Course Course Summary Section 1 Content Section 1 Content Left Section 1 Content Right Credit Type: Course ACE ID: SKIL-0195 Organization: SkillSoft Corporation Location: Classroom-based Length: Self-paced, 40 hours Dates Offered: 10/1/2019 - 5/31/2023 Credit Recommendation & Competencies Section 2 Content Section 2 Content Left Section 2 Content Right Level Credits (SH) Subject Lower-Division Baccalaureate 3 Network Defense and Computer Security or Information Assurance Description Section 3 Content Section 3 Content Left Section 3 Content Right Objective: The course objective is to help prepare learners for the Ethical Hacker v10 certification exam. Learning Outcomes: Define threat categories, attack vectors, and types of defenses against threats Describe various security controls and policies and how they are used to protect information, systems, networks, and even physical threats Use common system tools like ping, Nmap, and scripting to perform host discovery Use vulnerability tools like Nikto and MBSA and use references like CVSS and NVD Cover your tracks after you've breached a system, including how to remove traces of your activities by disabling auditing systems and clearing logs Demonstrate network-layer session hijacking and describe the possible mitigation strategies Evade intrusion detection systems, firewalls, and honeypots Describe various methods of web app hacking and configure web app hacking in a scenario Recognize wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks Describe hacking phases, such as recon, scanning, access, maintaining access, and covering tracks Develop incident management and response procedures Describe the types, phases, and methodologies of penetration testing Utilize footprinting tools and techniques to passively gather information on a target website Use ProxyChains to bypass security features like IDS and firewalls to access a target network Utilize various tools and techniques to crack password hashes and use those hashes to gain unauthorized access to systems Describe malware distribution methods like social engineering, phishing, click-jacking Use MAC flooding, port stealing, and ARP poisoning to sniff packets on a switched network Describe the types of DoS/DDoS attacks, differences between them, and the concepts behind amplification and reflective DoS attacks General Topics: Certified Ethical Hacker - CEHv10: Ethical Hacking Overview and Threats Certified Ethical Hacker - CEHv10: Hacking Concepts Certified Ethical Hacker - CEHv10: Security Controls Certified Ethical Hacker - CEHv10: Security Controls Part 2 Certified Ethical Hacker - CEHv10: Pentesting, Laws, and Standards Certified Ethical Hacker - CEHv10: Footprinting Certified Ethical Hacker - CEHv10: Host Discovery and Scanning with Nmap Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration Certified Ethical Hacker - CEHv10: Vulnerability Analysis Concepts and Tools Certified Ethical Hacker - CEHv10: Password Attacks Certified Ethical Hacker - CEHv10: Password Attacks Part 2 Certified Ethical Hacker - CEHv10: Privilege Escalation Certified Ethical Hacker - CEHv10: Covert Data Gathering Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks Certified Ethical Hacker - CEHv10: Malware Threats Certified Ethical Hacker - CEHv10: Malware Distribution Certified Ethical Hacker - CEHv10: Network Sniffing Certified Ethical Hacker - CEHv10: Social Engineering Certified Ethical Hacker - CEHv10: Denial of Service Certified Ethical Hacker - CEHv10: Session Hijacking Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 2 Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3 Certified Ethical Hacker - CEHv10: Hacking Web Servers Certified Ethical Hacker - CEHv10: Common Web App Threats Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2 Certified Ethical Hacker - CEHv10: Practical Web App Hacking Certified Ethical Hacker - CEHv10: SQL Injection Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools Certified Ethical Hacker - CEHv10: Wireless Hacking Concepts Instruction & Assessment Section 4 Content Section 4 Content Left Section 4 Content Right Instructional Strategies: Computer Based Training Methods of Assessment: Examinations Minimum Passing Score: 70% Supplemental Materials Section 5 Content Section 5 Content Left Section 5 Content Right Section 6 Content Section 6 Content Left Section 6 Content Right Button Content Rail Content 1 Other offerings from SkillSoft Corporation Agile for Software Development (SKIL-0216) AI Apprentice to AI Architect (SKIL-0210) Application Developer to Blockchain Solutions Architect (SKIL-0209) Apprentice Java Developer to Senior Java Developer (SKIL-0229) Apprentice Programmer Journey - Novice and Apprentice Programmer (SKIL-0214) Apprentice Programmer Journey - Web Programmer and Web Apps Developer (SKIL-0213) Business Analyst to Data Analyst (SKIL-0227) CCNA Cloud - Understanding Cisco Cloud Fundamentals (CLDFND) (SKIL-0197) Certified Business Analysis Professional (CBAP) (SKIL-0172) View All Courses Page Content