Speak directly and without obligation to
UK Open Learning
Your request has been sent correctly
Would you like to receive information about these related courses?
Just one more thing ...
Some institutions ask us for this data. Please, fill them in
Certified Ethical Hacker (CEH) Course - Online
8 CD-ROMs featuring live instructor-led classroom sessions with full audio, video and demonstration
Intensive hacking and counter-hacking hands-on demonstration components
Step by Step Hands-on Labs
Focused on practical solutions to real-world development problems
Proven technique- Actual Exam Secrets Review
Career Academy is presenting this self-paced multimedia Ethical Hacking class in partnership with Mile2. Mile2 is largely responsible for the early adoption and success of Certified Penetration Testing & Ethical Hacker courses within the USA and several other countries. Mile2 is the world's largest provider of Penetration Testing training and initially chose the basic Ethical Hacker course as our flagship for Penetration Testing training events. Mile2 has delivered more Penetration Testing & Ethical Hacker classes within the USA than any other training provider and possibly globally.
Definition of "Ethical Hackers"
Ethical Hackers are computer and network experts who attack a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical Hackers are also known as penetration testers, intrusion testers, and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits.
Our training videos will show you how to scan, test, hack and secure your own systems. The intensive lab demonstrations give each student in-depth knowledge and practical experience with the current security system. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Our CBT Boot Camp prepares you for EC-Council Certified Ethical Hacker (Self-paced Study) exam 312-50.
Introduction to Ethical Hacking
Can Hacking be Ethical
What does a Malicious Hacker Do?
Classification of Hackers
What do Ethical Hackers Do?
Modes of Ethical Hacking
Demo - Sam Spade & VisualRoute
Demo - Using Google
Network Range, Traceroute & Tools
Demo - Email Tracking
Information Gathering Methodology
TCP Three Way Handshake
Demo - SuperScan
Port Scanning Techniques
Port Scanning Tools
Demo - Cheops & nMap
Net Bios Null Sessions
Demo - Creating a Null User Session
Countermeasure to Null Sessions
Demo - Using SolarWinds
How to Identify Accounts
More Hacking Tools
Demo - Cain Enable
Hacking Tool - KerbCrack
Demo - LoftCrack
Demo - Metasploit Project
More Hacking Tools
Countermeasures to Installing a Rootkit
Demo - Using an Alternate Data Stream
Demo - BlindSide
Compiling Programs in Linux
Demo - Nmap Front End
Linux Hacking Tools
Linux Hacking Review
Different Types of Buffer Overflows
Demo - RPC Exploit
Preventing Buffer Overflows
Different Types of Cryptography
RC5 & Rainbow Tables
Demo - How to Create Rainbow Tables
Virus and Worms
How is a worm different from virus?
Access Methods & Modes of Infections
Life Cycle of a Virus
Writing a Simple Virus Program
Prevention is Better Than a Cure
Understanding Physical Security
What is the need of Physical Security?
Company Surroundings & Premises
Wireless Access Points
Security of Other Equipment
Wiretapping, Remote Access & Spying
Penetration Testing Methodology
Open Source vs Proprietary Methodologies
Starting Point and Ending Points of Testing
Selecting the Right Tools
Penetration Testing Tools
Gathering Network Information
Different Types of Threats
Demo - Nessus Security Analyzer
Reports and Logs
Ethical Hacker Course Closure
Other programs related to information quality and security