Class Details

Price: $3,850

10-Day Course Includes:

Enroll in this Course with Federal Training Dollars - Learn More!

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Course retake option
  • Exam Voucher
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

Course Outline

Security+ Outline

Threat Mitigation

  • Maintaining Systems
  • App Security
  • Maintaining Physical Security
  • Malicious Software (Malware)
  • Social Engineering Threats

Cryptography

  • Symmetric
  • Public Key

Authentication

  • Requirements and Factors for Authentication
  • System Authentication
  • Vulnerabilities with System Authentication

User-Based & Role-Based Security

  • Policy Baseline
  • Accessing Resources

Peripheral Security

  • Encryption for Files and Disks
  • Component and Peripheral Security
  • Security for Mobile Devices

PKI

  • Public Key Cryptography
  • PKI Implementation Process
  • PKI for Web Server Security

Security for Apps and Messaging

  • Securing Apps and Email
  • Security for Social Networks and Messaging

Ports and Protocols

  • Basics of TCP/IP
  • Attacks Based on Protocols

Securing Networks

  • Devices for Networks
  • Securing Network Topologies
  • Networking Securely
  • Cloud Computing and Virtualization

Securing Wireless

  • Wireless Networks
  • Mobile Devices

Security for Remote Access

  • Remote Access
  • VPN

Monitoring and Vulnerability Testing

  • Assessing Risks and Potential Vulnerabilities
  • Logging and Auditing
  • IDS and IPS
  • Incident Response

Organizational-Based Security

  • Policies
  • Organization-Wide Training and Education
  • Device Destruction and Disposal

Business Continuity

  • Business Continuity Planning
  • Disaster Recovery Planning
  • Environmental Controls

CEH v9 Outline

Introduction to Ethical Hacking

  • Information security overview
  • Skills of an ethical hacker
  • Types of attacks
  • Information security threats, attack vectors, and controls
  • Information Assurance (IA)
  • Information Security Laws and Standards
  • Security Policies: types, HR/legal implications
  • Physical security
  • Threat modeling
  • Enterprise Information Security Architecture (EISA)
  • Network Security Zoning

Footprinting and Reconnaissance

  • Footprinting concepts, threats, attack vectors, and controls
  • Footprinting through search engines
  • Footprinting through social networking sites
  • Website footprinting
  • Competitive intelligence
  • WHOIS Footprinting
  • Footprinting tools

Scanning Networks

  • Scanning methodology, techniques, and countermeasures
  • Techniques for IDS evasion, scanning, HTTP tunneling, and IP spoofing
  • Drawing network diagrams--latest netwok discovery and mapping tools, network discovery tools for mobile
  • Proxy chaining--latest proxy tools, proxy tools for mobile

Enumeration

  • Protocols: NetBIOS, SNMP, LDAP, NTP, SMTP, DNS
  • Countermeasures
  • Techniques

System Hacking

  • Cracking passwords, escalating privileges, executing applications, hiding files and covering tracks
  • Steganography--application and classification, tools, methods/attacks on steganography, steganography detection tools

Malware Threats

  • Introduction to malware
  • Trojans--attacks, how to infect a system, crypters, how to deploy, latest types, analysis, countermeasures
  • Viruses--stages, types, latest virus maker, analysis, countermeasures
  • Worms--types, makers, analysis, countermeasures
  • Malware analysis
  • Antivirus tools
  • Penetration testing

Sniffing

  • Attacks: MAC, DHCP, and spoofing
  • Poisoning: ARP and DNS
  • Tools

Social Engineering

  • Concepts, techniques, impersonation, identity theft, and countermeasures
  • Phases of an attack
  • Common targets of an attack
  • Impersonation scenario
  • Computer based, mobile based, social networking based

Denial of Service

  • Concepts, case study, tools, attack techniques, and countermeasures
  • Botnet
  • Scanning methods for vulnerable machines
  • Detection techniques

Session Hijacking

  • Concepts, case study, tools, attack techniques, and countermeasures
  • Five stages of a web malware attack
  • Application level session hijacking
  • Network level session hijacking
  • TCP/IP Hijacking

Hijacking Webservers

  • Web application threats
  • Concepts, hacking methodology, tools, and countermeasures
  • Analyze web applications
  • Web application pen testing
  • g Web Apps
  • Introduction and Statistics of Web Applications
  • App Components and Architecture
  • Web 2.0 Apps
  • Vulnerability Stack
  • Web Attack Vectors
  • Threats to Web Applications
  • Unvalidated Input
  • Tampering Parameters and/or Forms
  • Directory Traversal
  • Misconfigured Security
  • Injection Flaws and Attacks
  • Overview of LDAP Injection
  • Manipulating Hidden Fields
  • XSS Attacks Overview and Types
  • Web App DoS Attack
  • Buffer Overflow Attacks
  • Cookie Poisoning
  • Session Fixation Attacks
  • Insufficient Transport Layer Protection
  • Improper Error Handling
  • Cryptographic Storage Insecurities
  • Broken Authentication and Session Management
  • Unvalidated Redirects and Forwards
  • Web Services Architecture and Attacks
  • Types of Footprint Web Infrastructure
  • Burp Suite for Web Spidering
  • Web Server Hacks
  • Web Applications Analysis
  • Mechanisms for Attack Authentication
  • Username Enumeration
  • Types of Password Attacks
  • Session Attack Types
  • Exploiting Cookies
  • Tampering for an Authorization Attack
  • Session Management Attack
  • Injection Attacks
  • Data Connectivity Attacks
  • Web App Client and Web Services Attacks
  • Probing Attacks
  • Tools for Web Services Attacks
  • Tools for Web Application Hacks
  • Encoding Schemes
  • Countermeasures to Web App Attacks
  • Types of Firewalls for Web Applications
  • Web Application ��" Penetration Testing

 

SQL Injection

  • Overview and Threats of SQL Injection
  • Types of SQL Injection Attacks
  • Server Side Technologies
  • HTTP Post Request
  • Attack Detection
  • Black Box Pen Testing for SQL Injection
  • Blind SQL Injection
  • Methods for SQL Injection
  • Extracting Information
  • Advanced Enumeration
  • Various DBMSs Features
  • Grabbing and Extracting Server Hashes
  • Database Transfer to Attacker’s Machine
  • OS Interaction
  • FileSystem Interaction
  • Full Query Network Reconnaissance
  • Tools for SQL Injection
  • Intrusion Detection System Evasion Techniques
  • Defense Methods and Detection Tools
  • Snort Rule for Detection

Hacking Wireless Networks

  • Introduction to Wireless Networks
  • U.S. Wi-Fi Usage
  • Wi-Fi Public Hotspots and Home Networks
  • Types of and Standards for Wireless Networks
  • Service Set Identifier (SSID)
  • Authentication Process for Wi-Fi
  • Common Terms
  • Wi-Fi Chalking
  • Popular Hotspot Finders
  • Wireless and Parabolic Grid Antennas
  • Wireless Encryption Types ��" WEP, WPA, WPA2
  • Differences in Encryption Types
  • Issues with WEP
  • Weak Initialization Vectors (IV)
  • Breaking WEP and WPA/WPA2 Encryption
  • WPA Defense Techniques
  • Types of Wireless Threats
  • Types of Attacks through Unauthorized Access Point
  • DoS Attacks
  • Jamming Signal Attacks and Wi-Fi Jamming Devices
  • Methods for Wireless Hacking
  • Wi-Fi Network Scanning
  • Wireless Network Footprinting
  • Wi-Fi Discovery Tools
  • GPS Mapping
  • Wardriving
  • Analyzing Wireless Traffic
  • Wireless Cards and Chipsets
  • AirPcap
  • Wi-Fi Packet Sniffers
  • Spectrum Analysis
  • Wireless Sniffers
  • Aircrack-ng Suite
  • Uncovering Hidden SSIDs
  • Fragmentation Attack
  • Launching a MAC Spoofing Attack
  • Deauthentication and Disassociation ��" DoS Attacks
  • Man-in-the-Middle Attack ��" Aircrack-ng
  • ARP Poisoning Attack and Rogue AP
  • Creating a Hotspot Evil Twin
  • Cracking WEP with Aircrack
  • Cracking WPA-PSK with Aircrack?
  • WPA Cracking Tools
  • WEP/WPA Cracking with Cain & Abel
  • WEP/WPA Cracking Tools
  • Wi-Fi Sniffers
  • Wardriving Tools
  • RF Monitoring Tools
  • Tools for Wi-Fi Connection Manager
  • Tools for Wi-Fi Traffic Analyzer
  • Tools for Wi-Fi Raw Packet Capturing
  • Tools for Wi-Fi Spectrum Analyzing
  • Overview and Tools for Hacking Bluetooth
  • BlueJack a Victim
  • Bluetooth Defense
  • Rogue AP Detection and Defense Techniques
  • Layers for Wireless Security
  • Wireless Attack Defense Measures
  • Wireless IPS and IPS Deployment
  • Wi-Fi Security Auditing Tools
  • Wi-Fi IPS
  • Tools for Wi-Fi Predictive Planning
  • Tools for Wi-Fi Vulnerability Scanning
  • Wireless ��" Pen Testing

IDS, Honeypot and Firewall Evasion

  • Overview and Detection Techniques for IDS
  • IDS Types
  • System Integrity Verifiers (SIV)
  • Signs of Intrusion and System Intrusion
  • Firewall Architecture
  • DMZ
  • Firewall Types
  • Identifying Firewalls
  • Types of Honeypots and Configuration Steps
  • Tools for Intrusion Detection
  • IDS ��" Tipping Point
  • Firewall ��" Sunbelt Personal Firewall
  • Honeypot Tools
  • Insertion Attack
  • Evasion
  • DoS
  • Obfuscating
  • False Positive Generation
  • Session Splicing
  • Unicode Evasion
  • Fragmentation Attack
  • Overlapping Fragments
  • Time-To-Live
  • Invalid RST Packets
  • Urgency Flag
  • Polymorphic Shellcode
  • ASCII Shellcode
  • Application-Layer Attacks
  • Desynchronization
  • Pre and Post Connection SYN
  • Evasion Types
  • Bypassing Blocked Sites
  • Bypassing Firewalls
  • Honeypot Detection Tools and Techniques
  • Firewall Evasion Tools
  • Packet Fragment Generators
  • Countermeasures
  • Firewall/IDS ��" Pen Testing

Buffer Overflow

  • Introduction to Buffer Overflows
  • Program and Application Vulnerability
  • Understanding Stacks
  • Buffer Overflow ��" Stack-Based
  • Understanding Heap
  • Stack Operations
  • Programming Buffer Overflow Exploits
  • Steps in the Buffer Overflow Process
  • Simple Uncontrolled Overflow
  • Simple Buffer Overflow in C
  • Code Analysis
  • Exploiting Semantic Comments in C
  • Mutation of Buffer Overflow Exploitation
  • Buffer Overflows Identification and Detection
  • Buffer Overflow Utility
  • heap.exe
  • OllyDbg Debugger for Testing Stack Overflow
  • IDA Pro for Testing Format String Conditions
  • BoF Detection Tools
  • Defense Options
  • Data Execution Prevention
  • Enhanced Mitigation Experience Toolkit (EMET) Systems Settings and Application Window
  • /GS http://microsoft.com
  • BoF Security Tools
  • Buffer Overflow ��" Pen Testing

Cryptography

  • Overview and Types of Cryptography
  • Government Access to Keys
  • Ciphers
  • Advanced Encryption Standard and Data Encryption Standard
  • Algorithms: RC4, RC5, RC6
  • DSA and Related Signature Schemes
  • RSA Algorithm and Signature Scheme
  • One-way Bash Functions
  • Secure Hashing Algorithm
  • Overview of SSH
  • Types of MD5 Hash Calculators
  • Cryptography Tools
  • PKI
  • Certification Authorities
  • Digital Signature
  • SSL
  • Transport Layer Security
  • Disk Encryption Tools
  • Attacks on Cryptography
  • Methods for Code Breaking Attacks
  • Meet-in-the-Middle Attack ��" Digital Signature Schemes
  • Cryptanalysis Tools
  • Online MD5 Decryption Tools

Penetration Testing

  • Overview of Pen Testing
  • Security and Vulnerability Assessments
  • Details of a Good Pen Test
  • Pen Testing ROI
  • Testing Points and Locations
  • Testing Types
  • Pen Testing Techniques
  • DNS Domain Name and IP Address Information
  • Enumerating Information about Hosts through Publicly-Available Networks
  • Pen Testing Attack Phases and Methodology
  • Outsourcing Services
  • Evaluating Tools
  • Application and Network Security Assessment Tools
  • Tools for Assessing Wireless/Remote Access
  • Tools for Assessing Telephony Security
  • Testing Network-Filtering Device Tools

 

 

 

Class Exam

Phoenix TS is an authorized testing center for Prometric and Pearson VUE exams. Contact us to register for exams or visit the Prometric and Pearson VUE websites. 

Security+ Exam

Details:

  • Code: SY0-301
  • Number of Questions: 100
  • Passing Score: 750 on scale of 100-900
  • Test Duration: 90 minutes
  • Format: Multiple Choice
  • Delivery: Pearson VUE

Objectives:

  • General Security Concepts (30%)
  • Communication Security (20%)
  • Infrastructure Security (20%)
  • Basics of Cryptography (15%)
  • Operational and Organizational Security (15%)

You can purchase the exam vouchers separately through Phoenix TS.

CEH Exam

Details:

  • 125 Questions
  • Passing Score: 70%
  • Test Duration: 4 hours
  • Test Format: Multiple choice
  • Test Delivery: Prometric or Pearson VUE

The exam code varies when taken at different testing centers.

  • Exam 312-50-ANSI: Web-based ‘Prometric Prime’ at Accredited Training Centers (ATC).
  • Exam 312-50v8: Pearson VUE Testing centers
  • Exam 350CEHv8: Proctored test at Authorized Prometric Testing Centers (APTC) globally.

Objectives:

Exam 312-50 tests CEH candidates on each of the 19 topics covered in-depth through the training course, including:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffers
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hacking Webservers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Networks
  16. Evading IDS, Firewalls, and Honeypots
  17. Buffer Overflow
  18. Cryptography
  19. Penetration Testing