StormWind’s Ethical Hacking v11 online training course will immerse students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will gain an understanding of how to leverage a multitude of tools at the disposal of today’s hackers. Ethical hackers use many of the same tools as malicious hackers including, footprinting, sniffing, trojans, and more! When a student completes this online training course they will have knowledge and experience working as penetration testers on their organization’s Red Team. Students completing all activities in this training will have the knowledge to pass the CEH exam (312-50).

Course Instructor: Will Panek

Course Outline

01. Introduction to Hacking

  • Hack, Hacker, hacking
  • Hacking Process
  • Ethical Hacker

02. IT Infrastructure

  • Organizational Infrastructure
  • Server Infrastructure
  • Physical Security Techniques

03. Security Standards and Governance

  • Organizational Protocols
  • Organizational Policies
  • Governmental Policies

04. Encryption Methodologies

  • Encryption Keys
  • Hash Algorithms

05. Ethical Hacking

  • Threat Level Midnight
  • Wireless Attacks
  • Internet of Things (IoT)
  • Malware
  • Spamalot

06. Exploits and Cracking

  • Exploitable bugs
  • Password Cracking
  • Virtual Vulnerabilities
  • Cloud Computing
  • Exploiting Web Applications

07. Recon, Scanning, and Social Engineering

  • Scanning
  • Social Engineering and Monitoring

Skills Learned

After completing this online training course, students will be able to:

  • Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
  • Different types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Different types of vulnerability assessment and vulnerability assessment tools
  • System hacking methodology
  • Different types of malware, malware analysis procedure, and malware countermeasures
  • Various packet sniffing techniques and sniffing countermeasures
  • Social engineering techniques, insider threats, identity theft, and countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
  • Different types of web server and web application attacks, hacking methodology, and countermeasures
  • SQL injection attacks, evasion techniques, and SQL injection countermeasure
  • Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
  • Mobile platform attack vector, andriod and iOS hacking, mobile device management, mobile security guidelines, and security tools
  • Different IoT attacks, IoT hacking methodology, IoT hacking tools, and countermeasures
  • Various cloud computing threats, attacks, and security techniques and tools
  • Different types of encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools