Home      Signup      Courses      Sign-In

  Please login to Enroll or Access the course.  
  Summary Page: Certified Ethical Hacker (CEH): System Hacking

Certified Ethical Hacker (CEH): System Hacking

System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at system hacking, and the tools and techniques used. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Network and information security professionals


Cracking Passwords and Executing Applications

  • match the stage of system hacking to the technique or exploit used
  • identify the characteristics of types of password attacks
  • match the LM/NTLM version to its attributes
  • identify the countermeasures against keylogging
  • identify countermeasures against spyware
  • Hiding Files and Covering Tracks

  • match the method of rootkit detection with its description
  • identify the types of files that can have hidden messages added using Least Significant Bit Insertion
  • identify the tools used to cover the tracks of an intruder

  • sp_ceth_a05_it_enus


    Home      Signup      Courses      Sign-In

      UN Global Alliance for ICT and Development ESKILLS360 IS A UN GAID FLAGSHIP INITIATIVE