EC-Council Certified Ethical Hacker Training in Virginia

Certified Ethical Hacker Training Course in Virginia | Tysons Corner & Reston, VA5 Day Training Course in Tysons Corner, VA & Online

8200 Greensboro Drive, Suite 300, Mclean, Virginia, 22102

Phoenix TS’ Certified Ethical Hacker training course follows an EC-Council authorized curriculum. As such, this training is a requirement for anyone hoping to sit for the CEH v10 exam who does not have a minimum of 2 years of information security work experience.

In addition to using EC-Council courseware, training at Phoenix TS includes:

  • 40 instruction hours with a current Certified Ethical Hacker (CEH)
  • 60 days access to additional CEH course materials including timed practice exams, skills assessments, topic sheets and more.
  • Daily hands-on exercises completed in class
  • Exam testing voucher and certification assurance voucher
  • FREE course retake option

CEH is GSA Eligible and Listed on DoD Directive 8570.1 M

Certified Ethical Hacker Training Outline

Phoenix TS follows the EC-Council authorized CEH training material and course path. This curriculum is categorized by the following modules and subtopics:

Module 1: Introduction to Ethical Hacking 

  • Information security overview
  • Information security threats and attack vectors
  • Hacking concepts
  • Ethical hacking concepts
  • Information Security Controls
  • Penetration testing concepts
  • Information security laws and standards

Module 2: Footprinting and Reconnaissance 

  • Footprinting concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking sites
  • Website footprinting
  • Email footprinting
  • Competitive Intelligence
  • WHOIS Footprinting
  • DNS footprinting
  • Network footprinting
  • Footprinting through social engineering
  • Footprinting tools
  • Countermeasures
  • Footprinting pen testing

Module 3: Scanning Networks

  • Network scanning concepts
  • Scanning tools
  • Scanning techniques
  • Scanning beyond IDS and firewall
  • Banner grabbing
  • Draw network diagrams
  • Scanning pen test

Module 4: Enumeration 

  • Enumeration concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration SMTP and DNS Enumeration
  • Other enurmeration techniques
  • Enumeration countermeasures
  • Enumeration pen testing

Module 5: Vulnerability Analysis 

  • Vulnerability assessment concepts
  • Vulnerability assessment solutions
  • Vulnerability scoring systems
  • Vulnerability assessment tools
  • Vulnerability assessment reports

Module 6: System Hacking 

  • System hacking concepts
  • Cracking passwords
  • Escalating privileges
  • Executing applications
  • Hiding files
  • Covering tracks
  • Penetration testing

Module 7: Malware Threats

  • Malware concepts
  • Trojan concepts
  • Virus and worm concepts
  • Malware analysis
  • Countermeasures
  • Anti-Malware software
  • Malware penetration testing

Module 8: Sniffing

  • Sniffing concepts
  • Sniffing techniques: MAC Attacks
  • Sniffing techniques: DHCP attacks
  • Sniffing techniques: ARP Poisoning
  • Sniffing techniques: Spoofing attacks
  • Sniffing techniques: DNS poisoning
  • Sniffing tools
  • COuntermeasures
  • Sniffing detection techniques
  • Sniffing pen testing

Module 9: Social Engineering

  • Social engineering concepts
  • Social engineering techniques
  • Insider threats
  • Impersonation on social networking sites
  • Identity theft
  • Countermeasures
  • Social engineering pen testing

Module 10: Denial of Service

  • DoS/DDos Concepts
  • DoS/DDoS attack techniques
  • Botnets
  • DDoS case study
  • DoS/DDoS attack tools
  • Countermeasures
  • DoS/DDos protection tools
  • DoS/DDoS penetration testing

Module 11: Session Hijacking

  • Session hijacking concepts
  • Application level session hijacking
  • Network level session hijacking
  • Session hijacking tools
  • Countermeasures
  • Penetration testing

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, firewall and honeypot concepts
  • IDS, firewall and honeypot solutions
  • Evading IDS
  • Evading firewalls
  • IDS/firewall evading tools
  • Detecting honeypots
  • IDS/Firewall evasion countermeasures
  • Penetration testing

Module 13: Hacking Webservers

  • Web server operations
  • Web server attacks
  • Web server  attack methodology
  • Web server attack tools
  • Countermeasures
  • Patch management
  • Web server security tools
  • Web server pen testing

Module 14: Hacking Web Applications

  • Web app concepts
  • Web app threats
  • Hacking methodology
  • Web app hacking tools
  • Countermeasures
  • Web app security testing tools
  • Web app pen testing

Module 15: SQL Injection

  • SQL injection concepts
  • Types of SQL injection
  • SQL injection methodology
  • SQL injection tools
  • Evasion techniques
  • Countermeasures

Module 16: Hacking Wireless Networks

  • Wireless concepts
  • Wireless encryption
  • Wireless threats
  • Wireless hacking methodology
  • Wireless hacking tools
  • Bluetooth hacking
  • Countermeasures
  • Wireless security tools
  • Wireless pen testing

Module 17: Hacking Mobile Platforms

  • Mobile platform attack vectors
  • Hacking Android OS
  • Hakcing iOS
  • Mobile spyware
  • Mobile device management
  • Mobile security guidelines and tools
  • Mobile pen testing

Module 18: IoT Hacking 

  • IoT concepts
  • IoT attacks
  • IoT hacking methodology
  • IoT hacking tools
  • Countermeasures
  • IoT pen testing

Module 19: Cloud Computing

  • Cloud computing concepts
  • Cloud computing threats
  • Cloud computing attacks
  • Cloud security
  • Cloud security tools
  • Cloud penetration testing

Module 20: Cryptography

  • Cryptography concepts
  • Encryption algorithms
  • Cryptography tools
  • Public key infrastructure (PKI)
  • Email encryption
  • Disk encryption
  • Cryptanalysis Countermeasures

 

Upcoming Certified Ethical Hacker Training

Online | Tysons Corner, VA

Classes marked with a ✔ are GUARANTEED TO RUN!

Class Date Location
CEH Training Course 01/07/19 - 01/11/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
CEH Training Course 01/28/19 - 02/01/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register  ✔
CEH Training Course 02/04/19 - 02/08/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
CEH Training Course 02/11/19 - 02/15/19, 5 days, 8:30AM – 4:30PM Online Register
CEH Training Course 03/18/19 - 03/22/19, 5 days, 8:30AM – 4:30PM Online Register
CEH Training Course 04/22/19 - 04/26/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
CEH Training Course 04/29/19 - 05/03/19, 5 days, 8:30AM – 4:30PM Online Register
CEH Training Course 06/10/19 - 06/14/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
CEH Training Course 06/10/19 - 06/14/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register  ✔
CEH Training Course 06/17/19 - 06/21/19, 5 days, 8:30AM – 4:30PM Online Register
CEH Training Course 07/29/19 - 08/02/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
CEH Training Course 08/05/19 - 08/09/19, 5 days, 8:30AM – 4:30PM Online Register
CEH Training Course 09/09/19 - 09/13/19, 5 days, 8:30AM – 4:30PM Tysons Corner, VA Register
CEH Training Course 09/16/19 - 09/20/19, 5 days, 8:30AM – 4:30PM Online Register