Certified Ethical Hacker – CEH Certification Training
Video training course for the EC-Council Certified Ethical Hacker (CEH) Exam. This course part theory and part practical and teaches you all the tricks and tools real hackers use in their attempts to penetrate networks. Armed with this knowledge you can advise clients and produce extensive security reports.
A Certified Ethical Hacker is a security professional who has been trained to look for security issues, weaknesses and vulnerabilities in customer networks and software. They use the same tools and methods as hackers, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
This course is updated for the CEH v11 exam objectives. It's prepares you for the following two exams:
- CEH Written Exam (Theory Exam)
- CEH Practical Certification (Hands-on Exam)
When you pass both exams you automatically qualify as a CEH Master.
Ethical hackers work from home as freelancers or are employed by organizations to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities. They are often referred to as penetration testers and usually work using Linux hacking tools.
Careers you can consider after passing the CEH include:
- Security officers
- Auditors
- Cyber Operations service desk engineers
- Security professionals
- Network administrators
- Penetration testers
- IT managers
Your Instructor
Diogo Oliveria
Diogo is an assistant professor in the School of Information at the Florida State University, focusing his research on network performance, cybersecurity, disaster recovery techniques for large-scale networks, software-defined networking (SDN) and network function virtualization (NFV). Additionally, he has more than 15 years of industry experience in network and Linux engineering.
He received a Ph.D. degree in electrical engineering from the University of South Florida, Tampa, FL, and a M.S. degree in computer engineering from the Federal University of Goias, Brazil. Both his masters and PhD research topics focused on network performance and security.
- Over 20 hours of video training
- Instructor follow along labs
- End-of-lesson exams
- End-of-course certificate
- Access to members only forum
- Exam vendor – ECC, Pearson VUE
- Prerequisites – None
- Recommended – Linux Essentials, CompTIA Security+
Module 1 | Introduction to Ethical Hacking |
---|---|
Unit 1 | Welcome to the Course |
Module 2 | Footprinting and Reconnaissance |
Unit 1 | Concepts of Reconnaissance and Footprinting |
Unit 2 | Running Kali Linux |
Unit 3 | LAB - Using Reconnaissance and Footprinting Tools |
Module 3 | Scanning Networks |
Unit 1 | Concepts of Network Scanning |
Unit 2 | LAB - Network Scanning Tools |
Module 4 | Enumeration |
Unit 1 | NetBIOS Enumeration |
Unit 2 | Enumerating DNS, Emails and Management |
Module 5 | Vulnerability Analysis |
Unit 1 | Introduction to System Hacking |
Unit 2 | LAB - Offline Password Cracking |
Unit 3 | LAB - Password Cracking and Privilege Escalation |
Module 6 | System Hacking |
Unit 1 | Vulnerability Assessment |
Module 7 | Malware Threats |
Unit 1 | Types of Malicious Softwares |
Unit 2 | LAB - Using and Analyzing Malicious Softwares |
Module 8 | Sniffing |
Unit 1 | Packet Sniffing |
Module 9 | Social Engineering |
Unit 1 | Concepts of Social Engineering |
Unit 2 | LAB - The Social Engineering Tool (SET) |
Module 10 | Denial-of-Service |
Unit 1 | Denial of Service Attacks |
Unit 2 | LAB - Performing DDoS Attacks |
Module 11 | Session Hijacking |
Unit 1 | Introduction to Session Hijacking |
Unit 2 | LAB - Implementing Active and Passive Hijacking |
Module 12 | Evading IDS, Firewalls and Honeypots |
Unit 1 | Knowing and Evading IDS, Firewalls and Honeypots |
Unit 2 | LAB - Fragmentation and Tunneling |
Module 13 | Hacking Web Servers |
Unit 1 | Web Servers and HTTP Attacks |
Unit 2 | LAB - Exploring Web Servers' Vulnerabilities |
Module 14 | Hacking Web Applications |
Unit 1 | Web Application Attacks |
Unit 2 | LAB - Web Application Attacks with Juice Shop |
Module 15 | SQL Injection |
Unit 1 | SQL Injection Attacks |
Unit 2 | LAB - Testing SQL Injection Using Metasploitable |
Module 16 | Hacking Wireless Networks |
Unit 1 | WiFi Networks and Encryption Mechanisms |
Unit 2 | LAB - Cracking WPA Passphrases with Wifite2 |
Module 17 | Hacking Mobile Platforms |
Unit 1 | Mobile Network Hacking |
Module 18 | IoT Hacking |
Unit 1 | IoT Hacking |
Module 19 | Cloud Computing |
Unit 1 | Cloud Computing |
Module 20 | Cryptography |
Unit 1 | Cryptography |
Module 21 | Practice Exam |
Unit 1 | Exam |