Trainer gesucht
IT-Trainer Jobs und Stellenangebote: Certified Ethical Hacker v13 (CEH v13), EC-Council, Ethical Hacking, Hacking, IT Security, IT-Security Spezialist.
Anmelden / Registrieren als Trainer
Agenda
Module 01: Introduction to Ethical Hacking
- Information Security Overview
- Hacking Concepts
- Ethical Hacking Concepts
- Hacking Methodologies and Frameworks
- Information Security Controls
- Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Internet Research Services
- Footprinting through Social Networking Sites
- Whois Footprinting
- DNS Footprinting
- Network and Email Footprinting
- Footprinting through Social Engineering
- Footprinting Tasks using Advanced Tools and AI
- Footprinting Countermeasures
Module 03: Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Source Port Manipulation
- Network Scanning Countermeasures
Module 04: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
Module 05: Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
Module 06: System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Module 07: Malware Threats
- Malware Concepts
- APT Concepts
- Trojan Concepts
- Virus and Worm Concepts
- Fileless Malware Concepts
- AI-based Malware Concepts
- Malware Analysis
- Malware Countermeasures
- Anti-Malware Software
Module 08: Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Sniffing Countermeasures
Module 09: Social Engineering
- Social Engineering Concepts
- Human-based Social Engineering Techniques
- Computer-based Social Engineering Techniques
- Mobile-based Social Engineering Techniques
- Social Engineering Countermeasures
Module 10: Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures
Module 11: Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
- IDS, IPS, and Firewall Concepts
- IDS, IPS, and Firewall Solutions
- Evading IDS/Firewalls
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Honeypot Concepts
- IDS/Firewall Evasion Countermeasures
Module 13: Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
- Patch Management
Module 14: Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API and Webhooks
- Web Application Security
Module 15: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- Evasion Techniques
- SQL Injection Countermeasures
Module 16: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Attack Countermeasures
Module 17: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
Module 18: IoT and OT Hacking
- IoT Hacking
- IoT Concepts and Attacks
- IoT Hacking Methodology
- IoT Attack Countermeasures
- OT Hacking
- OT Concepts and Attacks
- OT Hacking Methodology
- OT Attack Countermeasures
Module 19: Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Serverless Computing
- Cloud Computing Threats
- Cloud Hacking
- AWS Hacking
- Microsoft Azure Hacking
- Google Cloud Hacking
- Container Hacking
- Cloud Security
Module 20: Cryptography
- Cryptography Concepts and Encryption Algorithms
- Applications of Cryptography
- Cryptanalysis
- Cryptography Attack Countermeasures