Training - CEH

Overview of the course:

To beat a hacker, you need to think like one! A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of the target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Pre-Requisites:

Good Knowledge of TCP-IP and the basic knowledge of operating systems, which Windows and Linux. For programming you must know the basic concepts.

Target Audience:

The security officers, security professionals, auditors, and site administrators as well as anyone who is interested in the integrity of the network infrastructure.

Course Content:

EH v9 consists of core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Evading IDS, Firewalls and Honeypots
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography

Duration:

40 hours

Scope of the Course:

  1. CHFI: Computer Hacking Forensic Investigator
    • As organizations strive to defend and retaliate against swiftly mounting cyber-attacks, businesses and government agencies are aggressively hiring top-notch talent to fill key information security job roles. Computer forensics investigation – the gathering and analysis of cybercrime evidence for prosecution – is one of the most vital information security domains, and EC-Council’s Computer Hacking Forensic Investigator (CHFI) is the preeminent credential in this field.
    • CHFI certified security professionals have the skills and knowledge to uncover and analyze complex digital evidence, which is then used to hunt down and prosecute today’s most sophisticated cyber criminals. Most importantly they do it in a forensically sound manner, thus ensuring that the investigation and its findings are legally admissible. The CHFI curriculum is vendor-neutral, so certification holders can ply their trade across a wide range of computing environments, regardless of the particular technologies in question.
    • Workforce demand for Computer Hacking Forensic Investigators is soaring across multiple verticals; major industries for CHFI hiring include law enforcement, military and defense, enterprise IT, insurance and banking, legal practices, and of course cyber security firms.
  2. EC-Council Certified Security Analyst (ECSA)

    What is ECSA Certification?
    The ECSA is an advanced security certification that complements the Certified Ethical Hacker (CEH) certification by validating the analytical phase of ethical hacking. An ECSA is a step ahead of a CEH by being able to analyze the outcome of hacking tools and technologies.
    The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report. The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker (CEH) course and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council's published penetration testing methodologies.
    Average salaries for EC-Council certified professionals: ENSA: Network Security Administrator salary: $85,000. CEH: Certified Ethical Hacker salary: $89,000. ECSA: Certified Security Analyst salary: $90,000.

  3. LPT (Licensed Penetration Testing v9) Pre-requisites:
    • EC-Council Certified Ethical Hacking Certification (CEH).
    • EC-Council Certified Security Analyst Certification (ECSA)

    A Licensed Penetration Tester (LPT) is expected to critically analyze the network architecture and suggest the curative measures. EC-Council’s license speaks for their expertise level and professionalism.

    Licensed Penetration Tester (LPT) certification is creatively designed to ensure that a strict ethical code is adopted and followed by all the security professionals licensed by EC-Council. This courseware teaches all about the compliance requirements required by the industry apart from introducing you the best practices in the penetration testing domain.

    Benefits:
    • International Recognition: It enables you to practice penetration testing and consultation internationally.
    • Industrial acceptance: You will be a legal and ethical security professional as per the industry standards.
    • Knowledge-Base: With your membership, you will have an access to all the EC-Council software, penetration testing report frameworks and the standard methodologies.
    • License to practice: All the organizations accredited to EC-Council are available for practicing and conducting penetration testing training as per their penetration testing course.
  4. ESP- .Net /Java ( Taken From KOENINg )

    Overview
    EC-Council Certified Secure Programmer .NET Certification is a first choice and the most demanding certification in the industry for the software developers and programmers who all are on the verge of producing applications with great stability and posing lesser security threats to the consumer. It will standardize the ethics of the programmers on coding and will educate them about secure programming logics, hence making robust, scalable and highly secure applications. The ECP. Net course has been sensitively structured to understand the foundation of software development life cycle that involves designing, implementing and deployment of applications.
    Audience: The ECSP certification is ideal for programmers who are responsible for designing and building secure Windows/Web based .Net framework with relevant development skills.
    Course Content / Exam(s)
    Schedule for EC-Council Certified Secure Programmer (ECSP) .NET

    Course Name Exam # Regular Track (days) Fast Track (days)
    EC-Council Certified Secure Programmer (ECSP) .NET 312-93 3 2

    Course Prerequisites
    You must be well-versed with .NET programming language

    EC-Council Certified Secure Programmer (ECSP) .NET Benefits
    Upon Completion of this Course, you will accomplish following:-

    • Understanding various threats posed to .Net framework and resolving them with best .Net application security logics.
    • Learn how to prevent security threats through input validation, authorization, authentication, cryptography.
    • Understand the concept of XML and digital signatures, digital certificates, hashing, symmetric and asymmetric encryption.
    • Also learn to apply exception handling, secure error handling, and .NET logging tools.
    • Learn file handling, and defense mechanisms against path reversal attacks on file handling.
    • Securing application against various security attacks such as SQL injection attacks, session attacks, View State security and cookie security.
    • Mitigating vulnerabilities in application config and machine config files.

    EC-Council Certification Salaries
    Average salaries for EC-Council certified professionals:

    • ENSA: Network Security Administrator salary: $85,000
    • CEH: Certified Ethical Hacker salary: $89,000
    • ECSA: Certified Security Analyst salary: $90,000
    • LPT: Licensed Penetration Tester salary: $92,000
    • CHFI: Computer Hacking Forensic Investigator salary: $96,000

    Salary by EC-Council Certificate (USA)
    Source: Payscale.com