If you want to stop hackers from invading your network, first you’ve got to invade their minds.
If you want to stop hackers from invading your network, first you’ve got to invade their minds.
GlobalNet Training’s Combined Certified Ethical Hacking (CEH)™/ Computer Hacking Forensic Investigation (CHFI)™ 7-Day Boot Camp certifies individuals in the specific network security discipline of Ethical Hacking and Computer Forensics, from a vendor-neutral perspective, enabling you to extract the evidence and report the crime!
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker. Possessing this type of certification stimulates the right kind of conversation in an interview or job proposal as most companies are starting to become more security-aware.
Computer Forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.
The goal of the Ethical Hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organizations depend increasingly on technology, information assets have evolved into critical components of survival.
If hacking involves creativity and thinking ‘out-of-the-box’, then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ‘defense in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure. As technology advances and organizations increasingly depend on technology, information assets have evolved into critical components of survival. Organizations must penetrate their networks in order to assess the security posture for vulnerabilities and exposure. The goal of a Certified Ethical Hacker (CEH) is to help the organization take preemptive measures against malicious attacks by attacking their own system. This individual is usually a skilled professional employed within the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems. A CEH understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
Computer Hacking Forensic Investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases. Electronic evidence is critical in the following situations:
- Disloyal employees
- Computer break-ins
- Possession of pornography
- Breach of contract
- Industrial espionage
- E-mail Fraud
- Disputed dismissals
- Web page defacements
- Theft of company documents
During this 7-day lab intensive course, candidates are immersed in an interactive environment where they learn how perimeter defenses work and are lead into scanning and attacking their own networks. No real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about Intrusion Detection, DDoS Attacks, and Buffer Overflows. When a student leaves this intensive 7-day class, they will have hands-on understanding and experience in Ethical Hacking.
Participants also gain the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. This class immerses the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience. They leave with the ability to quantitatively assess and measure threats, and to discover where an organization is most vulnerable to an attack.
Dallas Facility Information
We recently announced the grand opening of GlobalNet Training’s new headquarters in Dallas, Texas. Our brand new state-of-the-art training center boasts four large classrooms with flat screen monitors along with a spacious break room stocked with modern appliances, free sodas & snacks, and a plasma cable TV. We also offer student lounge areas, easy access from both Dallas airports, and we are within walking distance of hotels, restaurants, grocery stores, and shopping. More
The International Council of Electronic Commerce Consultants (EC-Council) is a member supported professional organization. The purpose of the EC-Council is to support and enhance the role of individuals and organizations who design, create, manage or market e-Business solutions. We support our members by providing Electronic Commerce Consultant certification as well as educational, technical, placement, member advantage, and discounted services. We enhance our membership by providing a community where discussion and information exchange can operate freely in the context of mutual trust and benefit.
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure as well as police and other law enforcement personnel, defense and military personnel, e-Business security professionals, systems administrators, legal professionals, banking, insurance and other professionals, government agencies and IT managers.
The Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.
The following skills are desirable, but not required:
- Administrating Windows 2000
- Windows File Sharing
- DNS, WINS and DHCP
- NTFS and File Permissions
- Linux – Configuring IP address
- Linux – Configuring Routing
This course prepares you for EC-Council’s Certified Ethical Hacker exam 312-50 and the CHFI 312-49 exam. The course includes two test vouchers. Exams are administered during class.
About the Instructor
Haja Mohideen – Technical Director, EC Council, New York
Haja is the co-founder and Technical Director of EC-Council. He is the creator of popular certification programs such as CEH, CHFI, ECSA/LPT. Haja possesses more than 20 years of experience specializing in the development, support and project management of software and hardware in distributed computing environments.
Haja has delivered security training to top Fortune 500 companies and government organizations like FedEx, Deutsch Bank, US Embassy, Pfizer etc. He holds a master’s degree in Software Engineering and is currently working towards his Ph.D.
If you successfully complete a Lammle Bootcamp and do not pass a professional certification examination, you are eligible to enroll in a subsequent Bootcamp within one (1) year with just a small administrative fee (and the cost of new books if the course changes).
The Lammle Training Guarantee is subject to the following terms and conditions:
(i) You must notify GlobalNet Training in writing and provide proof of having not passed an applicable professional certification examination within 10 days (two business weeks) following the last day of the Bootcamp you attended; (ii) Your participation in a subsequent Bootcamp under this Guarantee is based on seat availability in a regularly scheduled, open enrollment Bootcamp; (iii) Except for your Bootcamp tuition and enrollment fees you are solely responsible for all costs and expenses incurred in attending a Bootcamp under this Guarantee, including all travel, lodging, meals and other out-of-pocket expenses, such as exams, associated with your participation in such Bootcamp; and (iv) Only individual (single) registrations are eligible to participate under this Guarantee. This Guarantee does not apply to custom or corporate block purchases.