EHS: Linux, Macintosh and Mobile Systems

EHS - Linux, Macintosh and Mobile Systems


Course Description CEH

Course Description

This certification covers a plethora of offensive security topics ranging from how perimeter defenses work to scanning and attacking the simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.

 

 

Linux, Macintosh and Mobile Systems

 

Who Should Attend

This course will significantly benefit the security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Duration: 2 days (9:00AM – 5:00PM)
  • CPE/ECE Qualification: 2 ECE Credits awarded for attendance (1 for each 8 hour class day)
  • Program Cost: $750 USD
  • Supplement Cost (Courseware & Certificate exam Access): $75 USD
  • Bundle Price: $799 USD
  • Getting Started: Find Training Click HERE
  • Corporate Trainers interested in setting up internal company training programs, click here

 

About us Icon

 

What’s included?

  • Physical Courseware
  • 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate

Related Certificates:

  • Ethical Hacking & Countermeasure Specialist: Attack Phases
  • Ethical Hacking and Countermeasures: Threats and Defense Mechanisms
  • Ethical Hacking and Countermeasures: Web Applications and Data Servers
  • Ethical Hacking and Countermeasures: Secure Network Infrastructures

 


Course Briefing

Linux Hacking

The advent of Linux was the true genesis of the open source movement. Backed by programmers who believed in breaking away from the proprietary movement for the right reasons, Linux made inroads into the corporate world computing. While Linux has evolved to a robust operating system, the complex structure of Linux paves the way for the security-related threats. Today, several servers around the globe are hosted on the Linux servers. One of the primary reasons behind this is the inherent security offered by the platform. However, today there is as much vulnerability in Linux as in proprietary systems leading to their compromise by attackers. This module deals with hacking on the Linux Operating System. It explains the basic commands in Linux, Linux file structure, and Linux security and vulnerabilities. It shows the Linux IP chains, Linux Rootkits, and Linux intrusion detection systems. It lists the Linux hacking tools and the security countermeasures.


 

 











Mac OS X Hacking

Mac OS X is a development platform, bringing a 32-bit and 64-bit architecture and multiprocessor capability to the desktop and server arenas. It provides a productive programming environment in Cocoa, the full power of real UNIX, and a host of open source web, scripting, database, and development technologies. MAC OS X may be hacked using the vulnerabilities in the operating system. This module explains about Macintosh operating system, vulnerabilities in MAC OS X such as Crafted URL, CoreText Uninitialized Pointer, ImageIO Integer overflow, DirectoryService, iChat UPnP buffer overflow, and how they can be used to hack the OS. The module also discusses viruses and worms that may affect the operating system. MAC OS X security tools DoorStop X Firewall, Intego NetBarrier, Intego ContentBarrier and Flying Buttress are presented in this module. These security tools and counter measures prevent an attacker from attacking.


 








Hacking Routers, Cable Modems, and Firewalls

Computer networking devices transfer the data from one computer in a network to another.. The network devices include routers, cable modems, firewalls, etc. The attacker may try to hack the network devices to snoop on the information being transferred on the network. This module introduces the computer networking devices such as Router, modems, and cables and explains how an attacker hacks them. This module explains the different vulnerabilities in the router and how to exploit these vulnerabilities. After completion of this module, you would have an idea about how to collect the router password by using different password cracking tools. The module also deals with different router attacks, how they occur, and how to prevent them.

 













Hacking Mobile Phones, PDAs, and Handheld Devices

With individuals and organizations increasingly reliant on the handheld devices for communication and business, the threat to these devices only grows. Mobile malware has seen pandemic increase in the recent years. The malware is aimed at sabotage and financial gain. These attacks finally can lead to denial of mobile resources, data theft or destruction, and fraud. This module discusses about hacking various types of mobile devices such as BlackBerry, PDA, iPod, and iPhone. This module also talks about the operating systems used in mobile phones. This module explains about the threats to mobile devices, vulnerabilities in the mobile devices, and attacks against mobile devices. It also introduces PDA security tools which are used to prevent mobile attacks.

 

 

















Bluetooth Hacking

Bluetooth is one of the applications that help the cell phone users share/ send the information from one cell phone to the other irrespective of the service provider. It is a feature that is getting popular and being widely used by every common man in their routine. As it is widely used, the vulnerabilities in it are exploited to attack the device. The module “Bluetooth Hacking” explains about the different ways that a Bluetooth device can be hacked and the security measures to prevent the devices from being hacked. It explains the different techniques that can be used to attack Bluetooth devices (Example: Bluejacking, BlueSpam, BlueSnarfing, BlueBug Attack, Blueprinting and more). It lists the tools that are used to hack the Bluetooth devices. This module discusses the worms and viruses that can be used to infect the Bluetooth devices.

 

 





















RFID Hacking

Radio Frequency Identification (RFID) is a system that transmits the identity of an object using radio waves. The identity of the objects is stored and retrieved using RFID tags and transponders. It transmits the identity of the objects in the form of a unique serial number with the help of radio waves. This module describes RFID technology, the different components of RFID and their collisions, RFID risks such as Business Process Risk, Business Intelligence Risk, Privacy Risk and Externality Risk, privacy issues of RFID. This module discusses RFID security and privacy threats and how to protect against RFID attacks. Writing a simple but powerful RFID virus and worm are showcased in this module. The module also discusses the vulnerabilities in RFID-enabled credit cards and RFID security controls.

 

 





















Hacking USB Devices

Universal Serial Bus (USB) flash drives are removable and rewritable devices. These devices can be connected or disconnected if the system is running as they are pluggable. This module discusses about USB devices and how they affect privacy. The module discusses electrical and software attacks, USB Attack on Windows, viruses, and worms which spread through USB devices. The tools that help in hacking USB devices are discussed. The module also talks about tools such as MyUSBonly, USBDeview, USB-Blocker, USB CopyNotify, USB File Guard, and Advanced USB Port Monitor that help to protect privacy and lists countermeasures to prevent the devices from being hacked.