Q/EH® Qualified/ Ethical Hacker Qualification/Certification Exam and Class
+ learn HANDS-on for CEH™ EXAM
The only Q/EH Qualified/ Ethical Hacking "Hands-on" Tactical Security skills training AND what you need to know to secure networks, systems and secure information. 30+ hands-on labs focused on 22 areas of the network/enterprise - You will leave knowing how to hack AND secure networks while staying ahead of the hackers!
'when asked by a Navy contractor whats the difference in the Q/EH training than a CEH training class?
CEH presents security testing tools modules that only describe and demo tools. The Q/EH presents the process and methodology of security testing with more detail which makes you a more effective security tester. Making the CEH modules more conceptual where the Q/EH is more tactical and hands-on more focused on what you need to know to do penetration testing and security analysis.
This Intense 5 day Q/EH® Qualified/ Ethical Hacker class provides you with basic to advanced understanding of the hacking tools and hone your skills to discover security weakness in your organization. This class would be before or after Security+, CISSP® is not needed. Are you for SERIOUS tactical hands-on labs? Do you want to know how to block attacks with a single tool? leap over sys admins to defend your box? Step up to Qualified.
"Yes. Pls quote me, The instructor was great, he was very knowledgeable. I had CEH™ and CHFI™ training from another vendor and I did receive certification but I wish I had attended your classes instead, I would have learned much more."
No death by power point - the Q/EH® study guide engages you in real world scenarios, no old hacking tools, like other Certifying Ethical Hacking classes. More than 35 hands-on tactical security labs to ensure your qualified and validated to defend networks from cyber threats.
We're here to help!
CALL NOW 877-357-7744
We are dedicated to your tactical security success. We constantly add new security tools, white papers and update SU hacking labs to keep you motivated and expand your tactical security knowledge & hacking skills.
New! Multiple VM's on each laptop, the latest BackTrack and Linux tool kits
CEH™ Exam VOUCHER ($350 additional charge)
New Saint Vulnerability Exploit tool with discount code
Core Impact 8IP, 7-Day LICENSE FREE CD with every class registration!
99% pass rate, highest pass rate in the industry
100% Satisfaction Guarantee
Instruction and review with an experienced master hacker
Q/EH Exam on site last day of class
Access to Security University 's IT Professional Reference Library of targeted pre-class reading
Free download of Linux & 400+ up-to-date hacking tools and exploits
"Where Qualified Happens"
No book substitutes for the real thing
What is "Qualified"
Q/ISP Certification is obtained through Security University for the purpose of recognizing qualified individuals who have distinguished themselves as knowledgeable, skilled and proficient information security practitioners with validated hands-on tactical security skills. The Q/ISP certificate also provides the ONLY means of identifying qualified security professionals who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in information security with "validated" hands-on tactical security skills.
Certificates are awarded to those qualified individuals who validate their security skills to a prescribed qualified level of tactical hands-on information security experience, comply with a professional code of ethics, and pass rigorous examinations on the Q/ISP Body of Knowledge for information security.
Keeping your Q/ISP Valid
In order to maintain currency in the field, each Q/ISP must complete participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Q/ISP Body of Knowledge, or service in professional organizations. Each Q/SIP must acquire 120 CPE continuing professional education credits every three years. (40 credits per year)
The Q/ISP Certification does not require you to complete Q/ISP hands-on classes - however to "validate" your security skills and use the "Qualified" symbol as your trust mark, you will be asked to complete the Q/PTL workshop, the Q/FE & Q/ND practical's that validate your tactical security skills.
Understanding of TCP/IP protocols,
SU Q/EH EXAM onsite last day
Method of Delivery - Residential On Ground
Method of Evaluation: 1. 95 % attendance 2. 100 % completion of Lab
Grading: Pass = 95% Attendance and 100% Completion of Labs and Practical
Fail => 95% Attendance and > 100% Completion of Labs and Practical
Security Training Reviews - 2013
This has been a fantastic experience for me, and I look forward to working with you in the future for my IT training needs. Sondra, I can already tell CISSP, Q/EH, Q/SA, and Q/PTL will be the best $7K investment I have ever made for my future. Good luck with the 8570 certification!! See you in 2 weeks.
Security University has proven itself by obtaining an industry leader in Information Security. ken's CISSP class has without a doubt provided me with the necessary knowledge I require to pass the CISSP as well as prepare me to be a successful contributor to the Information Systems Security industry. I look forward to future classes with Security University and I would most definitely recommend them for anyone's training needs. Travis, retiring military
One of the concerns that I have is most of the cert's which exist on the list tend toward paper IA personnel.
Over the years, I have seen this in the MSCE® and CCNA® as examples. I have more than my fair share of certifications and I have taught cert courses for over 20 years.
I sat through Security University's Q/EH class which was fairly impressive and asked a large number of questions concerning their other exams. Looking at the challenges that the DoD is attempting to address, the Q/ISP strikes me as more appropriate than most of the current exams. This course/exam group is multi-functional, each section dealing with a very IA oriented goal/need. The Q/PTL which is part of the Q/ISP requires a written test, a three hour examination of a specialized test scenario (also graded) and finally a two week period to complete a full diagnostic report. One of the student reports was 20 pages in length.
Definitely a high level of competence to receive a certification. DoD Sparks.
Q/EH® Qualified Ethical Hacker Certification exam tests on the following domains.
Class Tuition & Bonuses
Instruction and review with an experienced master hacker
Q/EH Exam on site last day of class
Access to Security University's IT Professional Reference Library of targeted pre-class reading, with:
Free download of Linux & 400+ up-to-date hacking tools and exploit
The business of Ethical Hacking your network
Laws & Legislation
White & Black Box Testing
Software Security Testing
DRP Disaster Recovery Planning
Reconnaissance/ footprinting Define the term Footprinting
Describe information gathering methodology
Describe competitive intelligence
Understand DNS enumeration
Understand Whois, ARIN lookup
Identify different types of DNS records
Understand how traceroute is used in Footprinting
Understand how e-mail tracking works
Understand how web spiders work
Scanning Define the term port scanning, network scanning and vulnerability scanning
Understand the Q/EH scanning methodology
Understand Ping Sweep techniques
Understand nmap command switches
Understand SYN, Stealth, XMAS, NULL, IDLE and FIN scans
List TCP communication flag types
Understand War dialing techniques
Understand banner grabbing and OF fingerprinting techniques
Understand how proxy servers are used in launching an attack
How does anonymizers work
Understand HTTP tunneling techniques
Understand IP spoofing techniques
Enumeration What is Enumeration?
What is meant by null sessions
What is SNMP enumeration?
What are the steps involved in performing enumeration?
Sniffers Understand the protocol susceptible to sniffing
Understand active and passive sniffing
Understand ARP poisoning
Understand ethereal capture and display filters
Understand MAC flooding
Understand DNS spoofing techniques
Describe sniffing countermeasure
System hacking Understanding password cracking techniques
Understanding different types of passwords
Identifying various password cracking tools
Understand Escalating privileges
Understanding keyloggers and other spyware technologies
Understand how to Hide files
Understand Steganography technologies
Understand how to covering your tracks and erase evidences
Buffer Overflows Overview of stack based buffer overflows
Identify the different types of buffer overflows and methods of detection
Overview of buffer overflow mutation techniques
SQL Injection What is SQL injection?
Understand the Steps to conduct SQL injection
Understand SQL Server vulnerabilities
Describe SQL Injection countermeasures
Virus and Worms / Trojans and Backdoors/ Rootkits Understand the difference between an virus and a Worm
Understand the types of Viruses
How a virus spreads and infects the system
Understand antivirus evasion techniques
Understand Virus detection methods What is a Trojan?
What is meant by overt and covert channels?
List the different types of Trojans
What are the indications of a Trojan attack?
Understand how Netcat Trojan works
What is meant by wrapping
How does reverse connecting Trojans work?
What are the countermeasure techniques in preventing Trojans?
Understand Trojan evading techniques
Denial of Service Understand the types of DoS Attacks
Understand how DDoS attack works
Understand how BOTs/BOTNETS work
What is smurf attack
What is SYN flooding
Describe the DoS/DDoS countermeasures
Session Hijacking Understand Spoofing vs. Hijacking
List the types of Session Hijacking
Understand Sequence Prediction
What are the steps in performing session hijacking
Describe how you would prevent session hijacking
Wireless Hacking Overview of WEP, WPA authentication systems and cracking techniques
Overview of wireless Sniffers and SSID, MAC Spoofing
Understand Rogue Access Points
Understand Wireless hacking techniques
Describe the methods in securing wireless networks
Hacking Web Servers List the types of web server vulnerabilities
Understand the attacks Against Web Servers
Understand IIS Unicode exploits
Understand patch management techniques
Understand Web Application Scanner
What is Metasploit Framework?
Describe Web Server hardening methods
Web Application Vulnerabilities Understanding how web application works
Objectives of web application hacking
Anatomy of an attack
Web application threats
Understand Google hacking
Understand Web Application Countermeasures
Physical Security Physical security breach incidents
Understanding physical security
What is the need for physical security?
Who is accountable for physical security?
Factors affecting physical security
Social Engineering What is Social Engineering?
What are the Common Types of Attacks
Understand Dumpster Diving
Understand Reverse Social Engineering
Understand Insider attacks
Understand Identity Theft
Describe Phishing Attacks
Understand Online Scams
Understand URL obfuscation
Social Engineering countermeasures Linux Hacking Understand how to a Linux Kernel
Understand GCC compilation commands
Understand how to install LKM modules
Understand Linux hardening methods
IDS, Honeypots and Firewalls List the types of Intrusion Detection Systems and evasion techniques
List firewall and honeypot evasion techniques
Cryptography Overview of cryptography and encryption techniques
Describe how public and private keys are generated
Overview of MD5, SHA, RC4, RC5, Blowfish algorithms
Penetration Testing Methodologies Overview of penetration testing methodologies
List the penetration testing steps
Overview of the Pen-Test legal framework
Overview of the Pen-Test deliverables
List the automated penetration testing tools
Appendix I, II, II
C&A Review Event Correlation Incident Mgt Law & Legislation Snort RulesBlack Box Testing PKI Software Security TestingCode Review COOP BCP Business Continuity Planning DRP Disaster Recovery Planning
What is a Q/ISP® "Qualified"/ Information Security Professional Certification? The 125 question online Q/ISP certification exam has questions from 4 Q/ISP Security Skills certification prep classes:
Qualified/Security Analysis Penetration Testing
The Q/ISP, Q/EH, Q/SA- Q/PTL, Q/FE & Q/ND certification exams do not require training classes.
The Q/ISP certification is selected to be reviewed for 8570 certification list.
What is a "Qualified" Q/ISP? A Qualified Q/ISP has attained 4 SU Q/ISP® Validation Certifications. Each Validation Certification is attained by attending the Q/ISP tactical security skills certification prep class to validates your tactical security skills - Q/EH, Q/SA - Q/PT License, Q/FE & Q/ND. Each validation & certification prep class is 5 days of hands-on labs, with an online certification exam AND a intense hands-on "Practical" exams. You have to pass both the On-line certification exam and the "Practical" validation projects before you earn a SU Q/ISP (Validation) Certification.
The Security University Security Pyramid represents enlightenment, man's breaking free of stagnant education and reaching towards the supreme source of security skills training and validation, globally illuminating risk preparedness.
Prior to 2008, if you attended Security University's EC-Council® Authorized CEH®, ECSA®, CHFI® classes and passed the certification exams you are eligible for the Q/ISP® Qualified/ Certifications but still have to pass the Q/ISP tactical certification exams.