TOIT Training

Intermediate

Ethical Hacking v12

Overview
Curriculum

 

StormWind’s Ethical Hacking v12 online training course will immerse students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will gain an understanding of how to leverage a multitude of tools at the disposal of today’s hackers. Ethical hackers use many of the same tools as malicious hackers including, footprinting, sniffing, trojans, and more! When a student completes this online training course they will have knowledge and experience working as penetration testers on their organization’s Red Team. Students completing all activities in this training will have the knowledge to pass the CEH exam (312-50).

Curriculum

  • 16 Sections
  • 32 Lessons
  • 24h Duration
Expand All
Hack, Hacker, Hacking
3 Lessons
  1. Hack
  2. Hacker
  3. Hacking
Hacking Process
4 Lessons
  1. Basics of Hacking
  2. Reconnaissance
  3. Scanning, Uptime Chart
  4. Gaining Access and Clearing Tracks
What is Hacking
1 Lesson
  1. What Exactly is Ethical Hacking
Organizational Infrastructure
9 Lessons
  1. Network Infrastructure, OSI Model, Network Devices
  2. Understanding IP, DNS, DHCP, Subnetting
  3. Understanding IPv4 Addresses, Address Classes
  4. Subnet Masks
  5. CIDR
  6. DHCP
  7. Domain Name Systems
  8. Dual Homed Host, APT’s
  9. Intrusion Detection Software
Physical Security Techniques
1 Lesson
  1. Securing the Perimeter
Organizational Protocols
1 Lesson
  1. Security Based Organizational Protocols
Organizational Policies
1 Lesson
  1. Confidentiality, AAA, Non-Repudiation
Governmental Policies
1 Lesson
  1. Mandatory and Non-Mandatory Compliance Frameworks
Keys
1 Lesson
  1. Keys, Digital Certificates
Threat Level Midnight
2 Lessons
  1. Attack Steps, Wireless Attacks
  2. Internet of Things (IoT)
Malware
3 Lessons
  1. Viruses, Worms, Trojans
  2. Stealth Viruses, Steganography
  3. Ransomware, Spyware, Adware, Scareware
Spamalot
1 Lesson
  1. Spam Emails and Mitigation Techniques
Exploitable Bugs
1 Lesson
  1. Bug Types and Attack Vectors
 Password Cracking
1 Lesson
  1. Honeypots and Password Attacks
 Exploiting Web Applications
1 Lesson
  1. Website Vulnerabilities
Risk Management
1 Lesson
  1. Understanding Risk and Liability

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Ethical Hacking v12
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)