Certified Ethical Hacker (CEHv8)

Certified Ethical Hacker (CEHv8)
Lina Building, Jakarta | 20 – 24 June 2016 | USD 1100
Lina Building, Jakarta | 18 – 22 July 2016 | USD 1100
Lina Building, Jakarta | 22 – 26 August 2016 | USD 1100
Lina Building, Jakarta | 19 – 23 September 2016 | USD 1100
Lina Building, Jakarta | 17 – 21 october 2016 | USD 1100

Jadwal Training 2016 Selanjutnya …

 

 

The World’s Most Advance

Ethical Hacking and Penetration Testing

COURSE DESCRIPTION CERTIFIED ETHICAL HACKER  (CEHv8)

This course will immerse the participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. Participants will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.



COURSE
OBJECTIVES CERTIFIED ETHICAL HACKER  (CEHv8)

After completing this course, participants will have hands on understanding and experience in Ethical Hacking.

 

TARGET AUDIENCE TRAINING  CERTIFIED ETHICAL HACKER  (CEHv8)

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

 

DURATION

Five (5) Days

 

PREREQUISITES

Participants must have a working knowledge of TCP/IP and at least one year of professional experience with networking technologies.

 

COURSE MODULES CERTIFIED ETHICAL HACKER (CEHv8)

Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Hacking Phases
  • Types of Attack
  • Information Security Controls

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Threats
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Module 3: Scanning Networks

  • Network Scanning Overview
  • Scanning Methodology
  • Check for Live Systems
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Scanning Pen Testing

Module 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • Unix/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Module 5: System Hacking

  • Information at Hand Before Hacking Stage
  • System Hacking: Goals
  • Hacking Methodology
  • System Hacking Steps
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Module 6: Trojans and Backdoors

  • Trojan Concepts
  • Trojan Infection
  • Types of Trojans
  • Trojan Detection
  • Countermeasures
  • Anti-Trojan Software
  • Pen Testing for Trojans and Backdoors

Module 7: Viruses and Worms

  • Virus and Worms Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Counter-measures
  • Penetration Testing for Virus

Module 8: Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Counter Measures
  • Sniffing Pen Testing

Module 9: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Imperso-nation Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Social Engineering Pen Testing

Module 10: Denial of Service

  • DoS/DDoS Concepts
  • DoS Attack Techniques
  • Botnet
  • DDoS Case Study
  • DoS Attack Tools
  • Counter-measures
  • DoS/DdoS Protection Tools
  • Denial of Service (DoS) Attack Penetration Testing

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Module 12: Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Module 13: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing

Module 14: SQL Injection

  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • Advanced SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

Module 15: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

Module 16: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking Blackberry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Module 17: Evading IDS, Firewalls and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evading Tools
  • Countermeasures
  • Penetration Testing

Module 18: Buffer Overflows

  • Buffer Overflow Concepts
  • Buffer Overflow Methodology
  • Buffer Overflow Examples
  • Buffer Overflow Detection
  • Buffer Overflow Counter-measures
  • Buffer Overflow Security Tools
  • Buffer Overflow Penetration Testing

Module 19: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

Module 20: Penetration Testing

  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Techniques
  • Pen Testing Phases
  • Pen Testing Roadmap
  • Outsourcing Pen Testing Services

 

 

 

 

 

TIME AND VENUE CERTIFIED ETHICAL HACKER  (CEHv8)

  • Time      :
    • 20 – 24 June 2016
    • 18 – 22 July 2016
    • 22 – 26 August 2016
    • 19 – 23 September 2016
    • 17 – 21 october 2016
    • 21 – 25 November 2016
    • 19 – 23 December 2016
  • Venue    : Lina Building 4th Floor Suite 407, Jl. HR. Rasuna Said Kav. B-7, Kuningan, Jakarta Selatan

 

 

PRICING AND TRAINING PACKAGES

 

Price

USD 1100

 

Training Packages

  • Original Certified Ethical Hacker Courseware from EC-Council
  • DVD Tools
  • CEH Labs
  • CEH Exam Voucher
  • Certificate of Attendance from EC-Council
  • CEH Certification from EC-Council (if pass the exam)
  • Lunch and Coffee Break
  • Stationery and Souvenir

 

Formulir Permintaaan Informasi Lanjutan / Pra-Pendaftaran Public Training
  1. INFORMATION OPTIONS
  2. (required)
  3. (required)
  4. PERSONAL DATA
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. PRE REGISTRATION DATA (Tidak Mengikat)
  12. (required)
  13. MESSAGE FOR TRAINING PROVIDER
  14. Captcha
 

cforms contact form by delicious:days