Training Ethical Hacker (CEHv8)
Ethical Hacking and Penetration Testing
COURSE DESCRIPTION PELATIHAN Ethical Hacker (CEHv8)
This course will immerse the participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. Participants will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
TUJUAN PELATIHAN Ethical Hacker (CEHv8)
After completing this course, participants will have hands on understanding and experience in Ethical Hacking.
MATERI PELATIHAN Ethical Hacker (CEHv8)
Participants must have a working knowledge of TCP/IP and at least one year of professional experience with networking technologies.
COURSE MODULES ETHICAL HACKER (CEHv8)
Module 1: Introduction to Ethical Hacking
* Information Security Overview
* Information Security Threats and Attack Vectors
* Hacking Concepts
* Hacking Phases
* Types of Attack
* Information Security Controls
Module 2: Footprinting and Reconnaissance
* Footprinting Concepts
* Footprinting Threats
* Footprinting Methodology
* Footprinting Tools
* Footprinting Countermeasures
* Footprinting Penetration Testing
Module 3: Scanning Networks
* Network Scanning Overview
* Scanning Methodology
* Check for Live Systems
* Scanning Beyond IDS
* Banner Grabbing
* Scan for Vulnerability
* Draw Network Diagrams
* Prepare Proxies
* Scanning Pen Testing
Module 4: Enumeration
* Enumeration Concepts
* NetBIOS Enumeration
* SNMP Enumeration
* Unix/Linux Enumeration
* LDAP Enumeration
* NTP Enumeration
* SMTP Enumeration
* DNS Enumeration
* Enumeration Countermeasures
* SMB Enumeration Countermeasures
* Enumeration Pen Testing
Module 5: System Hacking
* Information at Hand Before Hacking Stage
* System Hacking: Goals
* Hacking Methodology
* System Hacking Steps
* Cracking Passwords
* Escalating Privileges
* Executing Applications
* Hiding Files
* Covering Tracks
* Penetration Testing
Module 6: Trojans and Backdoors
* Trojan Concepts
* Trojan Infection
* Types of Trojans
* Trojan Detection
* Countermeasures
* Anti-Trojan Software
* Pen Testing for Trojans and Backdoors
Module 7: Viruses and Worms
* Virus and Worms Concepts
* Types of Viruses
* Computer Worms
* Malware Analysis
* Counter-measures
* Penetration Testing for Virus
Module 8: Sniffing
* Sniffing Concepts
* MAC Attacks
* DHCP Attacks
* ARP Poisoning
* Spoofing Attack
* DNS Poisoning
* Sniffing Tools
* Counter Measures
* Sniffing Pen Testing
Module 9: Social Engineering
* Social Engineering Concepts
* Social Engineering Techniques
* Imperso-nation Social Networking Sites
* Identity Theft
* Social Engineering Countermeasures
* Social Engineering Pen Testing
Module 10: Denial of Service
* DoS/DDoS Concepts
* DoS Attack Techniques
* Botnet
* DDoS Case Study
* DoS Attack Tools
* Counter-measures
* DoS/DdoS Protection Tools
* Denial of Service (DoS) Attack Penetration Testing
Module 11: Session Hijacking
* Session Hijacking Concepts
* Network-level Session Hijacking
* Session Hijacking Tools
* Counter-measures
* Session Hijacking Pen Testing
Module 12: Hacking Webservers
* Webserver Concepts
* Webserver Attacks
* Attack Methodology
* Webserver Attack Tools
* Counter-measures
* Patch Management
* Webserver Security Tools
* Webserver Pen Testing
Module 13: Hacking Web Applications
* Web App Concepts
* Web App Threats
* Web App Hacking Methodology
* Web Application Hacking Tools
* Countermeasures
* Security Tools
* Web App Pen Testing
Module 14: SQL Injection
* SQL Injection Concepts
* Testing for SQL Injection
* Types of SQL Injection
* Blind SQL Injection
* SQL Injection Methodology
* Advanced SQL Injection
* SQL Injection Tools
* Evasion Techniques
* Counter-measures
Module 15: Hacking Wireless Networks
* Wireless Concepts
* Wireless Encryption
* Wireless Threats
* Wireless Hacking Methodology
* Wireless Hacking Tools
* Bluetooth Hacking
* Counter-measures
* Wireless Security Tools
* Wi-Fi Pen Testing
Module 16: Hacking Mobile Platforms
* Mobile Platform Attack Vectors
* Hacking Android OS
* Hacking iOS
* Hacking Windows Phone OS
* Hacking Blackberry
* Mobile Device Management (MDM)
* Mobile Security Guidelines and Tools
* Mobile Pen Testing
Module 17: Evading IDS, Firewalls and Honeypots
* IDS, Firewall and Honeypot Concepts
* IDS, Firewall and Honeypot System
* Evading IDS
* Evading Firewalls
* Detecting Honeypots
* Firewall Evading Tools
* Countermeasures
* Penetration Testing
Module 18: Buffer Overflows
* Buffer Overflow Concepts
* Buffer Overflow Methodology
* Buffer Overflow Examples
* Buffer Overflow Detection
* Buffer Overflow Counter-measures
* Buffer Overflow Security Tools
* Buffer Overflow Penetration Testing
Module 19: Cryptography
* Cryptography Concepts
* Encryption Algorithms
* Cryptography Tools
* Public Key Infrastructure
* Email Encryption
* Disk Encryption
* Cryptography Attacks
* Cryptanalysis Tools
Module 20: Penetration Testing
* Pen Testing Concepts
* Types of Pen Testing
* Pen Testing Techniques
* Pen Testing Phases
* Pen Testing Roadmap
* Outsourcing Pen Testing Services
METODE TRAINING
1. Presentation
2. Discuss
3. Case Study
4. Evaluation
5. Pre-Test & Post-Test
6. Games
Jadwal DsBanking Training Tahun 2025
- Training Bulan Januari : 18-19 Januari 2025
- Training Bulan Februari : 22-23 Februari 2025
- Training Bulan Maret : 15-16 Maret 2025
- Training Bulan April : 19-20 April 2025
- Training Bulan Mei : 23-24 Mei 2025
- Training Bulan Juni : 14-15 Juni 2025
- Training Bulan Juli : 12-13 Juli 2025
- Training Bulan Agustus : 23-24 Agustus 2025
- Training Bulan September : 13 – 14 September 2025
- Training Bulan Oktober : 11-12 Oktober 2025
- Training Bulan November : 29-30 November 2025
- Training Bulan Desember : 13-14 Desember 2025
Catatan: Jadwal tersebut dapat disesuaikan dengan kebutuhan calon peserta. Peserta dapat mengajukan tanggal pelaksanaan pelatihan.
LOKASI
REGULER TRAINING
- Yogyakarta, Hotel Dafam Malioboro (6.000.000 IDR / participant)
- Jakarta, Hotel Amaris Tendean (6.500.000 IDR / participant)
- Bandung, Hotel Golden Flower (6.500.000 IDR / participant)
- Bali, Hotel Ibis Kuta (7.500.000 IDR / participant)
- Lombok, Hotel Jayakarta (7.500.000 IDR / participant)
ONLINE TRAINING VIA ZOOM
INVESTASI
- Investasi pelatihan selama tiga hari tersebut menyesuaikan dengan jumlah peserta (on call). *Please feel free to contact us.
Catatan: Apabila perusahaan membutuhkan paket in house training, anggaran investasi pelatihan dapat menyesuaikan dengan anggaran perusahaan.
Benefit Apa Saja yang Didapatkan Peserta?
- FREE Airport pickup service (Gratis Antar jemput Hotel/Bandara)
- FREE Transportasi Peserta ke tempat pelatihan
- Module / Handout
- FREE Flashdisk
- Sertifikat
- FREE Bag or backpack (Tas Training)
- Training Kit (Dokumentasi photo, Blocknote, ATK, etc)
- 2x Coffee Break & 1 Lunch, Dinner
- FREE Souvenir Exclusive
FAQ tentang Dsbanking
Q : Berapa minimal running pelatihan ini ?
A : Pelatihan ini akan running idealnya minimal dengan 3 peserta, tetapi bisa disesuaikan dengan kebutuhan peserta
Q : Apakah bisa jika saya hanya ingin pelatihan sendiri aja / private course ?
A : Bisa, kami akan membantu menyelenggarakan pelatihan 1 hari jika ada persetujuan dari klien
Q : Dimana saja pelatihan biasanya di selenggarakan?
A : Pelatihan kami selenggarakan di beberapa kota besar di Indonesia seperti Bandung, Jakarta, Yogyakarta, Surabaya, Malang, Bali, Lombok dan beberapa negara seperti Singapore dan Malaysia
Q : Apakah bisa diselenggarakan selain di kota lain?
A : Penyelenggaraan pelatihan bisa diadakan di kota lain dengan minimal kuota 5 orang setiap kelas
Q : Apakah bisa juga diselenggarakan secara IHT/ In House Training di Perusahaan klien ?
A : Bisa diselenggarakan secara IHT di Perusahaan klien
Q : Apakah jadwal bisa disesuaikan dengan kebutuhan klien ?
A : Jadwal pelatihan dapat di sesuaikan dengan kebutuhan klien.
Materi, Lokasi dan Jadwal Pelatihan Bisa Berubah Sewaktu-waktu dan disesuaikan Dengan Kondisi Peserta, dimohon untuk Melakukan Konfirmasi untuk Segala Bentuk Perubahan, agar Tidak Terjadi Miskomunikasi. Segera Daftar Pelatihan, Diskon Menarik hanya Bulan Ini.
Silabus Training ini disunting oleh Suhada Faisal sebagai Content Writer Spesialis di bidang Pelatihan. Berpengalaman lebih dari 5 tahun sebagai konsultan training atau seminar baik secara online maupun offline.
About the author