EC-Council came up with a certification called CERTIFIED ETHICAL HACKING (CEH) for the people who can use hacking in a ethical way.
CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing Program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest methodologies, Hacking techniques, tools, tricks and security measures. We can have the newly gained knowledge of exploring, testing, hacking and securing our own systems.
A Hacker is a skilled person who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but a Ethical hacker does it in a lawful and legitimate manner to assess the security posture of a target systems.
There is a myth saying that this is advance level certification, rather it is basic to intermediate level certification.
"There are two types of companies in the world: those that know they've been hacked, and those that don't."- Misha Glenny.
All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.
infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.
Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.
The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.
FLOW OF CEH COURSE
|1||Introduction to Ethical Hacking||Key issues plaguing the information security world, incident management process, and penetration testing|
|2||footprinting and reconnaissance||Various types of footprinting, footprinting tools, and countermeasures|
|3||scanning networks||Network scanning techniques and scanning countermeasures|
|4||enumeration||Enumeration techniques and enumeration countermeasures|
|5||system hacking||System hacking methodology, steganography, steganalysis attacks, and covering tracks|
|6||trojans and backdoors||Different types of Trojans, Trojan analysis, and Trojan countermeasures|
|7||viruses and worms||Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures|
|8||sniffers||Packet sniffing techniques and how to defend against sniffing|
|9||social engineering||Social Engineering techniques, identify theft, and social engineering countermeasures|
|10||denial of service||DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures|
|11||session hijacking||Session hijacking techniques and countermeasures|
|12||hacking webservers||Different types of webserver attacks, attack methodology, and countermeasures|
|13||hacking web applications||Different types of web application attacks, web application hacking methodology, and countermeasures|
|14||SQL injection||SQL injection attacks and injection detection tools|
|15||Hacking Wireless Network||Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools|
|16||Hacking Mobile Platforms||Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools|
|17||Evading IDS, Firewalls and Honeypots||Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures|
|18||Cloud Security||Various cloud computing concepts, threats, attacks, and security techniques and tools|
|19||Crytography||Different types of cryptography ciphers, Public Key Infrastructur (PKI), cryptography attacks, and cryptanalysis tools|
|20||Penetration Testing||Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap|