Course

Course Summary
Credit Type:
Course
ACE ID:
SKIL-0195
Organization:
Location:
Classroom-based
Length:
Self-paced, 40 hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 Network Defense and Computer Security or Information Assurance
Description

Objective:

The course objective is to help prepare learners for the Ethical Hacker v10 certification exam.

Learning Outcomes:

  • Define threat categories, attack vectors, and types of defenses against threats
  • Describe various security controls and policies and how they are used to protect information, systems, networks, and even physical threats
  • Use common system tools like ping, Nmap, and scripting to perform host discovery
  • Use vulnerability tools like Nikto and MBSA and use references like CVSS and NVD
  • Cover your tracks after you've breached a system, including how to remove traces of your activities by disabling auditing systems and clearing logs
  • Demonstrate network-layer session hijacking and describe the possible mitigation strategies
  • Evade intrusion detection systems, firewalls, and honeypots
  • Describe various methods of web app hacking and configure web app hacking in a scenario
  • Recognize wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks
  • Describe hacking phases, such as recon, scanning, access, maintaining access, and covering tracks
  • Develop incident management and response procedures
  • Describe the types, phases, and methodologies of penetration testing
  • Utilize footprinting tools and techniques to passively gather information on a target website
  • Use ProxyChains to bypass security features like IDS and firewalls to access a target network
  • Utilize various tools and techniques to crack password hashes and use those hashes to gain unauthorized access to systems
  • Describe malware distribution methods like social engineering, phishing, click-jacking
  • Use MAC flooding, port stealing, and ARP poisoning to sniff packets on a switched network
  • Describe the types of DoS/DDoS attacks, differences between them, and the concepts behind amplification and reflective DoS attacks

General Topics:

  • Certified Ethical Hacker - CEHv10: Ethical Hacking Overview and Threats
  • Certified Ethical Hacker - CEHv10: Hacking Concepts
  • Certified Ethical Hacker - CEHv10: Security Controls
  • Certified Ethical Hacker - CEHv10: Security Controls Part 2
  • Certified Ethical Hacker - CEHv10: Pentesting, Laws, and Standards
  • Certified Ethical Hacker - CEHv10: Footprinting
  • Certified Ethical Hacker - CEHv10: Host Discovery and Scanning with Nmap
  • Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration
  • Certified Ethical Hacker - CEHv10: Vulnerability Analysis Concepts and Tools
  • Certified Ethical Hacker - CEHv10: Password Attacks
  • Certified Ethical Hacker - CEHv10: Password Attacks Part 2
  • Certified Ethical Hacker - CEHv10: Privilege Escalation
  • Certified Ethical Hacker - CEHv10: Covert Data Gathering
  • Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks
  • Certified Ethical Hacker - CEHv10: Malware Threats
  • Certified Ethical Hacker - CEHv10: Malware Distribution
  • Certified Ethical Hacker - CEHv10: Network Sniffing
  • Certified Ethical Hacker - CEHv10: Social Engineering
  • Certified Ethical Hacker - CEHv10: Denial of Service
  • Certified Ethical Hacker - CEHv10: Session Hijacking
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
  • Certified Ethical Hacker - CEHv10: Hacking Web Servers
  • Certified Ethical Hacker - CEHv10: Common Web App Threats
  • Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
  • Certified Ethical Hacker - CEHv10: Practical Web App Hacking
  • Certified Ethical Hacker - CEHv10: SQL Injection
  • Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Concepts
Instruction & Assessment

Instructional Strategies:

  • Computer Based Training

Methods of Assessment:

  • Examinations

Minimum Passing Score:

70%
Supplemental Materials