Certified Ethical Hacker (CEH) Version 11
Learn essential ethical hacking skills to identify security vulnerabilities, perform penetration testing, and strengthen defenses for cybersecurity professionals.
Master the skills to identify and fix security vulnerabilities before malicious hackers can exploit them. After completing this ceh training, you’ll be equipped to perform comprehensive penetration tests, analyze system weaknesses, and strengthen network defenses. This course prepares you to become a certified ethical hacker, capable of assessing security postures with confidence and precision.
This course covers the essentials of ethical hacking as outlined in the CEH v11 certification, including attack techniques, vulnerability assessment, and exploitation methods. It is designed to give you a deep understanding of how cyber attackers operate and how to defend against them. If you’re aiming for the CEH certification, this training aligns with the exam objectives and provides the knowledge needed to succeed.
What sets this CEH course apart is its hands-on approach, infused with real-world scenarios and practical exercises. You’ll learn not just the theory, but how to apply hacking techniques safely and ethically in a controlled environment. This pragmatic focus ensures you’re ready to tackle security challenges in your organization immediately.
What You Will Learn
This course delivers practical skills for ethical hacking and cybersecurity defense. You will learn to:
- Identify common network vulnerabilities and understand how attackers exploit them.
- Use tools like Nmap and Metasploit to scan networks, discover targets, and assess security weaknesses.
- Develop and execute reconnaissance strategies to gather intelligence on systems and applications.
- Crack passwords and intercept network transmissions to evaluate security controls.
- Perform social engineering attacks ethically to test organizational security awareness.
- Bypass firewalls and intrusion detection systems using advanced techniques to simulate real-world attacks.
- Exploit web application vulnerabilities such as SQL injection, cross-site scripting, and command injection.
- Evaluate Wi-Fi security by performing Evil Twin, WPA2 cracking, and other wireless attack methods.
- Hack mobile platforms and IoT devices to identify potential entry points for malicious actors.
- Apply legal and ethical principles to ensure compliance during penetration testing activities.
Who This Course Is For
This ceh course is ideal for IT professionals who want to deepen their cybersecurity expertise. Whether you’re an aspiring security analyst, network administrator, or penetration tester, this training is designed for those with foundational networking knowledge. Prior experience with operating systems and basic security concepts will help you get the most out of this program.
Specific job titles include:
- Cybersecurity Analyst
- Network Security Engineer
- Penetration Tester
- Security Consultant
- System Administrator
Why These Skills Matter
Mastering ethical hacking skills positions you as a valuable asset in the cybersecurity field. Organizations are actively seeking professionals who can proactively identify vulnerabilities and prevent breaches. By learning the techniques covered in this course, you gain a competitive edge that can lead to higher salaries, advanced certifications, and leadership roles in security teams.
Even if you don’t pursue the CEH certification, acquiring these skills makes you better equipped to defend networks, investigate incidents, and advise organizations on security best practices. As cyber threats evolve, being proficient in ethical hacking methods ensures you stay ahead of malicious actors and contribute meaningfully to your organization’s security posture.
Module 61 – CEH v11 Advanced Ethical Hacker Course Intro
- 61.1 About This Course: Advanced Ethical Hacker
- 61.2 About the Instructor
Module 62 – CEH v11 Session Hjacking
- 62.1 Session Hijacking Concepts
- 62.2 Token-based Authentication
- 62.3 Compromising a Session Token
- 62.4 XSS
- 62.5 CSRF
- 62.6 Other Attacks
Module 63 – CEH v11 Defending Against Hijacking
- 63.1 Network Level Hijacking
- 63.2 Session Hijacking Tools
- 63.3 Session Hijacking Countermeasures
- 63.4 Session Penetration Hijacking
- 63.5 Review
Module 64 – CEH v11 Implementing Intrusion Detection
- 64.1 IDS-IPS
- 64.2 Snort
- 64.3 Snort Rules
- 64.4 Syslog
Module 65 – CEH v11 Testing Intrusion Detection
- 65.1 WIPS
- 65.2 IDS Considerations
- 65.3 IDS Tools
- 65.4 IDS Evasion
- 65.5 IDS-Firewall Evasion Tools
- 65.6 IDS Scenerios
Module 66 – CEH v11 Implementing Firewalls
- 66.1 Firewalls
- 66.2 Packet Filtering Rules
- 66.3 Firewall Deployments
- 66.4 Traffic Flow through Firewalls
- 66.5 Split DNS
Module 67 – CEH v11 Testing Firewallls
- 67.1 Firewall Tools
- 67.2 Firewall Evasion
- 67.3 Firewall Scenarios
Module 68 – CEH v11 Implementing Honeypots
- 68.1 Honeypots
- 68.2 Honeypot Detection
- 68.3 IDS-Firewall Evasion Countermeasures
- 68.4 IDS-Firewall Honeypot Penetration Testing
- 68.5 Review
Module 69 – CEH v11 Attacker Webserver
- 69.1 Webserver Security Overview
- 69.2 Common Webservers
- 69.3 Webserver Attacks
- 69.4 Misconfiguration Attack Examples
Module 70 – CEH v11 Webserver Defense
- 70.1 Webserver Attack Tools
- 70.2 Attack Countermeasures
- 70.3 Webserver Penetration Testing
- 70.4 Review
Module 71 – CEH v11 Intro To Web Apps
- 71.1 Web Application Concepts
- 71.2 Attacking Web Apps
Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities
- 72.1 A01 – Broken Access Control
- 72.2 A02 – Cryptographic Failures
- 72.3 A03 – Injection
- 72.4 A04 – Insecure Design
- 72.5 A05 – Security Misconfiguration
Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities
- 73.1 A06 – Vulnerable and Outdated Components
- 73.2 A07 – Identification and Authentication Failures
- 73.3 A08 – Software and Data Integrity Failures
- 73.4 A09 – Security Logging and Monitoring
- 73.5 A10 – Server Side Request Forgery
Module 74 – CEH v11 Common Web App Attacks
- 74.1 XSS Attacks
- 74.2 CSRF
- 74.3 Parameter Tampering
- 74.4 Clickjacking
- 74.5 SQL Injection
Module 75 – CEH v11 Unauthorized Access Through Web Apps
- 75.1 Insecure Deserialization Attacks
- 75.2 IDOR
- 75.3 Directory Traversal
- 75.4 Session Management Attacks
- 75.5 Response Splitting
Module 76 – CEH v11 Web App Overflow Attacks
- 76.1 Denial of Service
- 76.2 Overflow Attacks
- 76.3 XXE Attacks
- 76.4 Soap Attacks
- 76.5 Ajax Attacks
Module 77 – CEH v11 Defending Web Apps
- 77.1 Web App Hacking Tools
- 77.2 Web Hacking Countermeasures
- 77.3 Web Application Penetration Testing
- 77.4 Review
Module 78 – CEH v11 Intro To SQL Injection
- 78.1 SQL Overview
- 78.2 SQL Injection Concepts
- 78.3 Basic SQL Injection
Module 79 – CEH v11 Performing SQL Injection
- 79.1 Finding Vulnerable Websites
- 79.2 Error-based SQL Injection
- 79.3 Union SQL Injection
- 79.4 Blind SQL Injection
- 79.5 SQL Injection Scenarios
- 79.6 Evading Detection
Module 80 – CEH v11 Defending Against SQL Injection
- 80.1 SQL Injection Tools
- 80.2 SQL Injection Countermeasures
- 80.3 Safe Coding Examples
- 80.4 SQL Wildcards
- 80.5 SQL Injection Penetration Testing
- 80.6 Review
Module 81 – CEH v11 Wireless Networking Overview
- 81.1 Wireless Concepts
- 81.2 Wireless Signal Encoding
- 81.3 Wi-Fi Standards
- 81.4 Wi-Fi Antennas
- 81.5 Wireless Authentication
Module 82 – CEH v11 Wi-Fi Security
- 82.1 Wi-Fi Security Standards
- 82.2 Wireless Network Troubleshooting Tools
- 82.3 Wi-Fi Discovery Tools
- 82.4 Sniffing Wi-Fi
Module 83 – CEH v11 Hacking Wi-Fi
- 83.1 Wi-Fi Attack Types
- 83.2 Wi-Fi Rogue Access Point Attacks
- 83.3 Wi-Fi Denial of Service Attacks
- 83.4 Wi-Fi Password Cracking Attacks
- 83.5 WEP Cracking
Module 84 – CEH v11 Advanced Wireless Attacks
- 84.1 WPA-WPA2 Cracking
- 84.2 WPA3 Attacks
- 84.3 WPS Cracking
- 84.4 Wi-Fi Attack Tools for Mobile Devices
- 84.5 Bluetooth Hacking
- 84.6 Other Wireless Hacking
Module 85 – CEH v11 Defending Wireless Networks
- 85.1 Wireless Hacking Countermeasures
- 85.2 Wireless Security Tools
- 85.3 Wireless Penetration Testing
- 85.4 Review
Module 86 – CEH v11 Mobile Platform Overview
- 86.1 Mobile Platform Overview
- 86.2 Mobile Device Vulnerabilities
- 86.3 Mobile Device Attacks
Module 87 – CEH v11 Hacking Android
- 87.1 Android
- 87.2 Android Vulnerabilities
- 87.3 Rooting Android
- 87.4 Android Exploits
- 87.5 Android Hacking Tools
- 87.6 Reverse Engineering an Android App
- 87.7 Securing Android
Module 88 – CEH v11 Hacking iOS
- 88.1 iOS
- 88.2 iOS Vulnerabilities
- 88.3 Jailbreaking iOS
- 88.4 iOS Exploits
- 88.5 iOS Hacking Tools
- 88.6 Securing iOS
Module 89 – CEH v11 Mobile Platform Defense
- 89.1 Mobile Device Management
- 89.2 BYOD
- 89.3 Mobile Security Guidelines and Tools
- 89.4 Mobile Device Penetration Testing
- 89.5 Review
Module 90 – CEH v11 IoT Hacking
- 90.1 loT Concepts
- 90.2 loT Infrastructure
- 90.3 Fog Computing
- 90.4 loT Vulnerabilities
- 90.5 loT Threats
Module 91 – CEH v11 IoT Defense
- 91.1 IoT Hacking Methodologies and Tools
- 91.2 IoT Hacking Methodolgies and Tools Part 2
- 91.3 Hacking Countermeasures
- 91.4 IoT Penetration Testing
- 91.5 OT Concepts
- 91.6 Industrial IoT
Module 92 – CEH v11 Operational Technology Overview
- 92.1 IT-OT Convergence
- 92.2 ICS
- 92.3 SCADA
- 92.4 DCS
- 92.5 RTU
- 92.6 PLC
- 92.7 Addition OT Components
Module 93 – CEH v11 Hacking OT
- 93.1 OT Variables
- 93.2 Well-known OT attacks
- 93.3 OT Attack Methodology and Basic Tools
- 93.4 OT Reconnaissance
- 93.5 OT Penetration and Control
Module 94 – CEH v11 Defending OT
- 94.1 OT Attack Tools
- 94.2 OT Hacking Countermeasures
- 94.3 OT Penetration Testing
- 94.4 Review
Module 95 – CEH v11 Attacking The Cloud
- 95.1 Cloud Computing Concepts
- 95.2 Virtualization
- 95.3 Cloud Types
- 95.4 Cloud Benefits and Considerations
- 95.5 Cloud Risks and Vulnerablilities
Module 96 – CEH v11 Cloud Defense
- 96.1 Cloud Threats and Countermeasures
- 96.2 Cloud Security Tools
- 96.3 Cloud Security Best Practices
- 96.4 Cloud Penetration Testing
- 96.5 Review
Module 97 – CEH v11 Cryptography Overview
- 97.1 Cryptography Concepts
- 97.2 Symetric Encryption
- 97.3 Asymmetric Encryption
- 97.4 Public Key Exchange
- 97.5 PKI
Module 98 – CEH v11 Protecting Data With Crytography
- 98.1 Digital Certificates
- 98.2 Digital Signatures
- 98.3 Hashing
- 98.4 Email Encryption
- 98.5 Network Communication Encryption
Module 99 – CEH v11 Protecting Data at Home and in Transit
- 99.1 Disk Encryption
- 99.2 VPN Encryption
- 99.3 Cryptography Tools
Module 100 – CEH v11 Pentesting Cryptography
- 100.1 Cryptography Attacks
- 100.2 Cryptography Penetration Testing
- 100.3 Review
- 100.4 Conclusion
Module 21 – CEH v11 Ethical Hacker Course Intro
- 21.1 About this course – Ethical Hacker
- 21.2 About the Instructor
Module 22 – CEH v11 Intro to Footprinting
- 22.1 Footprinting Concepts
- 22.2 Footprinting Methodology
- 22.3 OSINT Tools
- 22.4 Advanced Google Search
- 22.5 Whois Footprinting
- 22.6 Activity – Performing a Whois Lookup
Module 23 – CEH v11 Footprinting Network Services
- 23.1 DNS Footprinting
- 23.2 Website Footprinting
- 23.3 Email Footprinting
- 23.4 Network Footprinting
- 23.5 Footprinting through Social Networking Sites
Module 24 – CEH v11 Defend Against Footprinting
- 24.1 Competitive Intelligence Gathering
- 24.2 Footprinting Countermeasures
- 24.3 Footprinting Penetration Testing
- 24.4 Review
Module 25 – CEH v11 Intro to Scanning
- 25.1 Scanning Concepts
- 25.2 ICMP Discovery Scans
- 25.3 Other Discovery Scans
Module 26 – CEH v11 Port Scanning
- 26.1 Ports
- 26.2 TCP Flags and Handshakes
- 26.3 TCP Scan Types
- 26.4 Other Scanning Techniques
Module 27 – CEH v11 Vulnerability Scanning
- 27.1 Banner Grabbing
- 27.2 Vulnerability Scanning
- 27.3 SSDP Scanning
Module 28 – CEH v11 NMAP
- 28.1 Nmap
- 28.2 Common Nmap Scans
- 28.3 Nmap Options
- 28.4 Nmap Stealth Scans
- 28.5 Hping and Other Scanners
Module 29 – CEH v11 Firewalls and Intrusion Detection
- 29.1 Firewall Types
- 29.2 Firewall Features
- 29.3 Firewall Features Part 2
- 29.4 Firewall Configurations
- 29.5 Intrusion Detection and Prevention
Module 30 – CEH v11 Evading Detection
- 30.1 Firewall and IDS Evasion
- 30.2 Firewall and IDS Evasion Part 2
- 30.3 Firewalking
- 30.4 Probing a Firewall
- 30.5 Probing a Firewall Part 2
Module 31 – CEH v11 Proxies and VPNs
- 31.1 Proxies
- 31.2 VPNs
- 31.3 Tor
- 31.4 Scanning Countermeasures
- 31.5 Scanning Penetration Testing
- 31.6 Review
Module 32 – CEH v11 Accessing Vulnerability
- 32.1 Vulnerability Assessment Overview
- 32.2 Vulnerability Scoring Systems
- 32.3 Vulnerability Assessment Tools
Module 33 – CEH v11 Vulnerability Research
- 33.1 Scanner Output and Reports
- 33.2 Vulnerability Research
- 33.3 Review
Module 34 – CEH v11 Intro to Enumeration
- 34.1 Enumeration Concepts
- 34.2 Enumeration Techniques and Tools
- 34.3 Service and Application Enumeration
- 34.4 SMB and NetBIOS Enumeration
Module 35 – CEH v11 Service Enumeration
- 35.1 SNMP Enumeration
- 35.2 LDAP Enumeration
- 35.3 DNS Enumeration
- 35.4 SMTP Enumeration
- 35.5 NTP Enumeration
Module 36 – CEH v11 Advanced Enumeration
- 36.1 Remote Connection Enumeration
- 36.2 File Transfer Enumeration
- 36.3 VoIP Enumeration
- 36.4 IPSEC Enumeration
- 36.5 IPv6 Enumeration
- 36.6 BGP Enumeration
Module 37 – CEH v11 Command Line Enumeration
- 37.1 Windows Command Line Enumeration
- 37.2 Linux Command Line Enumeration
- 37.3 Linux Command Line Enumeration Part 2
Module 38 – CEH v11 Defending Against Enumeration
- 38.1 Enumeration Countermeasures
- 38.2 Enumeration Countermeasures Part 2
- 38.3 Enumeration Penetration Testing
- 38.4 Review
Module 39 – CEH v11 Intro to System Hacking
- 39.1 System Hacking Concepts
- 39.2 System Hacking Tools and Frameworks
- 39.3 Searchsploit
- 39.4 Compiling and Running Exploits
Module 40 – CEH v11 System Hacking with Metasploit
- 40.1 Metasploit
- 40.2 Metasploit Search
- 40.3 Metasploit Exploits and Payloads
- 40.4 Metasploit Meterpreter
- 40.5 Metasploit Connectivity
- 40.6 Metasploit Impersonation and Migration
Module 41 – CEH v11 Further Attacking a Compromised System
- 41.1 Netcat
- 41.2 Pivoting
- 41.3 Netcat Relays
- 41.4 Metasploit Post Exploitation Modules
- 41.5 Common Operating System Exploits
Module 42 – CEH v11 Hacking an Operating System
- 42.1 Hacking Windows
- 42.2 Hacking Linux
- 42.3 Network Service Exploits
- 42.4 Password Attacks
Module 43 – CEH v11 Password Cracking Overview
- 43.1 Dictionary Attack
- 43.2 Brute Force Attack
- 43.3 Password Spraying
- 43.4 Rainbow Tables
Module 44 – CEH v11 Performing Password Attacks
- 44.1 Network Service Password Attacks
- 44.2 Password Cracking Tools
- 44.3 Online Password Cracking Sites
- 44.4 Windows Password Cracking
- 44.5 Linux Password Cracking
- 44.6 Other Methods for Obtaining Passwords
Module 45 – CEH v11 Using Exploits
- 45.1 Keylogging
- 45.2 Spyware
- 45.3 Rootkits
- 45.4 Buffer Overflows
- 45.5 Privilege Escalation
- 45.6 Hiding Files
Module 46 – CEH v11 Hiding Information
- 46.1 Alternate Data Streams
- 46.2 Steganography
- 46.3 Creating and Maintaining Remote Access
- 46.4 Hiding Evidence
Module 47 – CEH v11 Covering Tracks
- 47.1 Covering Tracks in Windows
- 47.2 Covering Tracks in Linux
- 47.3 System Hacking Counter-Measures
- 47.4 System Hacking Penetration Testing
- 47.5 Review
Module 48 – CEH v11 Malware Overview
- 48.1 Intro to Malware
- 48.2 Virus Overview
- 48.3 Virus Types
- 48.4 Self-Hiding Viruses
- 48.5 Worms
- 48.6 Trojans
- 48.7 Trojan Types
- 48.8 RATS
Module 49 – CEH v11 Hacking With Malware
- 49.1 Ransomware
- 49.2 Botnets
- 49.3 Covert Channel Trojans
- 49.4 Banking Trojans
- 49.5 Rootkits
Module 50 – CEH v11 Creating Malware
- 50.1 Other Malware
- 50.2 Malware Makers
- 50.3 Dropper and Stage Creation
- 50.4 Exploit Kits
Module 51 – CEH v11 Detecting Malware
- 51.1 Malware Detection
- 51.2 Malware Detection Part 2
- 51.3 Malware Analysis
Module 52 – CEH v11 Defending Against Malware
- 52.1 Malware Reverse Engineering
- 52.2 Malware Countermeasures
- 52.3 Malware Penetration Testing
- 52.4 Review
Module 53 – CEH v11 Sniffing
- 53.1 Sniffing Concepts
- 53.2 Types of Sniffing
- 53.3 Sniffing Protocols
- 53.4 Sniffing Tools
Module 54 – CEH v11 Spoofing and MITM
- 54.1 ARP
- 54.2 ARP Spoofing
- 54.3 MITM
- 54.4 MAC Attacks
- 54.5 MAC Spoofing
- 54.6 DHCP Attacks
Module 55 – CEH v11 Defending Against Poisoning and Sniffing
- 55.1 Name Resolution Poisoning
- 55.2 VLAN Hopping
- 55.3 Sniffing Counter Measures
- 55.4 Sniffing Penetration Testing
- 55.5 Review
Module 56 – CEH v11 Social Engineering
- 56.1 Social Engineering Concepts
- 56.2 Social Engineering Techniques
- 56.3 Social Engineering Examples
- 56.4 Social Engineering Tools
Module 57 – CEH v11 Defending Against Social Engineering
- 57.1 Social Media
- 57.2 Identity Theft
- 57.3 Insider Threats
- 57.4 Social Engineering Countermeasures
- 57.5 Social Engineering Penetration Testing
- 57.6 Review
Module 58 – CEH v11 Denial-of-Service
- 58.1 DoS-DDoS Concepts
- 58.2 Volumetric Attacks
- 58.3 Fragmentation Attacks
- 58.4 State Exhaustion Attacks
- 58.5 Application Layer Attacks
Module 59 – CEH v11 Advanced DoS Attacks
- 59.1 Protocol Attacks
- 59.2 Other Attacks
- 59.3 Botnets
Module 60 – CEH v11 Defending Against Denial-of-Service
- 60.1 DoS-DDoS Attack Tools
- 60.2 DoS-DDoS Countermeasures
- 60.3 Dos Penetration Testing
- 60.4 Review
Module 1 – CEH v11 Foundations Course Introduction
- 1.1 About this course: CEH Foundations
- 1.2 About the Instructor
Module 2 – CEH v11 Introduction To Networking
- 2.1 Networking Overview
- 2.2 Network Scope
- 2.3 Network Addressing
- 2.4 Activity – Examining Network Addressing
Module 3 – CEH v11 Lan Components
- 3.1 Protocols, Ports, Sockets
- 3.2 Network Topologies
- 3.3 LAN Devices
- 3.4 LAN Devices Part 2
- 3.5 VLANs
- 3.6 Activity – Examining Ports and Sockets
- 3.7 Activity – Examining Switches and VLANs
Module 4 – CEH v11 Routing and Network Access
- 4.1 Routers
- 4.2 Layer 3 Switches
- 4.3 Modems and Remote Access
- 4.4 Firewalls and Proxies
- 4.5 Activity – Examining Routing
- 4.6 Activity – Examining VLAN Routing
- 4.7 Activity – Examining Firewall Rules
Module 5 – CEH v11 Intrusion Detection and Network Layers
- 5.1 IDS and IPS
- 5.2 OSI Model
- 5.3 TCP-IP
- 5.4 Activity – Examining Network Layers
Module 6 – CEH v11 Networking Protocols and Addressing
- 6.1 Layer 4 Protocols
- 6.2 Layer 3 Protocols
- 6.3 Layer 2 Protocols
- 6.4 IP Addressing
- 6.5 Subnetting
- 6.6 DHCP
- 6.7 Activity – Examining TCP
- 6.8 Activity – Examining UDP
- 6.9 Activity – Examining IP
- 6.10 Activity – Examining ICMP
- 6.11 Activity – Examining ARP
Module 7 – CEH v11 Network Services
- 7.1 DNS
- 7.2 DNS Records
- 7.3 NTP
- 7.4 Authentication
- 7.5 Biometrics
- 7.6 Activity – Examining DNS
- 7.7 Activity – Examining DNS Records
Module 8 – CEH v11 Access Control
- 8.1 Local Authentication
- 8.2 Directory Service Authentication
- 8.3 Extending Authentication
- 8.4 Authorization
- 8.5 Activity – Testing Access Control
Module 9 – CEH v11 Intro to Linux
- 9.1 Linux Overview
- 9.2 Linux File System
- 9.3 Linux Core Commands
- 9.4 Linux Search and Read Commands
- 9.5 Activity – Exploring Linux
- 9.6 Activity – Using Linux Core Commands
- 9.7 Activity – Using Linux Search Commands
- 9.8 Activity – Using Linux Read Commands
Module 10 – CEH v11 Configuring Linux
- 10.1 Linux File Permissions
- 10.2 Linux Special Permissions
- 10.3 Linux Configuration
- 10.4 Linux Packages
- 10.5 Linux User Management
Module 11 – CEH v11 Practicing Linux Configuration
- 11.1 Activity – Setting Linux Permissions
- 11.2 Activity – Setting Linux Special Permissions
- 11.3 Activity – Managing Packages in Kali Linux
- 11.4 Activity – Managing Users and Groups in Linux
Module 12 – CEH v11 Managing Linux
- 12.1 Linux Job Scheduling
- 12.2 Linux File, Directory, and Download Commands
- 12.3 Linux System Commands
- 12.4 Linux Network Management
- 12.5 Linux Firewall
Module 13 – CEH v11 Practicing Linux Management
- 13.1 Activity – Scheduling Tasks in Linux
- 13.2 Activity – Using Linux File, Directory, and Download Commands
- 13.3 Activity – Using Linux Edit and Archive Commands
- 13.4 Activity – Compiling Malicious Code
- 13.5 Activity – Using Linux Process and System Commands
- 13.6 Activity – Using Linux Disk, Hardware, and Network Commands
Module 14 – CEH v11 Intro to Windows
- 14.1 Windows Overview
- 14.2 Windows Registry
- 14.3 Windows Security
Module 15 – CEH v11 Windows Commands
- 15.1 Windows Commands
- 15.2 Windows Admin Commands
- 15.3 Windows Network Commands
- 15.4 Windows Run Line Commands
- 15.5 Windows PowerShell
Module 16 – CEH v11 Practicing Windows Commands
- 16.1 Activity – Using Windows Built-in Commands
- 16.2 Activity – Using Windows Task Commands
- 16.3 Activity – Using Windows Admin Commands
- 16.4 Activity – Using Windows Network Commands
- 16.5 Activity – Using Windows PowerShell
- 16.6 Networking and OS Penetration Testing
- 16.7 Review
Module 17 – CEH v11 Intro to Hacking
- 17.1 Information Security Overview
- 17.2 Hacking Concepts
- 17.3 Ethical Hacking Concepts
- 17.4 Penetration Testing
- 17.5 Penetration Testing Part 2
- 17.6 Activity – Performing a Static Code Review
Module 18 – CEH v11 Information Security
- 18.1 Cyber Kill Chain Concepts
- 18.2 Activity – Performing Weaponization
- 18.3 Information Security
- 18.4 Security Policies
- 18.5 Security Controls
- 18.6 Access Control
Module 19 – CEH v11 Protecting Data
- 19.1 Data Protection
- 19.2 Backup Sites
- 19.3 Vulnerability Management
- 19.4 SIEM
- 19.5 Risks
Module 20 – CEH v11 Managing Risk
- 20.1 Risk Management
- 20.2 Incident Handling
- 20.3 Information Security Laws and Standards
- 20.4 Activity – Assessing Risk
- 20.5 Ethical Hacking Penetration Testing
- 20.6 Review
- 20.7 Conclusion
This course is included in all of our team and individual training plans. Choose the option that works best for you.
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.
Frequently Asked Questions.
What is the scope of the Certified Ethical Hacker (CEH) Version 11 exam?
The CEH v11 exam evaluates a candidate’s understanding of the fundamental concepts and practical skills necessary to identify, exploit, and remediate security vulnerabilities in networks and systems. It covers a broad range of topics, including reconnaissance techniques, scanning and enumeration, vulnerability analysis, exploitation, post-exploitation, and covering tracks. The exam also emphasizes the importance of ethical hacking principles, legal considerations, and security controls.
The exam encompasses key domains such as network security, web application security, wireless security, mobile security, IoT security, and cloud security. It tests your knowledge of various tools like Nmap, Metasploit, Wireshark, and Burp Suite, as well as attack techniques like SQL injection, cross-site scripting, and Wi-Fi cracking. Preparing for the CEH v11 exam ensures you develop a comprehensive understanding of how cyber attackers operate and how to defend against them effectively.
What topics are covered in the CEH v11 training course?
The CEH v11 training course provides in-depth coverage of multiple cybersecurity domains essential for ethical hacking. Key topics include reconnaissance and footprinting, scanning and enumeration, system hacking, malware threats, social engineering, and vulnerability analysis. The course also delves into exploitation techniques, post-exploitation, and maintaining access, alongside covering defensive measures and countermeasures.
Additional focus areas include web application security testing (such as SQL injection and cross-site scripting), wireless network attacks (like WPA2 cracking and Evil Twin attacks), mobile hacking, IoT device security, and cloud infrastructure vulnerabilities. Hands-on labs reinforce these topics with real-world scenarios, enabling learners to apply their knowledge ethically and safely. Mastery of these areas prepares students to conduct comprehensive penetration tests and improve organizational security posture.
How can earning the CEH v11 certification benefit my cybersecurity career?
Achieving the CEH v11 certification significantly enhances your credibility and marketability as a cybersecurity professional. It demonstrates your expertise in identifying security weaknesses before malicious hackers can exploit them, making you a valuable asset in organizations’ security teams. Certified ethical hackers are in high demand, especially as cyber threats become more sophisticated and prevalent.
This certification can open doors to advanced roles such as penetration tester, security analyst, security consultant, or network security engineer. It also provides a solid foundation for pursuing higher certifications like OSCP, CISSP, or CISA. Moreover, CEH professionals are often involved in critical security initiatives, risk assessments, and incident response, enabling career growth and higher earning potential in the cybersecurity field.
What strategies should I use to prepare effectively for the CEH v11 exam?
Effective preparation for the CEH v11 exam involves a combination of theoretical study, practical hands-on experience, and exam-focused review. Start by thoroughly understanding each domain outlined in the exam objectives, ensuring you grasp both concepts and tools. Engage with simulated labs and real-world scenarios to develop practical skills essential for ethical hacking.
Utilize official study guides, online courses, and practice exams to familiarize yourself with the question format and identify knowledge gaps. Joining study groups or online forums can also provide valuable insights and peer support. Regularly review key topics such as reconnaissance techniques, vulnerability assessment, and exploitation methods to reinforce your understanding. Consistent, hands-on practice combined with comprehensive review will greatly increase your chances of passing the CEH v11 exam confidently.
Is prior experience necessary for enrolling in the CEH v11 course?
While prior experience in networking, operating systems, and basic security concepts is highly recommended, it is not strictly mandatory to enroll in the CEH v11 course. A foundational understanding of TCP/IP, Linux/Windows OS, and security principles will help you grasp advanced hacking techniques more effectively.
This course is designed to build upon existing knowledge, making it suitable for IT professionals such as security analysts, network administrators, and penetration testers who already have some cybersecurity background. If you are new to cybersecurity, it’s advisable to review foundational topics first or combine this course with introductory materials to maximize learning outcomes and ensure you are well-prepared to understand the more complex hacking and defense techniques covered.