Q/EH® Qualified/ Ethical Hacker Qualification/Certification Exam and Class
+ learn HANDS-on for CEH™ EXAM
The only Q/EH Qualified/ Ethical Hacking "Hands-on" Tactical Security skills training AND what you need to know to secure networks, systems and secure information. 30+ hands-on labs focused on 22 areas of the network/enterprise - You will leave knowing how to hack AND secure networks while staying ahead of the hackers!
'when asked by a Navy contractor whats the difference in the Q/EH training than a CEH training class? CEH presents security testing tools modules that only describe and demo tools. The Q/EH presents the process and methodology of security testing with more detail which makes you a more effective security tester. Making the CEH modules more conceptual where the Q/EH is more tactical and hands-on more focused on what you need to know to do penetration testing and security analysis.
View our Q/EH® Training videos on our YouTube Channel:
This Intense 5 day Q/EH® Qualified/ Ethical Hacker class provides you with basic to advanced understanding of the hacking tools and hone your skills to discover security weakness in your organization. This class would be before or after Security+, CISSP® is not needed. Are you for SERIOUS tactical hands-on labs? Do you want to know how to block attacks with a single tool? leap over sys admins to defend your box? Step up to Qualified.
"Yes. Pls quote me, The instructor was great, he was very knowledgeable. I had CEH™ and CHFI™ training from another vendor and I did receive certification but I wish I had attended your classes instead, I would have learned much more."
No death by power point - the Q/EH® study guide engages you in real world scenarios, no old hacking tools, like other Certifying Ethical Hacking classes. More than 35 hands-on tactical security labs to ensure your qualified and validated to defend networks from cyber threats.
We are dedicated to your tactical security success. We constantly add new security tools, white papers and update SU hacking labs to keep you motivated and expand your tactical security knowledge & hacking skills.
- New! Multiple VM's on each laptop, the latest BackTrack and Linux tool kits
- New Vulnerability Exploit tool with discount code
- Core Impact 7-Day LICENSE FREE CD with every class registration!
- Expert Instructors
- 99% pass rate, highest pass rate in the industry
- 100% Satisfaction Guarantee
- Instruction and review with an experienced master hacker
- Q/EH Exam optional on site last day of class
- Access to Security University 's IT Professional Reference Library of targeted pre-class reading
- Free download of Linux & 400+ up-to-date hacking tools and exploits
- "Where Qualified Happens"
- No book substitutes for the real thing
What is "Qualified"
Q/ISP Certification is obtained through Security University for the purpose of recognizing qualified individuals who have distinguished themselves as knowledgeable, skilled and proficient information security practitioners with validated hands-on tactical security skills. The Q/ISP certificate also provides the ONLY means of identifying qualified security professionals who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in information security with "validated" hands-on tactical security skills.
Certificates are awarded to those qualified individuals who validate their security skills to a prescribed qualified level of tactical hands-on information security experience, comply with a professional code of ethics, and pass rigorous examinations on the Q/ISP Body of Knowledge for information security.
Keeping your Q/ISP Valid
In order to maintain currency in the field, each Q/ISP must complete participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Q/ISP Body of Knowledge, or service in professional organizations. Each Q/SIP must acquire 120 CPE continuing professional education credits every three years. (40 credits per year)
The Q/ISP Certification does not require you to complete Q/ISP hands-on classes - however to "validate" your security skills and use the "Qualified" symbol as your trust mark, you will be asked to complete the Q/PTL workshop, the Q/FE & Q/ND practical's that validate your tactical security skills.
|Time:||7:45am - 6pm|
|Location:||Click here to view the class schedule|
40 - CNSS 4011, 4012, 4013A, 4105, 4016E /NSA-approved!
|Download the SU class RoadMap|
|Prerequisites:|| Understanding of TCP/IP protocols,
SU optional Q/EH EXAM onsite last day
Method of Evaluation: 1. 95 % attendance 2. 100 % completion of Lab
Grading: Pass = 95% Attendance and 100% Completion of Labs and Practical
Fail => 95% Attendance and > 100% Completion of Labs and Practical
|Security Training Reviews - 2013
This has been a fantastic experience for me, and I look forward to working with you in the future for my IT training needs. Sondra, I can already tell CISSP, Q/EH, Q/SA, and Q/PTL will be the best $7K investment I have ever made for my future. Good luck with the 8570 certification!! See you in 2 weeks.
Security University has proven itself by obtaining an industry leader in Information Security. ken's CISSP class has without a doubt provided me with the necessary knowledge I require to pass the CISSP as well as prepare me to be a successful contributor to the Information Systems Security industry. I look forward to future classes with Security University and I would most definitely recommend them for anyone's training needs. Travis, retiring military
One of the concerns that I have is most of the cert's which exist on the list tend toward paper IA personnel.
Over the years, I have seen this in the MSCE® and CCNA® as examples. I have more than my fair share of certifications and I have taught cert courses for over 20 years.
Q/EH® Qualified Ethical Hacker Certification exam tests on the following domains.
Business of Ethical Hacking
Hacking Wireless Networks
Hacking Web Servers
|3.||Scanningo||14||Web Application Vulnerabilities|
Password Cracking Techniques
IDS, Firewalls and Honeypots
Virus Worms Trojans Rootkits
Denial of Service
Penetration Testing Methods
SAINT Exploit tool
Class Tuition & Bonuses
Instruction and review with an experienced master hacker
Q/EH Exam on site last day of class
Access to Security University's IT Professional Reference Library of targeted pre-class reading, with:
Free download of Linux & 400+ up-to-date hacking tools and exploit
The business of Ethical Hacking your network
• Incident Management
• Laws & Legislation
• White & Black Box Testing
• Software Security Testing
• Code Review
• DRP Disaster Recovery Planning
• Define the term Footprinting
• Describe information gathering methodology
• Describe competitive intelligence
• Understand DNS enumeration
• Understand Whois, ARIN lookup
• Identify different types of DNS records
• Understand how traceroute is used in Footprinting
• Understand how e-mail tracking works
• Understand how web spiders work
• Define the term port scanning, network scanning and vulnerability scanning
• Understand the Q/EH scanning methodology
• Understand Ping Sweep techniques
• Understand nmap command switches
• Understand SYN, Stealth, XMAS, NULL, IDLE and FIN scans
• List TCP communication flag types
• Understand War dialing techniques
• Understand banner grabbing and OF fingerprinting techniques
• Understand how proxy servers are used in launching an attack
• How does anonymizers work
• Understand HTTP tunneling techniques
• Understand IP spoofing techniques
• What is Enumeration?
• What is meant by null sessions
• What is SNMP enumeration?
• What are the steps involved in performing enumeration?
• Understand the protocol susceptible to sniffing
• Understand active and passive sniffing
• Understand ARP poisoning
• Understand ethereal capture and display filters
• Understand MAC flooding
• Understand DNS spoofing techniques
• Describe sniffing countermeasure
• Understanding password cracking techniques
• Understanding different types of passwords
• Identifying various password cracking tools
• Understand Escalating privileges
• Understanding keyloggers and other spyware technologies
• Understand how to Hide files
• Understanding rootkits
• Understand Steganography technologies
• Understand how to covering your tracks and erase evidences
• Overview of stack based buffer overflows
• Identify the different types of buffer overflows and methods of detection
• Overview of buffer overflow mutation techniques
• What is SQL injection?
• Understand the Steps to conduct SQL injection
• Understand SQL Server vulnerabilities
• Describe SQL Injection countermeasures
Virus and Worms / Trojans and Backdoors / Rootkits
• Understand the difference between an virus and a Worm
• Understand the types of Viruses
• How a virus spreads and infects the system
• Understand antivirus evasion techniques
• Understand Virus detection methods
• What is a Trojan?
• What is meant by overt and covert channels?
• List the different types of Trojans
• What are the indications of a Trojan attack?
• Understand how “Netcat” Trojan works
• What is meant by “wrapping”
• How does reverse connecting Trojans work?
• What are the countermeasure techniques in preventing Trojans?
• Understand Trojan evading techniques
Denial of Service
• Understand the types of DoS Attacks
• Understand how DDoS attack works
• Understand how BOTs/BOTNETS work
• What is “smurf” attack
• What is “SYN” flooding
• Describe the DoS/DDoS countermeasures
• Understand Spoofing vs. Hijacking
• List the types of Session Hijacking
• Understand Sequence Prediction
• What are the steps in performing session hijacking
• Describe how you would prevent session hijacking
• Overview of WEP, WPA authentication systems and cracking techniques
• Overview of wireless Sniffers and SSID, MAC Spoofing
• Understand Rogue Access Points
• Understand Wireless hacking techniques
• Describe the methods in securing wireless networks
Hacking Web Servers
• List the types of web server vulnerabilities
• Understand the attacks Against Web Servers
• Understand IIS Unicode exploits
• Understand patch management techniques
• Understand Web Application Scanner
• What is Metasploit Framework?
• Describe Web Server hardening methods
Web Application Vulnerabilities
• Understanding how web application works
• Objectives of web application hacking
• Anatomy of an attack
• Web application threats
• Understand Google hacking
• Understand Web Application Countermeasures
• Physical security breach incidents
• Understanding physical security
• What is the need for physical security?
• Who is accountable for physical security?
• Factors affecting physical security
• What is Social Engineering?
• What are the Common Types of Attacks
• Understand Dumpster Diving
• Understand Reverse Social Engineering
• Understand Insider attacks
• Understand Identity Theft
• Describe Phishing Attacks
• Understand Online Scams
• Understand URL obfuscation
• Social Engineering countermeasures
• Understand how to a Linux Kernel
• Understand GCC compilation commands
• Understand how to install LKM modules
• Understand Linux hardening methods
IDS, Honeypots and Firewalls
• List the types of Intrusion Detection Systems and evasion techniques
• List firewall and honeypot evasion techniques
• Overview of cryptography and encryption techniques
• Describe how public and private keys are generated
• Overview of MD5, SHA, RC4, RC5, Blowfish algorithms
Penetration Testing Methodologies
• Overview of penetration testing methodologies
• List the penetration testing steps
• Overview of the Pen-Test legal framework
• Overview of the Pen-Test deliverables
• List the automated penetration testing tools
Appendix I, II, II
• Event Correlation
• Incident Mgt
• Law & Legislation
• Snort Rules
• Black Box Testing
• Software Security Testing
• BCP Business Continuity Planning
• DRP Disaster Recovery Planning
What is a Q/ISP® "Qualified"/ Information Security Professional Certification?
The 125 question online Q/ISP certification exam has questions from 4 Q/ISP Security Skills certification prep classes:
Qualified/Security Analysis Penetration Testing
The Q/ISP, Q/EH, Q/SA- Q/PTL, Q/FE & Q/ND certification exams do not require training classes.
The Q/ISP certification is selected to be reviewed for 8570 certification list.
What is a "Qualified" Q/ISP? A Qualified Q/ISP has attained 4 SU Q/ISP® Validation Certifications. Each Validation Certification is attained by attending the Q/ISP tactical security skills certification prep class to validates your tactical security skills - Q/EH, Q/SA - Q/PT License, Q/FE & Q/ND. Each validation & certification prep class is 5 days of hands-on labs, with an online certification exam AND a intense hands-on "Practical" exams. You have to pass both the On-line certification exam and the "Practical" validation projects before you earn a SU Q/ISP (Validation) Certification.
The Security University Security Pyramid represents enlightenment, man's breaking free of stagnant education and reaching towards the supreme source of security skills training and validation, globally illuminating risk preparedness.
Prior to 2008, if you attended Security University's EC-Council® Authorized CEH®, ECSA®, CHFI® classes and passed the certification exams you are eligible for the Q/ISP® Qualified/ Certifications but still have to pass the Q/ISP tactical certification exams.
Since 2004 SU has certified over 3500 ECSA®/ Q/SA® Qualified Security Analysts Penetration Testers in 7 countries!
Customize your Q/SA® Q/PTL training program today!
US Congress wants hack teams for self-penetration download for more..
Compliance requirements aside, penetration testing is an absolutely critical aspect of any security program. Attackers test every company's defenses every day.
Free Security Threat Guides from Veracode: Cross Site Request Forgery
The CEH™ Certification is provided exclusively by EC-Council® and its ATC's, Security University is not sponsored by, approved by, or affiliated in any way with EC-Council®.