Hacking Tool - KerbCrack

Demo - LoftCrack

Privilege Escalation

Password Cracking

Demo - Metasploit Project

SMBRelay

Man-In-The-Middle Scenario

More Hacking Tools

Countermeasures to Installing a

Rootkit

Demo - Using an Alternate Data

Stream

Demo - BlindSide

Chapter 6

Trojans & Backdoors

Backdoors

Demo - EliteWrap

Tools

BOSniffer and FireKiller

Chapter 7

Sniffers 25m 44s

Introduction to Sniffers

Demo - Ethereal

Passive & Active Sniffing Programs

Demo - Using SMAC

Sniffing HTTPS and SSH

Demo - Sniffing with Kaine Enable

Chapter 8

Denial of Service

Denial of Service Attacks

IDS Companies & Firewalls

Demo - Ping of Death DOS

Chapter 9

Social Engineering

What is Social Engineering?

Adding Extra Security into your Corporation

Chapter 10

Session Hijacking

Understanding Session Hijacking

Demo - T-Sight

Protect against Session Hijacking

Chapter 11

Hacking Web Servers

Hacking Tools & Countermeasures

Demo - Simple Internet Client Attack

Unicode Attacks & IIS Log Files

Directory Traversal Tools

Demo - N-Stealth Security Scanner

Hacking Web Servers Review

Chapter 12

Web Application Vulnerabilities

Understanding Web Application Security

Demo - BlackWidow and BurpSpider

Hidden Fields

Demo - Man-In-The-Middle Attack

XXS Web Application

Demo - Performing Reconnaissance

Chapter 13

Web Based Password Cracking

Password Guessing

Demo - SnadBoy's Revelation

Chapter 14

SQL Injection

Shutting Down SQL Server

Demo - SQL Injection

SQL Dictionary

Chapter 15

Hacking Wireless Networks

Network Hacking Tools

Demo - "The Broken" Wireless Hacking & Cracking

Chapter 16

IDS, Firewalls & Honey Pots

Application Protocol Verification

Demo - Engage Packet Builder

TCP Replay

Bypassing Firewalls

Demo - KFSensor

IDS, Firewall and Honey Pots Review

Chapter 17

Linux Hacking

Compiling Programs in Linux

Demo - Nmap Front End

Linux Hacking Tools

Linux Hacking Review

Chapter 18

Buffer Overflows

Different Types of Buffer Overflows

Demo - RPC Exploit

Preventing Buffer Overflows

Chapter 19

Cryptography

Different Types of Cryptography

RC5 & Rainbow Tables

Demo - How to Create Rainbow Tables

Chapter 20

Virus and Worms

Terminologies

How is a worm different from virus?

Access Methods & Modes of Infections

Life Cycle of a Virus

Writing a Simple Virus Program

Prevention is Better Than a Cure

Anti-Virus Software

Chapter 21

Physical Security

Understanding Physical Security

What is the need of Physical Security?

Company Surroundings & Premises

Reception

Wireless Access Points

Security of Other Equipment

Wiretapping, Remote Access & Spying

Chapter 22

Penetration Testing

Penetration Testing Methodology

Open Source vs Proprietary Methodologies

Starting Point and Ending Points of Testing

Selecting the Right Tools

Penetration Testing Tools

Gathering Network Information

Different Types of Threats
More Tools

Demo - Nessus Security Analyzer

Reports and Logs

Ethical Hacker Course Closure

Copyright 2007 Mobile Technical Institute. All rights reserved

Copyright © 2004-2007 Mobile Technical Institute Inc. All rights reserved.
Microsoft Corporation. Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries.
CompTIA is a registered trademark of The Computing Technology Industry Association, Inc. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Many pages on Mobile Technical Institute Inc.’s web site feature links to other sites, some of which are operated by companies unrelated to Mobile Technical Institute, Inc. and therefore the institute has no control over the content or availability of any linked site.  Any reproduction, duplication, or distribution in any form is expressly prohibited.  Mobile Technical Institute, Inc. recognizes the privacy interests of visitors to this site on the Internet. Click here for a full description of Mobile Technical Institute, Inc. policy for this site.
Contact Webmaster