PACE NONCREDIT COURSE:
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
Areas of Study
Course Type
Overview
| Duration: 5 Days
This comprehensive boot camp teaches you how to use the tools and techniques used by cybercriminals to perform an ethical hack on your organization. You will learn ethical hacking methodologies and gain hands-on hacking experience in our cloud-hosted cyber range, including reconnaissance, gaining access to systems, exploiting vulnerabilities, and exfiltrating data.
You will gain the ability to quantitatively assess and measure threats to information assets — and discover where your organization is most vulnerable to hacking. This boot camp also prepares you to earn two in-demand certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+. From penetration testing to certified ethical hacker concepts, you will be ready to advance your career in cybersecurity upon course completion.
You will receive an exam voucher for the EC-Council CEH and the CompTIA PenTest+ certification exams with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
Curriculum
- Day 1- Ethical Hacking & Penetration Testing Methodologies
- Security testing methodologies
- The ethical hacking profession
- Planning and scoping an engagement
- Legal and compliance considerations
- Ethical hacking methodologies
- Tools of the trade
- Linux overview
- Passive intelligence gathering
- Abusing DNS and SNMP
- Security testing methodologies
- Day 2 – Network Scanning and Service Identification
- Understanding TCP packets and structures
- Passive network discovery and scanning
- TCP scanning
- Using differences in RFC implementations to your advantage
- Scanning through firewalls
- How to prevent the discovery of your reconnaissance activities
- Using zombies to mask network scanning
- Avoiding IDS/IPS detection
- Proper identification of services
- Vulnerability identification
- Day 3 – Vulnerabilities
- Vulnerability life cycles
- Types of vulnerabilities
- Flaws in encryption
- Configuration errors
- Buffer overflows
- Stack overflows
- Vulnerability mapping
- Exploit utilization and delivery methods
- Client side exploits
- Server side exploits
- Password security
- Social engineering techniques
- Attacking physical controls
- Hashing
- Rainbow tables
- Attacking Windows password security
- Weaknesses in Windows authentication protocols
- Day 4 – Exfiltration of Data & SQL Injection
- Use of Trojans
- Redirecting ports to thwart firewall rules
- Avoiding anti-virus detection
- Lateral movement and persistence
- Use of keyloggers
- IDS operations and avoidance
- Encrypting your communications
- Protocol abuse for covert communications
- Creating custom encryption tunneling applications
- E-shoplifting
- XSS attacks
- Cross site forgery
- Circumventing authentication
- SQL injection discovery and exploitation
- SQL data extraction
- Day 5 – Wireless Security, Basic Scripts for Ethical Hacking & Covering Your Tracks
- Sniffing in different environments
- Attack sniffers
- Man-in-the-middle attacks
- Wireless networking
- Shared key authentication weaknesses
- WEP/WPA/WPA2 cracking
- Anti-forensics
- Log modification/deletion
- Rootkits
- Introduction to scripting
- Common script components
- Writing effective reports
- Providing mitigation recommendations
- CEH exam review
- PenTest+ exam review
Course Requirements
Requirements: Hardware Requirements: Software Requirements: Other: Instructional Material Requirements: The student materials required for this course are included in enrollment and will be available online. Prerequisites: To attend the boot camp, you will need to have: Certification Requirements: To sit for the CEH exam, you will need to meet the following requirements: To Sit for the CompTIA PenTest+ exam, you will need to meet the following is recommended: