Become a PREMIUM MEMBER with Just N5, 000 plus a FREE 2mins Video Advert.     FREE Advert ...Load your Business & Courses for 100% FREE…. See trending courses    Executive Training Rooms now available at Citrus Training Center at N10k per day    FREE 2 mins Video for all Premium Members. Contact Us Today

CERTIFIED ETHICAL HACKER

₦100,000 ₦60,000
CEH
Contact Trainer

Contact the Course Organizer

To inquire about this course, complete the form below to send a message to the course organizer.

Get 10% Discount Register Now

Course Description.

CERTIFIED ETHICAL HACKER

If you’re concerned about the integrity of your network’s infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v9 to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you’ll learn how intruders operate and the steps you can take to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.

HIGHLIGHTS OF CEH V9 INCLUDE:

Diagrams of concepts and attacks for clarity and easier interpretation

Key industry-standard tools covered in detail

Exclusive section for countermeasures against different attacks

Time dedicated to penetration testing

Results-oriented, descriptive, and analytical lab manual

Ethical hacking is just a small part of a strong, comprehensive security solution. That’s why we offer a full line of security training courses, from foundational, multi-vendor training to technology-specific and vendor-specific training. Our courses will help you understand the basic principles behind protecting and securing your information, applications, and networks.

Our security instructors are seasoned veterans who have spent considerable time in the industry. When they aren’t teaching, our instructors spend considerable time on consulting projects, ensuring a thorough understanding of their subject matter and applicable real-world experience.

What You’ll Learn

  • Foot printing and reconnaissance
  • Hacking web servers, web applications, and wireless networks
  • Cryptography
  • Penetration testing
  • Social engineering
  • Trojans, viruses, and worms
  • Evading IDS, firewalls, and honeypots
  • Enumeration
  • Buffer overflows.

 

TRAINING DATES / COURSE OVERVIEW

Course Method and Materials

Training Pack Contains:

  • Tuition,
  • Labs installation software
  • Customized training materials (Books, Slides and CBTs)
  • CEH exam prep materials
  • Certificate of completion
  • CEH simulated exams
  • Training Software
  • Refreshment

The course is delivered using a balanced combination of video, presentation, workshops and discussion sessions. The workshops and discussions are focused on putting into practice the techniques covered in the presentation and video. The workshops are used extensively to reinforce learning and to contribute to the development of understanding. .

CERTIFIED ETHICAL HACKER – COURSE OUTLINE

Introduction to Ethical Hacking

Foot printing and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Sniffers

Social Engineering

Denial of Service

Session Hijacking

Hijacking Web Servers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Evading IDS, Firewalls, and Honeypots

Buffer Overflows

Cryptography

Penetration Testing

LABS

Lab 1: Foot printing and Reconnaissance

Discover Network Paths with the Ping Utility

Query DNS with nslookup Utility

Search for People Using the AnyWho Online Tool

Analyze Domain and IP Address Queries Using SmartWhois

Trace Network Routes Using Path Analyzer Pro

Trace E-Mail Delivery Routes with the eMailTrackerPro Tool

Copy a Website with the HTTrack Web Copier Tool

Extract Web Data with the Web Data Extractor Tool

Search for Web Vulnerabilities with Search Diggity Tool

Lab 2: Scanning Networks

Scan System and Network Resources Using Advanced IP Scanner

Monitor TCP/IP Connections Using the CurrPorts Tool

Scan for Network Vulnerabilities Using the GFI Languard Network Scanner

Scan Hosts for Services Using Nmap

Scan for Vulnerabilities with the Nessus Tool

Map a Network Using Global Network Inventory Tool

Create Proxies with Proxy Workbench Tool

Perform Tunneling with HTTPort/HTTHost Tool

Create Packets Using Colasoft Packet Builder

Perform Traffic Analysis with the Dude Sniffer Tool

Lab 3: Enumeration

Enumerate Services with Zenmap

Enumerate Hosts Using the SuperScan Tool

Enumerate Networks with SoftPerfect Network Scanner

Enumerate a Network with SolarWinds Toolset

Lab 4: System Hacking

Extracting Administrator Passwords Using LCP

Hiding Files Using NTFS Streams

Search for Alternate Data Streams using the ADS Spy Tool

Hide Content with Stealth Files Steganography

Extract Passwords with the PWdump7 Tool

Generate Rainbow Tables with the Winrtgen Tool

Crack Hashed Passwords using the Rainbowcrack Tool

Crack Hashed Passwords with the L0phtCrack Tool

Execute Files Remotely with the RemoteExec Tool

Hide Content with the Snow Steganography Tool

Control System Auditing with the Auditpol Utility

Reset Passwords with the CHNTPW.iso Tool

Monitor Users with the Spytech SpyAgent Tool

Hide Content with the QuickStego Tool

Lab 5: Trojans and Backdoors

Create a Server Using the ProRat Tool

Create a Trojan with the OneFile EXE Maker Tool

Create a Server with the Proxy Server Trojan

Create a Server with the HTTP Trojan

Create a Server with Atelier Web Remote Commander

Create a Trojan with Biodox Trojan Creator Tool

Create a Backdoor with Metasploit

Lab 6: Viruses and Worms

Create a Virus Using the JPS Virus Maker Tool

Reverse Engineer Code Using the IDA Pro Analysis Tool

Scan for Viruses with Kaspersky Anti-Malware

Generate a Worm Using Internet Worm Maker Thing Tool

Lab 7: Sniffers

Analyze Packet Captures Using the OmniPeek Network Analyzer

Spoof MAC Address Using SMAC

Analyze a Network Using the Colasoft Capsa Network Analyzer

Sniff Network Traffic with Wireshark

Perform ARP Poisoning with Cain

Detect Hosts in Promiscuous Mode with PromqryUI

 Lab 8: Social Engineering

Detect Phishing Using Netcraft

Create a Rogue Website with Social Engineering Toolkit (SET)

Lab 9: Denial of Service

Use Hping to Create a Denial of Service Attack

Use DoSHTTP to Create a Denial of Service Attack

 Lab 10: Session Hijacking

Hijack and Redirect Web Requests with the Zed Attack Proxy (ZAP)

Lab 11: Hacking Webserver

Footprint Webservers with the HTTP Recon Tool

Footprint a Webserver Using ID Serve

Attack Webservers with Metasploit

Lab 12: Hacking Web Applications

Create a Cross-Site Scripting Attack with JavaScript

Explore the Vampire Vulnerability Scanner

Scan a Website for Vulnerabilities Using Acunetix

 Lab 13: SQL Injection

Perform SQL Injection Attacks on MS SQL Database

Scan an Internet Site with IBM App Scan Vulnerability Scanner

Scan a WebServer with N-Stalker Vulnerability Scanner

Lab 14: Hacking Wireless Networks

Analyze WiFi Traffic with AirPcap with Wireshark

Crack the WEP Key for Captured Traffic with Aircrack-ng

UnWEP Bulk Captured Traffic with OmniPeek Once Key is Known

Lab 15: Evading IDS and Firewalls

Configure the Snort Intrusion Detection Tool

Use the Kiwi Syslog Viewer to Analyze Snort Logs

Install, Configure, and Attack the KFSensor Honeypot Tool

Lab 16: Buffer Overflow

Code, Compile, and Execute a Buffer Overflow Attack

 Lab 17: Cryptography

Hash Files and Data Using HashCalc

Encrypt Data Using the Advanced Encryption Package

Encrypt File Systems with TrueCrypt

Encrypt Data with the BCTextEncoder Tool

 

Training Methodology

  • Expert Instructor-Led Training

Our Courseware uses only the industry’s finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields.

  • Visual Demonstrations & Multimedia Presentations

Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

  • Quizzes & Exam Simulators

Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.

This will allow you to gauge your effectiveness before moving to the next module in your course. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

  • Social Learning & Networking

 

WHO SHOULD ATTEND ?

While the prerequisites for the class will depend on where you take it, there are a few things you will have to have. You will need to have a working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies. However, it is important to make sure you understand the prerequisites before paying for the class.

Dates:

Month Weekdays Weekends
March    
April 17 – 21 22, 23, 29 & 30
May 22 – 26 20, 21, 27 & 28
June 19 – 23 17, 18, 24 & 25
July 24 – 29 22, 23, 29 & 30
August 28 – Sept 1 19, 20, 26 & 27
September 18 – 22 16, 17, 23 & 24
October 23 – 27 21, 22, 28 & 29
November 13 – 17 18, 19, 25 & 26
December 18 – 22 16, 17, 23 & 24
January 22 – 26 20, 21, 27 & 28
February 19 – 23 17, 18, 24 & 25
March 19 – 23 17, 18, 24 & 25
     

 

Facilitators:

Our trainers are highly qualified, certified and seasoned experts, committed to providing high-end trainings, and have trained hundreds of students and professionals coming from across the world.

Fee: NGN 60,000 (Promo Price)

 

 

 

 

Contact Person:

trainings@makintouchconsulting.com

makintouchconsulting@gmail.com

makintouchinfo@gmail.com

 

08077683904

08077683905

08077683910

 

Venue:

No. 24 Bamishile Street, Off Allen Avenue, Ikeja, Lagos.

Comments are closed.

    Supplier/Trainer Info

  • Name:

    Makintouch Consulting

  • Email:

    trainings@makintouchconsulting.com

  • Mobile Number:

    08024316195

  • About Trainer:

    Makintouch Consulting is a leading IT & Business Management Training provider in Nigeria. We are constantly providing world class training, using the best technologies and professionals.

  • Twitter:

    https://twitter.com/makintouchltd

  • Facebook:

    https://www.facebook.com/makintouchconsulting

Copyright @ . All right reserved by Nigeria Training Courses.
Subsidiary of NTN Associates