Certified Ethical Hacker

Hacking is often associated with criminal activity in cyber space. It is an illegal entry of people with criminal intent into the cyber world of another person or breaking into the computer system, email or site with malicious objectives. Eventually a hacker, therefore, ends up behind bars, if caught.

Though we have not heard of ‘ethical killing’ or ‘ethical theft’, we have heard enough of ‘Ethical Hacking’ (EH). Tools and modus operandi of both hacking and EH remain the same, the difference lies in the goal. Hacking is negative in nature and is aimed at harming another person by illegally encroaching his cyber space. EH, on the other hand, is intended to fight the hacking menace by employing the same tools. In EH, hacking is justified by its end. End justifies the means, as they say.

An ethical hacker is a person employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities.

The Certified Ethical Hacker C|EH is a professional certification provided by US-based International Council of E-Commerce Consultants or EC-COUNCIL.

The trend of hiring an Ethical Hacker is fast catching on among corporate houses who want to secure their systems against any kind of infiltration in the future.

Ethical Hacking course provides you extensive knowledge about the art or science of hacking. Components of study are the same as learned by an illegal hacker. The only difference is that you are learning through a legalized course which is valid everywhere. Ethical Hacking students get a hands-on experience in real time hacking in an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Current essential security systems are introduced to the students in an intensive lab environment providing him with in-depth knowledge and practical experience. Students will begin by understanding how perimeter defenses work and then they will be trained in scanning and attacking their own networks, though no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, Dodos Attacks, Buffer Overflows and Virus Creation.

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Course Objectives

This program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Goals of Certified Ethical Hacking

 The goal of the Certified Ethical Hacking Course is to teach a delegate to help his organization to take pre-emptive measures against malicious attacks by attacking the system himself whilst confining within legal limits. Delegates should be prepared for action paced course and the sheer size of the CEH training content.

 The instructor will prepare delegates thoroughly for the Certification Examination. the manuals can then be taken home to work up on and can be used as excellent reference volumes.

 at Graytips Cyber Technologies, we have great instructors who are recognized as experts with years of industry experience.

Who should attend?
 Security Officers / Professionals
 IT Auditors
 Website Administrators
 Network Administrators
 System Administrators

 Have good knowledge in Operating Systems and Networking.
 Ideal to have at least a year or two in IT experience, along with basic working knowledge.
 Familiar with Operating Systems like Windows Server (NT, 2000, 2003, 2008), Windows XP and Linux / Unix.

Why is this training important for you?
 One of the most advanced course in the world that covers cutting edge of hacking technology.
 EC-Council researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community.
 The CEH class deals with real life scenario and real threats by real life experts in the field. Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests.
 Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/ penetration tester.
 Play with real life tools that are used by the hacking underground.
 Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space.
 Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment, EC-Council courseware has always sought to provide reference material that continues to be valuable long after the course has concluded.

CEHv9 Course Content

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3 .Scanning Networks
4. Enumeration
5. System Hacking
6. Malware Threats
7. Sniffing
8. Social Engineering
9. Denial of Service
10. Session Hijacking
11. Hacking Web Servers
12. Hacking Web Applications
13. SQL Injection
14. Hacking Wireless Networks
15. Hacking Mobile Platforms
16. Evading IDS, Firewalls, and Honeypots
17. Cloud Computing
18. Cryptography

CEH V9- Big Difference!
18 Modules
140 Labs
More than 1700 pages of Lab Manual.
Well balanced Hands-on Exercises in Windows and Linux
270 Attack Techniques
Over 2200 Hacking Tools
Over 1685 graphically rich slides

 You will appear for the CEH v9 version of Exam 312-50, meaning that you have the most in-demand certification available.
 The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional).
 Students need to pass the online ECC Exam to receive CEH certification.

Legal Agreement
Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. The Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

Course Duration: 5 days