Our Certified Ethical Hacking class, is one of the most hands on and interactive class offerings available in this field. With nearly a 100% pass rate, our ethical hacking/pen test expert will teach students to complete a penetration test of an enterprise system.
Students are first introduced to the art of passive reconnaissance, and taught to manipulate engines like Google in order to uncover the wealth of publicly available information on well known organizations. After this reconnaissance exercise, students are taught how to perform network discovery using tools such as nmap, hping and others. Students will then manually create scripts to automate these tasks of network footprinting. Then, following discovery, students will be introduced to the skill of vulnerability identification, which teaches them the proper techniques for identifying potential vulnerabilities.
Finally, after students have mastered these techniques, they’ll move on to the very elusive art of exploitation. In other words, they’ll prove that the identified vulnerabilities are real by exploiting them. They’ll learn how to help their organization know which vulnerabilities are real (and actually need to be addressed) versus which ones are false positives. Students will also be introduced to countermeasures, and also be introduced to defensive techniques such as configuring and installing IDS systems like Snort.
Throughout the entire class a strong emphasis is placed on documentation. Kelari’s CEH training program is carefully to be a perfect blend of 30% lecture and 70% in depth hands on labs and demonstrations. There is a strong focus placed on skills building and not just running through a bunch of tools. Additionally, there will be test preparation software created by the author of the most used and trusted CEH exam prep tools in the industry.
The CEH exam tests students on the following areas of expertise:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Penetration Testing
Upon completion of this five day course, students can expect to not only pass the CEH exam, but have the expertise to perform real world penetration tests within the enterprise.