To catch a thief, you must think like a thief. To protect your network from a
hacker, you have to get inside that hacker's mind. There is only one way to
find out if your network is truly secure, and that is to attack your own computer
the way a hacker does.
This ethical hacker course will immerse the student into an interactive
environment, where they will be shown how to scan, test, hack and secure their
The lab intensive environment gives each student in-depth knowledge and practical
experience with the current essential security systems. Students will begin
by understanding how perimeter defenses work and then be lead into scanning
attacking their own networks (no real networks are attacked). Students will
learn how intruders escalate privileges and the necessary steps to secure a
Students will also learn about Intrusion Detection, Policy Creation, Social
Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Student will
understanding and experience in this counter hacking school.
Each student will receive a CD with all the tools that were used during labs.
Both Windows-based and Linux-based attack tools will be used. Students should
be prepared to be involved for the entire week with nightly reading assignments
to accelerate the class progress.
During labs, the students will be attacking Windows 2000 Web Servers with SP1
installed. Students will also utilize the tools against the server using their
Windows 2000 and CD-ROM bootable Linux attack machines.
This course prepares you for EC-Council's Certified Ethical Hacker exam 312-50,
which can be electively undertaken on the last day of class.
Who Should Attend
This course will significantly benefit security officers, auditors, security
professionals, site administrators, and anyone who is concerned about the integrity
of their network infrastructure. IT consultants who want to learn more about
hacking tools and techniques will also benefit.
- Administering Windows 2000 Servers
- TCP/IP Technical background
- NetBIOS and Windows file sharing
- DNS, WINS and DHCP
- NTFS and File Permissions
- Linux basics skills
- Linux Configuring IP address
- Linux Configuring Routing
- Linux Compiling and running programs
The Certified Ethical Hacker certification exam 312-50 applies to this class.
Students need to pass the online Prometric exam to receive CEH certification.
This exam can be undertaken optionally on day-five.
The Ethical Hacking and Countermeasures Course mission is to introduce and
demonstrate hacking tools for penetration testing purposes only. Prior to
course, you will be required to sign an agreement stating that you will not
use the newly acquired skills for illegal or malicious attacks. Students
use these tools in an attempt to compromise ANY computer systems.
Attendance is restricted.
Microtrain is required to confirm that students work
for legitimate companies, organizations or government agencies. Bonafide
IT consultants are also eligible.
Course Outline v2.:
Module 1: Ethics and Legality|
Module 2: Footprinting
Module 3: Scanning
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Sniffers
Module 8: Denial of Service
Module 9: Social Engineering
Module 10: Session Hijacking
Module 11: Hacking Web Servers
Module 12: Web Application Vulnerabilities
Module 13: Web Based Password Cracking Techniques
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Virus and Worms
Module 17: Novell Hacking
Module 18: Linux Hacking
Module 19: IDS, Firewalls and Honeypots
Module 20: Buffer Overflows
Module 21: Cryptography