EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn

EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn Course Description

Duration: 365.00 days (40 hours)

EC-Council CEH: Certified Ethical Hacker v9 iClass|iLearn, a self-paced learning, provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed to the content presented in the CEHv9 courseware.

CEH is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

What's Included
- Self-paced online training
- One year access to the official e-courseware
- Six months access to EC-Council's official Online lab environment (iLabs)
- Certification Voucher

Buy eLearning

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn Course

  • » Security officers
  • » Auditors
  • » Security professionals
  • » Network Administrators
  • » Firewall Administrators
  • » Site administrators
  • » Individuals concerned about the integrity of the network infrastructure

Back to Top

Course Prerequisites for EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn

  • » Working knowledge of TCP/IP
  • » Basic knowledge of networking, server and network components
  • » Information security background

Back to Top

EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn Course Objectives

  • » Key issues plaguing the information security world, incident management process, and penetration testing
  • » Various types of footprinting, footprinting tools, and countermeasures
  • » Network scanning techniques and scanning countermeasures
  • » System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • » Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • » Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • » Packet sniffing techniques and how to defend against sniffing
  • » Social Engineering techniques, identify theft, and social engineering countermeasures
  • » DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • » Session hijacking techniques and countermeasures
  • » Different types of webserver/ web application attacks, attack methodology, and countermeasures
  • » SQL injection attacks/detection tools
  • » Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools
  • » Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • » Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • » Various cloud computing concepts, threats, attacks, and security techniques and tools
  • » Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • » Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Back to Top

EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn Course Outline

      1. Introduction to Ethical Hacking
        1. Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
        2. Information Security Overview
          1. Year of the Mega Breach
          2. Data Breach Statistics
          3. Malware Trends in 2014
          4. Essential Terminology
          5. Elements of Information Security
          6. The Security, Functionality, and Usability Triangle
        3. Information Security Threats and Attack Vectors
          1. Motives, Goals, and Objectives of Information Security Attacks
          2. Top Information Security Attack Vectors
          3. Information Security Threat Categories
          4. Types of Attacks on a System
        4. Hacking Concepts, Types, and Phases
          1. What is Hacking
          2. Who is a Hacker?
          3. Hacker Classes
          4. Hacking Phases
        5. Ethical Hacking Concepts and Scope
          1. What is Ethical Hacking?
          2. Why Ethical Hacking is Necessary
          3. Scope and Limitations of Ethical Hacking
          4. Skills of an Ethical Hacker
        6. Information Security Controls
          1. Information Assurance (IA)
          2. Information Security Management Program
          3. Threat Modeling
          4. Enterprise Information Security Architecture (EISA)
          5. Network Security Zoning
          6. Defense in Depth
          7. Information Security Policies
          8. Physical Security
          9. Incident Management
          10. What is Vulnerability Assessment?
          11. Penetration Testing
        7. Information Security Laws and Standards
          1. Payment Card Industry Data Security Standard (PCI-DSS)
          2. ISO/IEC 27001:2013
          3. Health Insurance Portability and Accountability Act (HIPAA)
          4. Sarbanes Oxley Act (SOX)
          5. The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
          6. Cyber Law in Different Countries
      2. Footprinting and Reconnaissance
        1. Footprinting Concepts
          1. What is Footprinting?
          2. Objectives of Footprinting
        2. Footprinting Methodology
          1. Footprinting through Search Engines
          2. Footprinting using Advanced Google Hacking Techniques
          3. Footprinting through Social Networking Sites
          4. Website Footprinting
          5. Email Footprinting
          6. Competitive Intelligence
          7. WHOIS Footprinting
          8. DNS Footprinting
          9. Network Footprinting
          10. Footprinting through Social Engineering
          11. Footprinting Tools
        3. Footprinting Countermeasures
        4. Footprinting Penetration Testing
      3. Scanning Networks
        1. Overview of Network Scanning
          1. TCP Communication Flags
          2. TCP/IP Communication
          3. Creating Custom Packet Using TCP Flags
        2. CEH Scanning Methodology
          1. Check for Live Systems
          2. Check for Open Ports
          3. Scanning Beyond IDS
          4. Banner Grabbing
          5. Scan for Vulnerability
          6. Draw Network Diagrams
          7. Prepare Proxies
          8. Scanning Pen Testing
      4. Enumeration
        1. Enumeration Concepts
        2. NetBIOS Enumeration
          1. NetBIOS Enumeration Tool
          2. Enumerating User Accounts
          3. Enumerating Shared Resources Using Net View
        3. SNMP Enumeration
          1. Working of SNMP
          2. Management Information Base (MIB)
          3. SNMP Enumeration Tool
        4. LDAP Enumeration
          1. LDAP Enumeration Tool: Softerra LDAP Administrator
          2. LDAP Enumeration Tools
        5. NTP Enumeration
          1. NTP Enumeration Commands
          2. NTP Enumeration Tools
        6. SMTP Enumeration
          1. SMTP Enumeration Tool: NetScanTools Pro
          2. Telnet Enumeration
          3. DNS Zone Transfer Enumeration Using NSLookup
        7. Enumeration Countermeasures
        8. SMB Enumeration Countermeasures
        9. Enumeration Pen Testing
      5. System Hacking
        1. Information at Hand Before System Hacking Stage
        2. System Hacking: Goals
        3. CEH Hacking Methodology (CHM)
        4. CEH System Hacking Steps
          1. Cracking Passwords
          2. Escalating Privileges
          3. Executing Applications
          4. Spyware
          5. How to Defend Against Keyloggers
          6. How to Defend Against Spyware
        5. Hiding Files
          1. Rootkits
          2. Detecting Rootkits
          3. NTFS Data Stream
          4. What Is Steganography?
          5. Steganalysis
        6. Covering Tracks
          1. Covering Tracks
          2. Disabling Auditing: Auditpol
          3. Clearing Logs
          4. Manually Clearing Event Logs
          5. Ways to Clear Online Tracks
          6. Covering Tracks Tool: CCleaner
          7. Covering Tracks Tool: MRU-Blaster
          8. Track Covering Tools
        7. Penetration Testing
          1. Password Cracking
          2. Privilege Escalation
          3. Executing Applications
          4. Hiding Files
          5. Covering Tracks
      6. Malware Threats
        1. Introduction to Malware
          1. Different Ways a Malware can Get into a System
          2. Common Techniques Attackers Use to Distribute Malware on the Web
        2. Trojan Concepts
          1. Financial Loss Due to Trojans
          2. What is a Trojan?
          3. How Hackers Use Trojans
          4. Common Ports used by Trojans
          5. How to Infect Systems Using a Trojan
          6. Wrappers
          7. Dark Horse Trojan Virus Maker
          8. Trojan Horse Construction Kit
          9. Crypters: AIO FUD Crypter, Hidden Sight Crypter, and Galaxy Crypter
          10. Crypters: Criogenic Crypter, Heaven Crypter, and SwayzCryptor
          11. How Attackers Deploy a Trojan
        3. Types of Trojans
          1. Command Shell Trojans
          2. Defacement Trojans
          3. Defacement Trojans: Restorator
          4. Botnet Trojans
          5. Proxy Server Trojans
          6. FTP Trojans
          7. VNC Trojans
          8. HTTP/HTTPS Trojans
          9. Shttpd Trojan – HTTPS (SSL)
          10. ICMP Tunneling
          11. Remote Access Trojans
          12. Covert Channel Trojan: CCTT
          13. E-banking Trojans
          14. Destructive Trojans: M4sT3r Trojan
          15. Notification Trojans
          16. Data Hiding Trojans (Encrypted Trojans)
        4. Virus and Worms Concepts
          1. Introduction to Viruses
          2. Stages of Virus Life
          3. Working of Viruses:
          4. Why Do People Create Computer Viruses
          5. Indications of Virus Attack
          6. Virus Hoaxes and Fake Antiviruses
          7. Ransomware
          8. Types of Viruses
          9. Writing a Simple Virus Program
          10. Computer Worms
        5. Malware Reverse Engineering
          1. What is Sheep Dip Computer?
          2. Anti-Virus Sensor Systems
          3. Malware Analysis Procedure: Preparing Testbed
          4. Malware Analysis Procedure
          5. Malware Analysis Tool: IDA Pro
          6. Online Malware Testing: VirusTotal
          7. Online Malware Analysis Services
          8. Trojan Analysis: Neverquest
          9. Virus Analysis: Ransom Cryptolocker
          10. Worm Analysis: Darlloz (Internet of Things (IoT) Worm)
        6. Malware Detection
          1. How to Detect Trojans
          2. Virus Detection Methods
        7. Countermeasures
          1. Trojan Countermeasures
          2. Backdoor Countermeasures
          3. Virus and Worms Countermeasures
        8. Anti-Malware Software
          1. Anti-Trojan Software
          2. Anti-Trojan Software
          3. Companion Antivirus: Immunet
          4. Anti-virus Tools
        9. Penetration Testing
          1. Pen Testing for Trojans and Backdoors
          2. Penetration Testing for Virus
      7. Sniffing
        1. Sniffing Concepts
          1. Network Sniffing and Threats
          2. How a Sniffer Works
          3. Types of Sniffing
          4. How an Attacker Hacks the Network Using Sniffers
          5. Protocols Vulnerable to Sniffing
          6. Sniffing in the Data Link Layer of the OSI Model
          7. Hardware Protocol Analyzer
          8. Hardware Protocol Analyzers
          9. SPAN Port
          10. Wiretapping
          11. Lawful Interception
          12. Wiretapping Case Study: PRISM
        2. MAC Attacks
          1. MAC Address/CAM Table
          2. How CAM Works
          3. What Happens When CAM Table Is Full?
          4. MAC Flooding
          5. Mac Flooding Switches with macof
          6. Switch Port Stealing
          7. How to Defend against MAC Attacks
        3. DHCP Attacks
          1. How DHCP Works
          2. DHCP Request/Reply Messages
          3. IPv4 DHCP Packet Format
          4. DHCP Starvation Attack
          5. DHCP Starvation Attack Tools
          6. Rogue DHCP Server Attack
          7. How to Defend Against DHCP Starvation and Rogue Server Attack
        4. ARP Poisoning
          1. What Is Address Resolution Protocol (ARP)?
          2. ARP Spoofing Attack
          3. How Does ARP Spoofing Work
          4. Threats of ARP Poisoning
          5. ARP Poisoning Tool
          6. How to Defend Against ARP Poisoning
          7. Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
          8. ARP Spoofing Detection: XArp
        5. Spoofing Attack
          1. MAC Spoofing/Duplicating
          2. MAC Spoofing Technique: Windows
          3. MAC Spoofing Tool: SMAC
          4. IRDP Spoofing
          5. How to Defend Against MAC Spoofing
        6. DNS Poisoning
          1. DNS Poisoning Techniques
          2. Intranet DNS Spoofing
          3. Internet DNS Spoofing
          4. Proxy Server DNS Poisoning
          5. DNS Cache Poisoning
          6. How to Defend Against DNS Spoofing
        7. Sniffing Tools
        8. Sniffing Tool: Wireshark
        9. Follow TCP Stream in Wireshark
        10. Display Filters in Wireshark
        11. Additional Wireshark Filters
        12. Sniffing Tool
        13. Packet Sniffing Tool: Capsa Network Analyzer
        14. Network Packet Analyzer
          1. TCP/IP Packet Crafter: Colasoft Packet Builder
          2. Network Packet Analyzer: RSA NetWitness Investigator
          3. Additional Sniffing Tools
          4. Packet Sniffing Tools for Mobile: Wi.cap. Network Sniffer Pro and FaceNiff
        15. Counter measures
          1. How to Defend Against Sniffing
        16. Sniffing Detection Techniques
          1. How to Detect Sniffing
          2. Sniffer Detection Technique
          3. Promiscuous Detection Tool
        17. Sniffing Pen Testing
      8. Social Engineering
        1. Social Engineering Concepts
          1. What is Social Engineering?
          2. Behaviors Vulnerable to Attacks
          3. Factors that Make Companies Vulnerable to Attacks
          4. Why Is Social Engineering Effective?
          5. Warning Signs of an Attack
          6. Phases in a Social Engineering Attack
        2. Social Engineering Techniques
          1. Types of Social Engineering
          2. Watch these Movies
          3. Watch this Movie
          4. Computer-based Social Engineering
          5. Mobile-based Social Engineering
          6. Insider Attack
          7. Disgruntled Employee
          8. Preventing Insider Threats
          9. Common Social Engineering Targets and Defense Strategies
        3. Impersonation on Social Networking Sites
          1. Social Engineering Through Impersonation on Social Networking Sites
          2. Social Engineering on Facebook
          3. Social Engineering on LinkedIn and Twitter
          4. Risks of Social Networking to Corporate Networks
        4. Identity Theft
          1. Identity Theft Statistics
          2. Identify Theft
          3. How to Steal an Identity
          4. Real Steven Gets Huge Credit Card Statement
          5. Identity Theft – Serious Problem
        5. Social Engineering Countermeasures
          1. How to Detect Phishing Emails
          2. Anti-Phishing Toolbar
          3. Identity Theft Countermeasures
        6. Penetration Testing
          1. Social Engineering Pen Testing
      9. Denial-of-Service
        1. DoS/DDoS Concepts
          1. DDoS Attack Trends
          2. What is a Denial of Service Attack?
          3. What Are Distributed Denial of Service Attacks?
          4. How Distributed Denial of Service Attacks Work
        2. DoS/DDoS Attack Techniques
          1. Basic Categories of DoS/DDoS Attack Vectors
          2. DoS/DDoS Attack Techniques
        3. Botnets
          1. Organized Cyber Crime: Organizational Chart
          2. Botnet
          3. A Typical Botnet Setup
          4. Botnet Ecosystem
          5. Scanning Methods for Finding Vulnerable Machines
          6. How Malicious Code Propagates?
          7. Botnet Trojan
        4. DDoS Case Study
          1. DDoS Attack
          2. Hackers Advertise Links to Download Botnet
        5. DoS/DDoS Attack Tools
          1. Pandora DDoS Bot Toolkit
          2. Dereil and HOIC
          3. DoS HTTP and BanglaDos
          4. DoS and DDoS Attack Tools
          5. DoS and DDoS Attack Tool for Mobile
        6. Counter-measures
          1. Detection Techniques
          2. Activity Profiling
          3. Wavelet Analysis
          4. Sequential Change-Point Detection
          5. DoS/DDoS Countermeasure Strategies
          6. DDoS Attack Countermeasures
          7. Post-Attack Forensics
          8. Techniques to Defend against Botnets
          9. DoS/DDoS Countermeasures
          10. DoS/DDoS Protection at ISP Level
          11. Enabling TCP Intercept on Cisco IOS Software
          12. Advanced DDoS Protection Appliances
        7. DoS/DDoS Protection Tools
          1. DoS/DDoS Protection Tool: FortGuard Anti-DDoS Firewall 2014
          2. DoS/DDoS Protection Tools
        8. DoS/DDoS Attack Penetration Testing
      10. Session Hijacking
        1. Session Hijacking Concepts
          1. What is Session Hijacking?
          2. Why Session Hijacking is Successful?
          3. Session Hijacking Process
          4. Packet Analysis of a Local Session Hijack
          5. Types of Session Hijacking
          6. Session Hijacking in OSI Model
          7. Spoofing vs. Hijacking
        2. Application Level Session Hijacking
          1. Compromising Session IDs using Sniffing
          2. Compromising Session IDs by Predicting Session Token
          3. How to Predict a Session Token
          4. Compromising Session IDs Using Man-in-the-Middle Attack
          5. Compromising Session IDs Using Man-in-the-Browser Attack
          6. Steps to Perform Man-in-the-Browser Attack
          7. Compromising Session IDs Using Client-side Attacks
          8. Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
          9. Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
          10. Compromising Session IDs Using Session Replay Attack
          11. Compromising Session IDs Using Session Fixation
          12. Session Fixation Attack
          13. Session Hijacking Using Proxy Servers
        3. Network-level Session Hijacking
          1. The 3-Way Handshake
          2. TCP/IP Hijacking
          3. TCP/IP Hijacking Process
          4. IP Spoofing: Source Routed Packets
          5. RST Hijacking
          6. Blind Hijacking
          7. MiTM Attack Using Forged ICMP and ARP Spoofing
          8. UDP Hijacking
        4. Session Hijacking Tools
          1. Session Hijacking Tool
          2. Session Hijacking Tools
          3. Session Hijacking Tools for Mobile: DroidSheep and DroidSniff
        5. Counter-measures
          1. Session Hijacking Detection Methods
          2. Protecting against Session Hijacking
          3. Methods to Prevent Session Hijacking
          4. Approaches Vulnerable to Session Hijacking and their Preventative Solutions
          5. IPSec
          6. Modes of IPsec
          7. IPsec Architecture
          8. IPsec Authentication and Confidentiality
          9. Components of IPsec
        6. Session Hijacking Pen Testing
      11. Hacking Webservers
        1. Webserver Concepts
          1. Web Server Security Issue
          2. Why Web Servers Are Compromised
          3. Impact of Webserver Attacks
          4. Open Source Webserver Architecture
          5. IIS Webserver Architecture
        2. Webserver Attacks
          1. DoS/DDoS Attacks
          2. DNS Server Hijacking
          3. DNS Amplification Attack
          4. Directory Traversal Attacks
          5. Man-in-the-Middle/Sniffing Attack
          6. Phishing Attacks
          7. Website Defacement
          8. Webserver Misconfiguration Example
          9. HTTP Response Splitting Attack
          10. Web Cache Poisoning Attack
          11. SSH Bruteforce Attack
          12. Webserver Password Cracking
          13. Web Application Attacks
        3. Attack Methodology
          1. Webserver Attack Methodology
          2. Webserver Footprinting Tools
          3. Enumerating Webserver Information Using Nmap
          4. Webserver Attack Methodology
        4. Webserver Attack Tools
          1. Metasploit
          2. Webserver Attack Tools: Wfetch
          3. Web Password Cracking Tool: THC-Hydra and Brutus
        5. Counter-measures
          1. Place Web Servers in Separate Secure Server Security Segment on Network
          2. Countermeasures
          3. Detecting Web Server Hacking Attempts
          4. How to Defend Against Web Server Attacks
          5. How to Defend against HTTP Response Splitting and Web Cache Poisoning
          6. How to Defend against DNS Hijacking
        6. Patch Management
          1. Patches and Hotfixes
          2. What Is Patch Management?
          3. Identifying Appropriate Sources for Updates and Patches
          4. Installation of a Patch
          5. Implementation and Verification of a Security Patch or Upgrade
          6. Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
          7. Patch Management Tools
        7. Webserver Security Tools
          1. Web Application Security Scanner: Syhunt Dynamic and N-Stalker Web Application Security Scanner
          2. Web Server Security Scanner: Wikto and Acunetix Web Vulnerability Scanner
          3. Web Server Malware Infection Monitoring Tool
          4. Webserver Security Tools
        8. Webserver Pen Testing
          1. Web Server Pen Testing Tool
      12. Hacking Web Applications
        1. Web App Concepts
          1. Introduction to Web Applications
          2. How Web Applications Work?
          3. Web Application Architecture
          4. Web 2.0 Applications
          5. Vulnerability Stack
        2. Web App Threats
          1. Unvalidated Input
          2. Parameter/Form Tampering
          3. Directory Traversal
          4. Security Misconfiguration
          5. Injection Flaws
          6. SQL Injection Attacks
          7. Command Injection Example
          8. File Injection Attack
          9. What is LDAP Injection?
          10. Hidden Field Manipulation Attack
          11. Cross-Site Scripting (XSS) Attacks
          12. Cross-Site Request Forgery (CSRF) Attack
          13. Web Application Denial-of-Service (DoS) Attack
          14. Denial of Service (DoS) Examples
          15. Buffer Overflow Attacks
          16. Cookie/Session Poisoning
          17. Session Fixation Attack
          18. CAPTCHA Attacks
          19. Insufficient Transport Layer Protection
          20. Improper Error Handling
          21. Insecure Cryptographic Storage
          22. Broken Authentication and Session Management
          23. Unvalidated Redirects and Forwards
          24. Web Services Architecture
          25. Web Services Attack
          26. Web Services Footprinting Attack
          27. Web Services XML Poisoning
        3. Web App Hacking Methodology
          1. Footprint Web Infrastructure
          2. Attack Web Servers
          3. Analyze Web Applications
          4. Attack Authentication Mechanism
          5. Authorization Attack Schemes
          6. Attack Session Management Mechanism
          7. Perform Injection Attacks
          8. Attack Data Connectivity
          9. Attack Web App Client
          10. Attack Web Services
        4. Web Application Hacking Tools
          1. Web Application Hacking Tools
        5. Countermeasures
          1. Encoding Schemes
          2. How to Defend Against SQL Injection Attacks?
          3. How to Defend Against Command Injection Flaws?
          4. How to Defend Against XSS Attacks?
          5. How to Defend Against DoS Attack?
          6. How to Defend Against Web Services Attack?
          7. Guidelines for Secure CAPTCHA Implementation
          8. Web Application Countermeasures
          9. How to Defend Against Web Application Attacks?
        6. Security Tools
          1. Web Application Security Tool
          2. Web Application Security Tools
          3. Web Application Firewall
          4. Web Application Firewall
        7. Web App Pen Testing
          1. Web Application Pen Testing
          2. Web Application Pen Testing Framework
      13. SQL Injection
        1. SQL Injection Concepts
          1. What is SQL Injection?
          2. Why Bother about SQL Injection?
          3. How Web Applications Work?
          4. SQL Injection and Server-side Technologies
          5. Understanding HTTP Post Request
          6. Example: Normal SQL Query
          7. Understanding an SQL Injection Query
          8. Example of a Web App Vulnerable to SQL Injection
          9. Example of SQL Injection
        2. Types of SQL Injection
          1. Error Based SQL Injection
          2. Union SQL Injection
          3. Blind SQL Injection
          4. No Error Messages Returned
          5. Blind SQL Injection: WAITFOR DELAY (YES or NO Response)
          6. Boolean Exploitation Technique
        3. SQL Injection Methodology
          1. Information Gathering and SQL Injection Vulnerability Detection
          2. Launch SQL Injection Attacks
          3. Advanced SQL Injection
        4. SQL Injection Tools
          1. BSQLHacker
          2. Marathon Tool
          3. SQL Power Injector
          4. Havij
          5. SQL Injection Tools
          6. SQL Injection Tool for Mobile
        5. Evasion Techniques
          1. Evading IDS
          2. Types of Signature Evasion Techniques
          3. Evasion Technique
        6. Counter-measures
          1. How to Defend Against SQL Injection Attacks?
          2. How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
          3. How to Defend Against SQL Injection Attacks
          4. SQL Injection Detection Tool
          5. Snort Rule to Detect SQL Injection Attacks
          6. SQL Injection Detection Tools
      14. Hacking Wireless Networks
        1. Wireless Concepts
          1. Wireless Terminologies
          2. Wireless Networks
          3. Wi-Fi Networks at Home and Public Places
          4. Wireless Technology Statistics
          5. Types of Wireless Networks
          6. Wireless Standards
          7. Service Set Identifier (SSID)
          8. Wi-Fi Authentication Modes
          9. Wi-Fi Authentication Process Using a Centralized Authentication Server
          10. Wi-Fi Chalking
          11. Types of Wireless Antenna
        2. Wireless Encryption
          1. Types of Wireless Encryption
          2. WEP vs. WPA vs. WPA2
          3. WEP Issues
          4. Weak Initialization Vectors (IV)
          5. How to Break WEP Encryption?
          6. How to Break WPA Encryption?
          7. How to Defend Against WPA Cracking?
        3. Wireless Threats
          1. Access Control Attacks
          2. Integrity Attacks
          3. Confidentiality Attacks
          4. Availability Attacks
          5. Authentication Attacks
          6. Rogue Access Point Attack
          7. Client Mis-association
          8. Misconfigured Access Point Attack
          9. Unauthorized Association
          10. Ad Hoc Connection Attack
          11. HoneySpot Access Point Attack
          12. AP MAC Spoofing
          13. Denial-of-Service Attack
          14. Jamming Signal Attack
          15. Wi-Fi Jamming Devices
        4. Wireless Hacking Methodology
          1. Wi-Fi Discovery
          2. GPS Mapping
          3. Wireless Traffic Analysis
          4. Launch Wireless Attacks
          5. Crack Wi-Fi Encryption
        5. Wireless Hacking Tools
          1. Wi-Fi Sniffer: Kismet
          2. Wardriving Tools
          3. RF Monitoring Tools
          4. Wi-Fi Traffic Analyzer Tools
          5. Wi-Fi Raw Packet Capturing and Spectrum Analyzing Tools
          6. Wireless Hacking Tools for Mobile: HackWifi and Backtrack Simulator
        6. Bluetooth Hacking
          1. Bluetooth Stack
          2. Bluetooth Threats
          3. How to BlueJack a Victim?
          4. Bluetooth Hacking Tool
          5. Bluetooth Hacking Tools
        7. Counter-measures
          1. How to Defend Against Bluetooth Hacking?
          2. How to Detect and Block Rogue AP?
          3. Wireless Security Layers
          4. How to Defend Against Wireless Attacks?
        8. Wireless Security Tools
          1. Wireless Intrusion Prevention Systems
          2. Wireless IPS Deployment
          3. Wi-Fi Security Auditing Tool
          4. Wi-Fi Intrusion Prevention System
          5. Wi-Fi Predictive Planning Tools
          6. Wi-Fi Vulnerability Scanning Tools
          7. Bluetooth Security Tool: Bluetooth Firewall
          8. Wi-Fi Security Tools for Mobile: Wifi Protector, WiFiGuard, and Wifi Inspector
        9. Wi-Fi Pen Testing
          1. Wireless Penetration Testing
          2. Wireless Penetration Testing Framework
          3. Wi-Fi Pen Testing Framework
          4. Pen Testing LEAP Encrypted WLAN
          5. Pen Testing WPA/WPA2 Encrypted WLAN
          6. Pen Testing WEP Encrypted WLAN
          7. Pen Testing Unencrypted WLAN
      15. Hacking Mobile Platforms
        1. Mobile Platform Attack Vectors
          1. Vulnerable Areas in Mobile Business Environment
          2. OWASP Mobile Top 10 Risks
          3. Anatomy of a Mobile Attack
          4. How a Hacker can Profit from Mobile when Successfully Compromised
          5. Mobile Attack Vectors
          6. Mobile Platform Vulnerabilities and Risks
          7. Security Issues Arising from App Stores
          8. App Sandboxing Issues
          9. Mobile Spam
          10. SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
          11. Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
        2. Hacking Android OS
          1. Android OS
          2. Android OS Architecture
          3. Android Device Administration API
          4. Android Vulnerabilities
          5. Android Rooting
          6. Hacking Networks Using Network Spoofer
          7. Session Hijacking Using DroidSheep
          8. Android-based Sniffer
          9. Android Trojan
          10. Securing Android Devices
          11. Google Apps Device Policy
          12. Remote Wipe Service: Remote Wipe
          13. Android Security Tool
          14. Android Vulnerability Scanner: X-Ray
          15. Android Device Tracking Tools
        3. Hacking iOS
          1. Apple iOS
          2. Jailbreaking iOS
          3. Guidelines for Securing iOS Devices
          4. iOS Device Tracking Tools
        4. Hacking Windows Phone OS
          1. Windows Phone 8 Architecture
          2. Secure Boot Process
          3. Guidelines for Securing Windows OS Devices
          4. Windows OS Device Tracking Tool: FollowMee GPS Tracker
        5. Hacking BlackBerry
          1. BlackBerry Operating System
          2. BlackBerry Enterprise Solution Architecture
          3. Blackberry Attack Vectors
          4. Guidelines for Securing BlackBerry Devices
          5. BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker
          6. Mobile Spyware: mSpy and StealthGenie
          7. Mobile Spyware
        6. Mobile Device Management (MDM)
          1. MDM Solution: MaaS360 Mobile Device Management (MDM)
          2. MDM Solutions
          3. Bring Your Own Device (BYOD)
        7. Mobile Security Guidelines and Tools
          1. General Guidelines for Mobile Platform Security
          2. Mobile Device Security Guidelines for Administrator
          3. SMS Phishing Countermeasures
          4. Mobile Protection Tool
          5. Mobile Protection Tools
          6. Mobile Anti-Spyware
        8. Mobile Pen Testing
          1. Android Phone Pen Testing
          2. iPhone Pen Testing
          3. Windows Phone Pen Testing
          4. BlackBerry Pen Testing
          5. Mobile Pen Testing Toolkit
      16. Evading IDS, Firewalls, and Honeypots
        1. IDS, Firewall and Honeypot Concepts
          1. Intrusion Detection Systems (IDS) and their Placement
          2. Firewall
          3. Honeypot
        2. IDS, Firewall and Honeypot System
          1. Intrusion Detection Tool: Snort
          2. Snort Rules
          3. Intrusion Detection Systems: Tipping Point
          4. Intrusion Detection Tools
          5. Intrusion Detection Tools for Mobile
          6. Firewalls
          7. Firewalls for Mobile: Android Firewall and Firewall iP
          8. Firewalls for Mobile
          9. Honeypot Tool: KFSensor and SPECTER
          10. Honeypot Tools
          11. Honeypot Tool for Mobile: HosTaGe
        3. Evading IDS
          1. Insertion Attack
          2. Evasion
          3. Denial-of-Service Attack (DoS)
          4. Obfuscating
          5. False Positive Generation
          6. Session Splicing
          7. Unicode Evasion Technique
          8. Fragmentation Attack
          9. Time-To-Live Attacks
          10. Invalid RST Packets
          11. Urgency Flag
          12. Polymorphic Shellcode
          13. ASCII Shellcode
          14. Application-Layer Attacks
          15. Desynchronization – Pre Connection SYN
          16. Desynchronization – Post Connection SYN
          17. Other Types of Evasion
        4. Evading Firewalls
          1. Firewall Identification
          2. IP Address Spoofing
          3. Source Routing
          4. Tiny Fragments
          5. Bypass Blocked Sites Using IP Address in Place of URL
          6. Bypass Blocked Sites Using Anonymous Website Surfing Sites
          7. Bypass a Firewall Using Proxy Server
          8. Bypassing Firewall through ICMP Tunneling Method
          9. Bypassing Firewall through ACK Tunneling Method
          10. Bypassing Firewall through HTTP Tunneling Method
          11. Why do I Need HTTP Tunneling
          12. HTTP Tunneling Tools
          13. Bypassing Firewall through SSH Tunneling Method
          14. SSH Tunneling Tool: Bitvise
          15. Bypassing Firewall through External Systems
          16. Bypassing Firewall through MITM Attack
          17. Bypassing Firewall through Content
        5. IDS/Firewall Evading Tools
          1. IDS/Firewall Evasion Tool
          2. IDS/Firewall Evasion Tools
          3. Packet Fragment Generator: Colasoft Packet Builder
          4. Packet Fragment Generators
        6. Detecting Honeypots
          1. Detecting Honeypots
          2. Honeypot Detecting Tool: Send-Safe Honeypot Hunter
        7. IDS/Firewall Evasion Counter-measures
          1. Countermeasures
        8. Penetration Testing
          1. Firewall/IDS Penetration Testing
          2. Firewall Penetration Testing
          3. IDS Penetration Testing
      17. Cloud Computing
        1. Introduction to Cloud Computing
          1. Types of Cloud Computing Services
          2. Separation of Responsibilities in Cloud
          3. Cloud Deployment Models
          4. NIST Cloud Computing Reference Architecture
          5. Cloud Computing Benefits
          6. Understanding Virtualization
          7. Benefits of Virtualization in Cloud
        2. Cloud Computing Threats
        3. Cloud Computing Attacks
          1. Service Hijacking using Social Engineering Attacks
          2. Service Hijacking using Network Sniffing
          3. Session Hijacking using XSS Attack
          4. Session Hijacking using Session Riding
          5. Domain Name System (DNS) Attacks
          6. Side Channel Attacks or Cross-guest VM Breaches
          7. SQL Injection Attacks
          8. Cryptanalysis Attacks
          9. Wrapping Attack
          10. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
        4. Cloud Security
          1. Cloud Security Control Layers
          2. Cloud Security is the Responsibility of both Cloud Provider and Consumer
          3. Cloud Computing Security Considerations
          4. Placement of Security Controls in the Cloud
          5. Best Practices for Securing Cloud
          6. NIST Recommendations for Cloud Security
          7. Organization/Provider Cloud Security Compliance Checklist
        5. Cloud Security Tools
          1. Core CloudInspect
          2. CloudPassage Halo
          3. Cloud Security Tools
        6. Cloud Penetration Testing
          1. What is Cloud Pen Testing?
          2. Key Considerations for Pen Testing in the Cloud
          3. Scope of Cloud Pen Testing
          4. Cloud Penetration Testing
          5. Recommendations for Cloud Testing
      18. Cryptography
        1. Market Survey 2014: The Year of Encryption
        2. Case Study: Heartbleed
        3. Case Study: Poodlebleed
        4. Cryptography Concepts
          1. Cryptography
          2. Types of Cryptography
          3. Government Access to Keys (GAK)
        5. Encryption Algorithms
          1. Ciphers
          2. Data Encryption Standard (DES)
          3. Advanced Encryption Standard (AES)
          4. RC4, RC5, RC6 Algorithms
          5. The DSA and Related Signature Schemes
          6. RSA (Rivest Shamir Adleman)
          7. Message Digest (One-way Hash) Functions
          8. Secure Hashing Algorithm (SHA)
          9. What is SSH (Secure Shell)?
        6. Cryptography Tools
          1. MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
          2. Hash Calculators for Mobile: MD5 Hash Calculator, Hash Droid, and Hash Calculator
          3. Cryptography Tool
          4. Cryptography Tools
          5. Cryptography Tools for Mobile: Secret Space Encryptor, CryptoSymm, and Cipher Sender
        7. Public Key Infrastructure(PKI)
          1. Certification Authorities
          2. Signed Certificate (CA) Vs. Self Signed Certificate
        8. Email Encryption
          1. Digital Signature
          2. SSL (Secure Sockets Layer)
          3. Transport Layer Security (TLS)
          4. Cryptography Toolkit
          5. Pretty Good Privacy (PGP)
        9. Disk Encryption
          1. Disk Encryption Tools: Symantec Drive Encryption and GiliSoft Full Disk Encryption
          2. Disk Encryption Tools
        10. Cryptography Attacks
          1. Code Breaking Methodologies
          2. Brute-Force Attack
          3. Meet-in-the-Middle Attack on Digital Signature Schemes
          4. Side Channel Attack
        11. Cryptanalysis Tools
          1. Cryptanalysis Tool: CrypTool
          2. Cryptanalysis Tools
          3. Online MD5 Decryption Tool

Back to Top

EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn Course Benefits

  • » The CEH v9 completely maps to National Initiative for Cybersecurity Education (NICE) framework - NICE's speciality area category 'Protect and Defend'.

Back to Top

This training prepares students for the following exam(s):

  • » 312-50 : Certified Ethical Hacker

Back to Top

Do you have the right background for EC-Council Certified Ethical Hacker (CEH) v9 iClass|iLearn?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Emilio G.
- Vastly experienced working within multinational environments and capable of connecting to different audiences - In-depth expertise in the implementation, troubleshooting and documentation of networks and security systems, with strong "hands on" technical knowledge of CISSP, CEH and CHFI. - Master of Science in Electronics Engineering, and holder of several technical certifications. - Highly-skilled in diverse fields ranging from Security, Computer Forensics, Networking, Routing Protocols, Programming, Databases and Applications to name a few. Bio: With over 25 years of technical experience, Emilio brings a dynamic set of skills supported by a Masters Degree in Electronics Engineering and on-the-field experience working in multinational environments. He also holds more than 12 Cisco, CompTIA, and Microsoft certifications. Although he is well versed and thorough in multiple technological fields, his technical forte lies in the security domain, specifically CISSP, CEH and CHFI. Emilio's skills have evolved over time, studying closely and constantly staying well informed of the growing cyber threats. These are just some of the few reasons why Emilio brings to his classes more than just what's in the books.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.


Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.


Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

Great pleasant and patient instructor. It was my first time here and it was very good will come back again.

- Adrienne P.

Course(s) Taken

» EC-Council CEH: Certified Ethical Hacker v9 & CNDA: Certified Network Defense Architect

Very informative instructor, showed us real world examples. Class was great wish it could be longer.

- Julyan S.

Course(s) Taken

» EC-Council CEH: Certified Ethical Hacker v9 & CNDA: Certified Network Defense Architect

It was a very pleasant class to be in. The instructor was extremely helpful in giving us detailed information about the exam and I loved how he explained the lab modules.

- Anjla K.

Course(s) Taken

» EC-Council CEH: Certified Ethical Hacker v9 & CNDA: Certified Network Defense Architect

  More testimonials »  

Back to Top