Training About ALPI Consulting Products News & Events Careers Contact

Course Catalog

Choose ALPI and Get Peace of Mind with our "Free Refresher Guarantee!"

ALPI training courses are uniquely effective at building better testers. We're so confident about our course quality that we'll even let you retake the course for FREE within four months! Need other reasons to choose ALPI? We have many!

• Our trademark Interactive Learning Method™ incorporates your workplace challenges into the classroom as teaching examples so you can see the concepts come to life.

• Our live instructors can answer your questions about how to apply the material to your real-world projects. This is just one of the reasons our courses are better than online courses - see the 4 reasons ALPI courses are better than online courses.

• Our courses are designed around you, so you gain practical skills that are ready to use as soon as soon as you get back to work.

Get peace of mind with ALPI and our "Free Refresher Guarantee!" Contact us for details on this outstanding ALPI-only benefit! Register now, as courses fill quickly.

printer-friendly version

Certified Ethical Hacker (CEH) Training
Course Description ALPI offers a hands-on approach to the most desired information security training program in the industry.

Why choose ALPI for CEH training?

  • We use live, seasoned instructors in both our in-person and virtual classes so you can ask questions and get answers right away.
  • We focus on real-world examples.
  • We teach using interactive, hands-on exercises.
  • Our course includes a complete hard-copy set (3 books) of accredited course materials.
  • Your will receive a Certificate of Achievement for attending the class.
  • Registration includes 6 months access to iLabs, with over 140 different exercises!
  • And only ALPI offers our free refresher guarantee so you can re-take a course within 4 months at no additional charge. Contact us for information about this unique benefit that gives you peace of mind.

ALPI's accredited CEH course gives you the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

Why CEH? A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Upon successful completion of the course, you will receive a Certificate of Achievement.

This course is available with an optional certification exam in order to attain the CEH Certification. See prerequisites, below.

Duration 5 day(s)
Time 9 - 5 PM
Price $2,400
Labs When you take this course from ALPI, you receive 6 months of access to iLabs for over 140 different exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflow
  • Cryptography
Intended Audience ALPI's Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, testing professionals, QA professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Prerequisites Information security experience is suggested but contact us if you have questions.

This course should be taken if you plan to take the optional CEH Certification Exam. If you wish to take the certification exam please select CEH Certification Exam along with your class registration.

Outline

ALPI CEH Course Outline: Certified Ethical Hacker (CEH) Version 9

01  Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards

02  Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

03  Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology

04  Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

05  System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

06  Malware Threats

  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Malware Detection
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

07  Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP   Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Tool: Wireshark
  • Follow TCP Stream in Wireshark
  • Display Filters in Wireshark
  • Additional Wireshark Filters
  • Sniffing Tool
  • Packet Sniffing Tool: Capsa Network Analyzer
  • Network Packet Analyzer
  • Counter measures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

08  Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

09  Denial-of-Service    

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

10  Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

11  Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver  Security Tools
  • Webserver  Pen Testing

12  Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing

13  SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

14 Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

15 Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

16  Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Counter-measures
  • Penetration Testing

17  Cloud Computing

  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

18  Cryptography

  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

See the currently scheduled public and virtual live course dates below and click on the "Register Now" button.

If you have 6 or more students, save time and money with our on-site instruction at your facility. Learn more by calling us at 301 654-9200.

Class Dates
Start End Location
Monday, November 27, 2017 Friday, December 01, 2017 Chevy Chase, MD


      4 REASONS
  TO CHOOSE ALPI

1. ALPI has been helping software testers since 1993. Our experience assures you of quality training.

2. You have the opportunity to re-take the same course at ALPI for FREE within four months of the original class date.

3. Our Interactive Learning Method™ offers a richer training experience that gives you skills you can apply right away.

4. Our instructors have real-world experience so you learn concepts - and how to apply them.