
- IT
- 40 weeks
Introduction
- A Certified Ethical Hacker is a specialist typically working in a red team environment, focussed on attacking computer systems and gaining access to networks, applications, databases and other critical data on secured systems. A C|EH@ understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
Learning Objectives:
- Knowledge-based training covering various technologies, tactics and procedures providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity.
- Hands-on application conducted step-by-step in a virtualized environment with live targets, live tools and vulnerable systems.
Duration
5 days | 9am – 6pm | 40 hours
Who Should Attend
This course equips aspiring cybersecurity professionals with the tactics, techniques, and procedures (TTPs) to build ethical hackers who can uncover weaknesses in nearly any type of target system before cybercriminals do.
Entry Requirement
Diploma, Degree, or an equivalent qualification with at least 1 years’ experience.
Methodology
Secure cloud infrastructure, monitor vulnerabilities and implement response plans to mitigate cloud-based threats.
Offer unique blend of vendor-neutral and vendor-specific concepts, trains candidates in the fundamentals while equipping them with job-ready practical skills.
Course Fees
S$2700.00
Registration Fee of S$17.28 apply.
Funding available for SSG-approved courses for self-sponsored individual & employers
All fees stated are inclusive of 8% GST.
Award of Certificate
WSQ Statement of Attainment (SOA) will be issued to competent participants who have an attendance of 75% of the course.
Award of C|EH®(Master) certification with the passing of the C|EH®(MCQ Exam)&C|EH®(Practical exam). Exam details as below.
Content Outline
- Introduction to Ethical Hacking
Learner will be able to:
- Explain information security attacks.
- Explain various hacking methodologies and frameworks.
- Explain hacking concepts and hacker classes, ethical hacking concepts and scope.
- Explain information security controls.
- Explain various information security acts and laws.
- Footprinting and Reconnaissance
Learner will be able to:
- Explain Footprinting concepts as well as different footprinting techniques and apply tools and countermeasures.
- Scanning Networks
Learner will be able to:
- Explain various scanning techniques, scanning concepts and apply the countermeasures.
- Enumeration
Learner will be able to:
- Explain Enumeration techniques and apply the countermeasures.
- Vulnerability Analysis
Learner will be able to:
- Explain vulnerability assessment concepts, vulnerability classification and assessment types, vulnerability assessment tools and perform analysis of vulnerability assessment reports.
- System Hacking
Learner will be able to:
- Explain different system hacking techniques and covering tracks.
- Malware Threats
Learner will be able to:
- Explain Malware threats, APT, various viruses, worms and trojans and apply malware countermeasures.
- Sniffing
Learner will be able to:
- Explain sniffing concepts, sniffing techniques, use sniffing tools and apply countermeasures.
- Social Engineering
Learner will be able to:
- Explain Social engineering concepts and social engineering techniques, insider threats and apply countermeasures.
- Denial of Service
Learner will be able to:
- Explain Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks, use cases and apply countermeasures.
- Session Hijacking
Learner will be able to:
- Explain Session Hijacking concepts, use Hijacking tools and apply countermeasures.
- Evading IDS, Firewalls and Honeypots.
Learner will be able to:
- Explain security solutions like IDS, IPS firewall, honeypots, NAC, and endpoint security including evasion & protection.
- Hacking Web Services
Learner will be able to:
- Explain web server concepts, attacks methodology and apply countermeasures.
- Hacking Web Applications
Learner will be able to:
- Explain Web application concepts, threats, hacking methodology and web application security.
- SQL Injection
Learner will be able to:
- Explain SQL, injection concepts methodology, evasion techniques, use tools and apply countermeasures.
- Hacking Wireless Networks
Learner will be able to:
- Explain wireless concepts, encryption, threats, hacking methodology, use threats and apply countermeasures.
- Hacking Mobile Platforms
Learner will be able to:
- Explain mobile platform attack vectors, hacking Android OS and IOS, mobile device management and mobile security guidelines and tools.
- IOT & OT Hacking
Learner will be able to:
- Explain Operational technology (OT) concepts, threats and attacks and apply protection against OT attacks.
- Cloud Computing
Learner will be able to:
- Explain cloud computing concepts, threats and security measures, essentials of container technology and severless computing.
- Cryptography
Learner will be able to:
- Explain cryptography concepts, encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks and apply email encryption, disk encryption and different cryptanalysis tools.
Course Content
-
1. Introduction to Ethical Hacking