Certified Ethical Hacker Training For Certification – CEH V12 (Deal) - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

Certified Ethical Hacker Training for Certification – CEH v12 (Deal)

Certified Ethical Hacker v12 is the latest iteration of EC-Council’s Certified Ethical Hacker v12 series. In this course you will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed. Every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

Certified Ethical Hacker Certification

CEH 12 is the latest iteration of EC-Council’s Certified Ethical Hacker version 12 series allowing you to learn what is needed to become obtain certified ethical hacker certification. In this course you will research, discover and scan targets, analyze cyber security, vulnerabilities and test attack vectors, methods and tools related to various ethical hacking concepts and techniques. The certification is focused on teaching network and information security professionals and disciplines.

In this course, you will solve the challenge of breaking into a target organization or network, collect evidence of success, and escape unnoticed. Every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based, ethical hacker and ethical hacking, certification tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks, and hard-learned lessons. Students are provided with an extensive setup guide to create a completely virtual environment.  This allows you to gain hands-on experience to better learn ethical hacking skills, and prepare for ethical hacker ethical hacking certification,.  The course also combines practice exam test questions to reinforce your retention of the training.

You will learn to find security vulnerabilities in target operating systems., used to hack Windows and Linux systems, enumerate targets, steal information, make cloud attacks, hide secret messages in plain sight, and cover their tracks. You will crack passwords, intercept transmissions, use malware to compromise web services, operating systems, and social networking sites, engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service your way to “pwning” a target*.

Along with such venerable tools as nmap and netcat, you will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. You will search Exploit-DB, GitHub, and other sites for the latest exploit code, using those hacks when existing tools just won’t do.  In the end, you will feel confident to consider yourself a skilled professional.  This course will help you know what you need to know to help combat malicious and ethical hackers, and the malevolent and successful ethical hacker.  A key factor to being an effective Certified Ethical Hacker (CEH) is to be able to implement effective and appropriate security controls to detect and keep those malicious hackers and ethical hackers away from and out of your network.

* To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.

Why you should take Ethical Hacking Training?

Whether you are seeking your ethical hacking certification, planning for your ethical hacking certification exam  or just wanting to explore more about ethical hacking and hacking concepts, this online training for CEH v12 puts you in the driver’s seat of penetration testing. In addition to covering all of the relevant CEH 312-50 exam objectives, you will practice top ethical hacking courses extensively. For those truly seeking a career in cybersecurity, view our extensive blog, “Cybersecurity Career Path: Skills, Roles & Opportunities“.  Getting your CEH credential will afford you the baseline knowledge of cyber security threats necessary to move forward in your ethical hacking career.

Combine CEH with PenTest+ and Become A Penetration Tester

Expanding even further, ITU also offers an extensive PenTest course designed to take your own cyber security and information security skills to the max level by learning to be a top-notch penetration tester.  Becoming a penetration tester is an excellent career choice in cyber security and information security, as you learn to find vulnerabilities in systems that enable you gain access to networks and data.  A penetration tester can easily earn a 6-figure salary in today’s IT environment.

Who Benefits from taking our Online Training Ethical Hacking Courses?

This course is intended for IT security professionals, Cybersecurity professionals and those with cyber range and specialized skills focused on security professionals in the following IT careers:

  • Ethical hacker

  • Cybersecurity Analyst

  • Cybersecurity Consultant

  • White Hat Hacker

  • System Administrator

  • Network Administrator

  • Engineer

  • Web manager

  • Security Analyst

  • Security Consultant

  • Auditors

  • Security Professionals

  • and anyone else working in the cybersecurity industry.

Prerequisites For Our CEH Training Course:

The CEH cybersecurity certifications are an excellent course for those with some prior knowledge of both Networking and general web and network security principles.  While there are no requirements for taking this course, it is highly recommended that you have already completed the CompTIA Network+ and CompTIA Security+ courses, both of which are taught from a vendor-neutral perspective or have equivalent knowledge. You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), and 100 GB of free disk space, running Windows 10 Professional or later.

 

FAQs About Certified Ethical Hacker Training for the Certification Exam

Is Certified Ethical Hacker worth it?

Does it really work? Short answers to these questions are clear: ‘Yes. Certified Ethics Hackers are an excellent investment that will only help you gain valuable skills. CEH provides an important qualification for your future career in addition to technical knowledge.

How do I become CEH certified?

To become CEH a certified ethical one, you can follow these steps:u003cbru003e1. Take the Certified Ethical Hacker (CEH) course certification, which typically involves five days of trainingu003cbru003e2. Learn about the latest cybersecurity and information security threats, and develop the practical hacking skills needed to work as an a certified ethical hackeru003cbru003e3. Pass the CEH exam which consists of a total of 125 multiple-choice questionsu003cbru003e4. Maintain your certification by earning 120 Continuing Professional Education (CPE) credits within three yearsu003cbru003e5. You can earn CPE credits by attending conferences, writing research papers, teaching training classes in a related domain, reading materials on related subject matters, and attending webinars

How long does it take to become a Certified Ethical Hacker?

The Certified Ethical Hacker (CEH) certification exam, is a 4-hour exam with 125 multiple-choice questions. To become a Certified Ethical Hacker, you can take a 5-day training course and then complete the certification exam. The length of time it takes to prepare for the ceh certification training and exam can vary depending on your existing knowledge and experience, but it could take anywhere from a week to several months. To take the CEH certification exam, you need to fulfill one of two prerequisites and be over 18 years old

How much does the CEH certification cost?

The cost of the Certified Ethical Hacker (CEH) certification varies depending on the type of training you choose. u003cstrongu003eYu003cemu003eou can get started with the ITU Online course foru003c/emu003eu003c/strongu003e u003cstrongu003eu003cemu003eCertified Ethical Hacker Certification Training –u003c/emu003e u003c/strongu003eThe InfoSec Institute estimates that the average salary for CEH holders is $83,591, with most holders earning between $45K and $129K per year.

How long is the CEH certification valid, and how can I maintain it?

The CEH certification is valid for three years from the date of certification. To maintain your certification, you are required to earn Continuing Professional Education (CPE) credits. These credits can be obtained through various activities such as attending training programs, participating in webinars, writing articles, and engaging in professional development activities related to ethical hacking and information security. By earning a sufficient number of CPE credits within the three-year period, you can renew your CEH certification.

Certified Ethical Hacker Training for Certification – CEH v12 (Deal)
 

Certified Ethical Hacker (CEH) v12 Course Content

Module 1 - Introduction To Ethical Hacking

  •    1.0 Introduction to CEH v12
  •    1.1 Elements of Security
  •    1.2 Cyber Kill Chain
  •    1.3 MITRE ATT&CK Framework
  •    1.3.1 Activity - Researching the MITRE ATTACK Framework
  •    1.4 Hacking
  •    1.5 Ethical Hacking
  •    1.6 Information Assurance
  •    1.7 Risk Management
  •    1.8 Incident Management
  •    1.9 Information Security Laws and Standards
  •    1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  •    2.1 Footprinting Concepts
  •    2.1 Footprinting Concepts
  •    2.2 OSINT Tools
  •    2.2 OSINT Tools
  •    2.2.1 ACTIVITY - Finding Internet-Connected Devices with Shodan
  •    2.2.1 Activity - Conduct OSINT with OSR Framework
  •    2.2.2 ACTIVITY - Performing OSINT with theHarvester
  •    2.2.2 Activity - OSINT with theHarvester
  •    2.3 Advanced Google Search
  •    2.2.3 Activity - Add API Keys to theHarvester
  •    2.3.1 ACTIVITY - Google Hacking
  •    2.2.4 Activity - Extract Document Metadata with FOCA
  •    2.4 Whois Footprinting
  •    2.2.5 Activity - Extract Document Metadata with FOCA
  •    2.4.1 ACTIVITY - Footprinting with WHOIS
  •    2.3 Advanced Google Search
  •    2.5 DNS Footprinting
  •    2.3.1 Activity - Google Hacking
  •    2.5.1 ACTIVITY - Enumerating DNS
  •    2.4 Whois Footprinting
  •    2.6 Website Footprinting
  •    2.4.1 Activity - Conducting Whois Research
  •    2.7 Email Footprinting
  •    2.5 DNS Footprinting
  •    2.8 Network Footprinting
  •    2.5.1 Activity - Query DNS with NSLOOKUP
  •    2.8.1 ACTIVITY - Tracing a Network Path with Traceroute
  •    2.6 Website Footprinting
  •    2.9 Social Network Footprinting
  •    2.6.1 Activity - Fingerprint a Webserver with ID Serve
  •    2.10 Enhanced OSINT
  •    2.6.2 Activity - Extract Data from Websites
  •    2.11 Footprinting-and-Reconnaissance-Countermeasures
  •    2.6.3 Activity - Mirror a Website with HTTrack
  •    2.12 Footprinting and Reconnaissance Review
  •    2.7 Email Footprinting
  •    2.7.1 Activity - Trace a Suspicious Email
  •    2.8 Network Footprinting
  •    2.9 Social Network Footprinting
  •    2.10 Footprinting and Reconnaissance Countermeasures
  •    2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  •    3.1 Scanning Concepts
  •    3.1 Scanning Concepts
  •    3.2 Discovery Scans
  •    3.2 Discovery Scans
  •    3.2.1 Activity - ICMP ECHO and ARP Pings
  •    3.3 Port Scans
  •    3.2.2 Activity - Host Discovery with Angry IP Scanner
  •    3.4 Other Scan Types
  •    3.3 Port Scans
  •    3.5 Scanning Tools
  •    3.3.1 Activity - Port Scan with Angry IP Scanner
  •    3.6 NMAP
  •    3.4 Other Scan Types
  •    3.6.1 ACTIVITY - Port Scanning and Fingerprinting with NMAP
  •    3.7 Firewall and IDS Evasion
  •    3.5 Scanning Tools
  •    3.8 Proxies
  •    3.5.1 Activity - Hping3 Packet Crafting
  •    3.9 AI Enhanced SCANNING Tools
  •    3.5.2 Activity - Fingerprinting with Zenmap
  •    3.10 Scanning counter-measures
  •    3.6 NMAP
  •    3.11 Scanning Networks Review
  •    3.6.1 Activity - Nmap Basic Scans
  •    3.6.2 Activity - Host Discovery with Nmap
  •    3.6.3 - Activity - Nmap Version Detection
  •    3.6.4 Activity - Nmap Idle (Zombie) Scan
  •    3.6.5 Activity - Nmap FTP Bounce Scan
  •    3.6.6 - Activity - NMAP Scripts
  •    3.7 Firewall and IDS Evasion
  •    3.7.1 Activity - Nmap Advanced Scans
  •    3.8 Proxies
  •    3.9 Scanning Countermeasures
  •    3.10 Scanning Networks Review

Module 4: Enumeration

  •    4.1 Enumeration Overview
  •    4.1 Enumeration Overview
  •    4.2 SMB_NetBIOS_Enumeration
  •    4.2 SMB_NetBIOS_Enumeration
  •    4.2.1 Activity - Enumerate NetBIOS Information with Hyena
  •    4.3 File Transfer Enumeration
  •    4.3 File Transfer Enumeration
  •    4.4 WMI Enumeration
  •    4.4 WMI Enumeration
  •    4.5 SNMP Enumeration
  •    4.6 LDAP Enumeration
  •    4.4.1 - Activity - Enumerating WMI with Hyena
  •    4.7 DNS Enumeration
  •    4.5 SNMP Enumeration
  •    4.8 SMTP Enumeration
  •    4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect
  •    4.8.1 ACTIVITY - SMTP Enumeration
  •    4.6 LDAP Enumeration
  •    4.9 Remote Connection Enumeration
  •    4.7 DNS Enumeration
  •    4.10 Website Enumeration
  •    4.8 SMTP Enumeration
  •    4.8.1 Activity - Enumerate Email Users with SMTP
  •    4.10.1 ACTIVITY - Enumerating Website Directories
  •    4.9 Remote Connection Enumeration
  •    4.11 Local User and Active Directory Enumeration
  •    4.10 Website Enumeration
  •    4.12 Other Enumeration Types
  •    4.10.1 Activity - Enumerate a Website with DirBuster
  •    4.13 Enumeration Using AI
  •    4.11 Other Enumeration Types
  •    4.14 Enumeration Countermeasures and Review
  •    4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  •    5.1 Vulnerability Scanning
  •    5.1 Vulnerability Scanning
  •    5.1.1 ACTIVITY - Vulnerability Scanning with OpenVAS
  •    5.1.1 Vulnerability Scanning with OpenVAS
  •    5.2 Vulnerability Assessment
  •    5.2 Vulnerability Assessment
  •    5.3 AI Assisted Vulnerability Assessment
  •    5.3 Vulnerability Analysis Review
  •    5.4 Vulnerability Analysis Review

Module 6: System Hacking

  •    6.1 System Hacking Concepts
  •    6.1 System Hacking Concepts
  •    6.2 Common OS Exploits
  •    6.2 Common Operating System Exploits
  •    6.3 Buffer Overflows
  •    6.3 Buffer Overflows
  •    6.3.1 Activity - Performing a Buffer Overflow
  •    6.4 System Hacking Tools and Frameworks
  •    6.4 System Hacking Tools and Frameworks
  •    6.5 Metasploit
  •    6.4.1 Activity - Hack a Linux Target from Start to Finish
  •    6.5.1 ACTIVITY - Hacking with Metasploit
  •    6.6 Meterpreter
  •    6.5 Metasploit
  •    6.6.1 ACTIVITY - Having Fun with Meterpreter
  •    6.5.1 Activity - Get Started with Metasploit
  •    6.7 Keylogging_and_Spyware-
  •    6.6 Meterpreter
  •    6.8 Netcat
  •    6.7 Keylogging and Spyware
  •    6.8.1 ACTIVITY - Using Netcat
  •    6.7.1 Activity - Keylogging with Meterpreter
  •    6.9 Windows Exploitation
  •    6.8 Netcat
  •    6.8.1 Activity - Using Netcat
  •    6.10 Windows Post- Exploitation
  •    6.9 Hacking Windows
  •    6.10.1 ACTIVITY - Windows Post Exploitation with Eternal Blue
  •    6.9.1 Activity - Hacking Windows with Eternal Blue
  •    6.10.2 ACTIVITY - Escalating Privilege with Token Passing
  •    6.10 Hacking Linux
  •    6.11 Linux Exploitation
  •    6.11.1 ACTIVITY - Pwn a Linux Target from Start to Finish
  •    6.11 Password Attacks
  •    6.12 Linux Post-Exploitation
  •    6.11.1 Activity - Pass the Hash
  •    6.13 Password Attacks
  •    6.11.2 Activity - Password Spraying
  •    6.13.1 ACTIVITY - Pass-the-Hash
  •    6.12 Password Cracking Tools
  •    6.13.2 ACTIVITY - Password Spraying with Hydra
  •    6.13 Windows Password Cracking
  •    6.14 Password Cracking Tools
  •    6.13.1 Activity - Cracking Windows Passwords
  •    6.13.2 Activity - Cracking Password Hashes with Hashcat
  •    6.14.1 ACTIVITY - Password Cracking with Hashcat
  •    6.14 Linux Password Cracking
  •    6.14.2 ACTIVITY - Brute Forcing with Medusa
  •    6.15 Other Methods for Obtaining Passwords
  •    6.15 Windows Password Cracking
  •    6.16 Network Service Attacks
  •    6.16 Attacking Network Services
  •    6.16.1 Activity - Brute Forcing a Network Service with Medusa
  •    6.16.1 ACTIVITY - Cracking Linux Passwords with John-the-Ripper
  •    6.17 Other Methods for Obtaining Passwords
  •    6.17 Post Exploitation
  •    6.18 Network Service Attacks
  •    6.18 Pivoting
  •    6.19 Lateral Movement
  •    6.18.1 & 6.18.2 Activity - Pivoting Setup and Attack
  •    6.19.1 ACTIVITY - Preparing to Pivot
  •    6.19 Maintaining Access
  •    6.19.2 ACTIVITY - Lateral Movement through Pivoting
  •    6.19.1 Activity - Persistence
  •    6.20 Persistence
  •    6.20 Hiding Data
  •    6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography
  •    6.20.1 ACTIVITY - Creating a Persistent Netcat Back Door
  •    6.21 Covering Tracks
  •    6.20.2 ACTIVITY - APT Persistence
  •    6.21.1 Activity - Clearing Tracks in Windows
  •    6.21 Hiding Data
  •    6.21.2 Activity - View and Clear Audit Policies with Auditpol
  •    6.21.1 ACTIVITY - Hiding Data with Steganography
  •    6.22 System Hacking Countermeasures
  •    6.22 Covering Tracks
  •    6.22.1 ACTIVITY - Cover Tracks with Log Tampering
  •    6.23 System Hacking Review
  •    6.23 Side-Channel-Attacks
  •    6.24 AI-Powered Vulnerability Exploitation Tools
  •    6.25 System Hacking Countermeasures
  •    6.26 System Hacking Review

Module 7: Malware Threats

  •    7.1 Malware Overview
  •    7.1 Malware Overview
  •    7.2 Viruses
  •    7.2 Viruses
  •    7.3 Trojans
  •    7.3 Trojans
  •    7.4 Rootkits
  •    7.3.1 Activity - Deploying a RAT
  •    7.5 Other Malware
  •    7.4 Rootkits
  •    7.6 Advanced Malware Threats
  •    7.5 Other Malware
  •    7.7 Malware Makers
  •    7.6 Advanced Persistent Threat
  •    7.7.1 ACTIVITY - Creating a Malware Dropper and Handler
  •    7.7 Malware Makers
  •    7.8 Malware Deployment
  •    7.7.1 Activity - Creating a Malware Dropper and Handler
  •    7.9 Malware Detection
  •    7.8 Malware Detection
  •    7.10 Malware Analysis
  •    7.9 Malware Analysis
  •    7.10.1 ACTIVITY - Analyzing the SolarWinds Orion Hack
  •    7.9.1 Activity - Performing a Static Code Review
  •    7.11 AI and Malware
  •    7.9.2 Activity - Analyzing the SolarWinds Orion Hack
  •    7.12 Malware Countermeasures
  •    7.10 Malware Countermeasures
  •    7.13 Malware Threats Review
  •    7.11 Malware Threats Review

Module 8: Sniffing

  •    8.1 Network Sniffing
  •    8.2 Sniffing Tools
  •    8.2.1 Activity- Sniffing HTTP with Wireshark
  •    8.2.2 Activity - Capturing Files from SMB
  •    8.3 ARP and MAC Attacks
  •    8.3.1 Activity - Performing an MITM Attack with Ettercap
  •    8.4 Name Resolution Attacks
  •    8.4.1 Activity - Spoofing Responses with Responder
  •    8.5 Other Layer 2 Attacks
  •    8.6 Sniffing Countermeasures
  •    8.7 Sniffing Review

Module 9: Social Engineering

  •    9.1 Social Engineering Concepts
  •    9.1 Social Engineering Concepts
  •    9.2 Social Engineering Techniques
  •    9.2 Social Engineering Techniques
  •    9.3 Social Engineering Tools
  •    9.2.1 Activity - Deploying a Baited USB Stick
  •    9.3.1 ACTIVITY - Phishing for Credentials
  •    9.2.2 Activity - Using an O.MG Lightning Cable
  •    9.3.2 ACTIVITY - OMG Cable Baiting
  •    9.3 Social Engineering Tools
  •    9.4 Social Media, Identity Theft, Insider Threats
  •    9.3.1 Activity - Phishing for Credentials
  •    9.5 Social Engineering and AI
  •    9.4 Social Media, Identity Theft, Insider Threats
  •    9.6 Social Engineering Countermeasures
  •    9.5 Social Engineering Countermeasures
  •    9.7 Social Engineering Review
  •    9.6 Social Engineering Review

Module 10: Denial-of-Service

  •    10.1 DoS-DDoS Concepts
  •    10.1 DoS-DDoS Concepts
  •    10.2 Volumetric Attacks
  •    10.2 Volumetric Attacks
  •    10.3 Fragmentation Attacks
  •    10.3 Fragmentation Attacks
  •    10.4 State Exhaustion Attacks
  •    10.4 State Exhaustion Attacks
  •    10.5 Application Layer Attacks
  •    10.5 Application Layer Attacks
  •    10.5.1 ACTIVITY - Conducting a Slowloris DDoS Attack
  •    10.5.1 Activity - Performing a LOIC Attack
  •    10.6 Other Attacks
  •    10.5.2 Activity - Performing a HOIC Attack
  •    10.7 DoS Tools
  •    10.5.3 Activity - Conducting a Slowloris Attack
  •    10.7.1 ACTIVITY - Performing a HOIC DDoS Attack
  •    10.6 Other Attacks
  •    10.8 DoS Countermeasures
  •    10.7 DoS Tools
  •    10.9 DoS Review
  •    10.8 DoS Countermeasures
  •    10.9 DoS Review

Module 11: Session Hijacking

  •    11.1 Session Hijacking
  •    11.1 Session Hijacking
  •    11.2 Compromising a Session Token
  •    11.2 Compromising a Session Token
  •    11.3 XSS
  •    11.3 XSS
  •    11.3.1 ACTIVITY - Web Session Hijacking with XSS
  •    11.4 CSRF
  •    11.4 CSRF
  •    11.5 Other Web Hijacking Attacks
  •    11.5 Other Web Hijacking Attacks
  •    11.6 Network-Level Session Hijacking
  •    11.6 Network-Level Session Hijacking
  •    11.6.1 Activity - Hijack a Telnet Session
  •    11.7 Session Hijacking Tools
  •    11.7 Session Hijacking Tools
  •    11.8 Session Hijacking Countermeasures
  •    11.8 Session Hijacking Countermeasures
  •    11.9 Session Hijacking Review
  •    11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  •    12.1 Types of IDS
  •    12.2 Snort
  •    12.3 System Logs
  •    12.4 IDS Considerations
  •    12.5 IDS Evasion
  •    12.5.1 Activity - Fly Below IDS Radar
  •    12.6 Firewalls
  •    12.7 Packet Filtering Rules
  •    12.8 Firewall Deployments
  •    12.9 Split DNS
  •    12.10 Firewall Product Types
  •    12.11 Firewall Evasion
  •    12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall
  •    12.11.2 Activity - Busting the DOM for WAF Evasion
  •    12.12 Honeypots
  •    12.13 Honeypot Detection and Evasion
  •    12.13.1 Activity - Test and Analyze a Honey Pot
  •    12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  •    13.1 Web Server Operations
  •    13.1 Web Server Operations
  •    13.2 Hacking Web Servers
  •    13.2 Hacking Web Servers
  •    13.3 Common Web Server Attacks
  •    13.3 Common Web server Attacks
  •    13.4 Webserver Attack Tools
  •    13.3.1 Activity - Defacing a Website
  •    13.4 Web Server Attack Tools
  •    13.5 AI and Webserver Attacks
  •    13.5 Hacking Web Servers Countermeasures
  •    13.6 Hacking Web Servers Countermeasures
  •    13.6 Hacking Web Servers Review
  •    13.7 Hacking Web Servers Review

Module 14: Hacking Web Applications

  •    14.1 Web Application Concepts
  •    14.1 Web Application Concepts
  •    14.2 Attacking Web Apps
  •    14.2 Attacking Web Apps
  •    14.3 A01 Broken Access Control
  •    14.3 A01 Broken Access Control
  •    14.4 A02 Cryptographic Failures
  •    14.4 A02 Cryptographic Failures
  •    14.5 A03 Injection
  •    14.5 A03 Injection
  •    14.5.1 ACTIVITY - Command Injection
  •    14.5.1 Activity - Command Injection
  •    14.6 A04 Insecure Design
  •    14.6 A04 Insecure Design
  •    14.7 A05 Security Misconfiguration
  •    14.7 A05 Security Misconfiguration
  •    14.8 A06 Vulnerable and Outdated Components
  •    14.8 A06 Vulnerable and Outdated Components
  •    14.9 A07 Identification and Authentication Failures
  •    14.9 A07 Identification and Authentication Failures
  •    14.10 A08 Software and Data integrity Failures
  •    14.10 A08 Software and Data integrity Failures
  •    14.11 A09 Security Logging and Monitoring Failures
  •    14.11 A09 Security Logging and Monitoring Failures
  •    14.12 A10 Server-Side Request Forgery
  •    14.12 A10 Server-Side Request Forgery
  •    14.13 XSS Attacks
  •    14.13 XSS Attacks
  •    14.14 CSRF
  •    14.13.1 Activity - XSS Walkthrough
  •    14.15 Parameter Tampering
  •    14.13.2 Activity - Inject a Malicious iFrame with XXS
  •    14.15.1 ACTIVITY - Parameter Tampering with Burp Suite
  •    14.14 CSRF
  •    14.16 Clickjacking
  •    14.15 Parameter Tampering
  •    14.16.1 ACTIVITY - Clickjacking with XSS and iFrame Injection
  •    14.15.1 Activity - Parameter Tampering with Burp
  •    14.16 Clickjacking
  •    14.17 SQL Injection
  •    14.17 SQL Injection
  •    14.17.1 ACTIVITY - Using SQL Injection to Steal Sensitive Data
  •    14.18 Insecure Deserialization Attacks
  •    14.18 Insecure Deserialization Attacks
  •    14.19 IDOR
  •    14.19 IDOR
  •    14.19.1 ACTIVITY - IDOR Abuse with Burp Suite
  •    14.19.1 Activity - Hacking with IDOR
  •    14.20 Directory Traversal
  •    14.20 Directory Traversal
  •    14.20.1 ACTIVITY - Directory Traversal
  •    14.21 Session Management Attacks
  •    14.21 Session Management Attacks
  •    14.22 Response Splitting
  •    14.22 Response Splitting
  •    14.23 Overflow Attacks
  •    14.23 Overflow Attacks
  •    14.24 XXE Attacks
  •    14.25 Web App DoS
  •    14.24 XXE Attacks
  •    14.26 Soap Attacks
  •    14.25 Web App DoS
  •    14.27 AJAX Attacks
  •    14.26 Soap Attacks
  •    14.28 Web API Hacking
  •    14.27 AJAX Attacks
  •    14.29 Webhooks and Web Shells
  •    14.28 Web API Hacking
  •    14.29 Webhooks and Web Shells
  •    14.30 Web App Hacking Tools
  •    14.30 Web App Hacking Tools
  •    14.31 Hacking Web Applications Countermeasures
  •    14.31 AI and Web Application Attacks
  •    14.32 Hacking Web Applications Review
  •    14.32 Hacking Web Applications Countermeasures
  •    14.33 Hacking Web Applications Review

Module 15: SQL Injection

  •    15.1 SQL Injection Overview
  •    15.1 SQL Injection Overview
  •    15.2 Basic SQL Injection
  •    15.2 Basic SQL Injection
  •    15.3 Finding Vulnerable Websites
  •    15.3 Finding Vulnerable Websites
  •    15.4 Error-based SQL Injection
  •    15.4 Error-based SQL Injection
  •    15.5 Union SQL Injection
  •    15.5 Union SQL Injection
  •    15.5.1 ACTIVITY - SQLi on a Live Website - Part 1
  •    15.5.1 Activity - Testing SQLi on a Live Website - Part 1
  •    15.5.2 Activity - Testing SQLi on a Live Website - Part 2
  •    15.5.2 ACTIVITY - SQLi on a Live Website - Part 2
  •    15.6 Blind SQL Injection
  •    15.6 Blind SQL Injection
  •    15.7 SQL Injection Tools
  •    15.7 SQL Injection Tools
  •    15.7.1 Activity - SQL Injection Using SQLmap
  •    15.8 Evading Detection
  •    15.8 Evading Detection
  •    15.9 Analyzing SQL Injection
  •    15.9 Analyzing SQL Injection
  •    15.10 SQL Injection Countermeasures
  •    15.10 SQL Injection Countermeasures
  •    15.11 SQL Injection Review
  •    15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  •    16.1 Wireless Concepts
  •    16.1 Wireless Concepts
  •    16.2 Wireless Security Standards
  •    16.2 Wireless Security Standards
  •    16.3 WI-FI Discovery Tools
  •    16.3 WI-FI Discovery Tools
  •    16.4 Common Wi-Fi Attacks
  •    16.4 Common Wi-Fi Attacks
  •    16.5 Wi-Fi Password Cracking
  •    16.5 Wi-Fi Password Cracking
  •    16.6 WEP Cracking
  •    16.6 WEP Cracking
  •    16.7 WPA,WPA2,WPA3 Cracking
  •    16.6.1 Activity - Cracking WEP
  •    16.7.1 ACTIVITY - WPA2 KRACK Attack
  •    16.7 WPA,WPA2,WPA3 Cracking
  •    16.8 WPS Cracking
  •    16.7.1 Activity - WPA KRACK Attack
  •    16.9 Bluetooth Hacking
  •    16.8 WPS Cracking
  •    16.10 Other Wireless Hacking
  •    16.9 Bluetooth Hacking
  •    16.11 Wireless Security Tools
  •    16.10 Other Wireless Hacking
  •    16.12 Wireless Hacking Countermeasures
  •    16.10.1 Activity - Cloning an RFID badge
  •    16.10.2 Activity - Hacking with a Flipper Zero
  •    16.13 Hacking Wireless Networks Review
  •    16.11 Wireless Security Tools
  •    16.12 Wireless Hacking Countermeasures
  •    16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  •    17.1 Mobile Platform Overview
  •    17.1 Mobile Device Overview
  •    17.2 Mobile Device Attacks
  •    17.2 Mobile Device Attacks
  •    17.3 Android Overview
  •    17.3 Android Vulnerabilities
  •    17.4 Rooting Android
  •    17.4 Rooting Android
  •    17.5 Android Exploits
  •    17.5 Android Exploits
  •    17.5.1 ACTIVITY - Pwn a Mobile Device
  •    17.5.1 Activity - Hacking Android
  •    17.6 Android-based Hacking Tools
  •    17.5.2 Activity - Using a Mobile Device in a DDoS Campaign
  •    17.6 Android-based Hacking Tools
  •    17.7 Reverse Engineering an Android App
  •    17.7 Reverse Engineering an Android App
  •    17.8 Securing Android
  •    17.8 Securing Android
  •    17.9 iOS Overview
  •    17.10 Jailbreaking iOS
  •    17.9 iOS Overview
  •    17.11 IOS Exploits
  •    17.10 Jailbreaking iOS
  •    17.12 iOS-based Hacking Tools
  •    17.11 iOS Exploits
  •    17.13 Reverse Engineering an iOS App
  •    17.12 iOS-based Hacking Tools
  •    17.14 Securing iOS
  •    17.13 Reverse Engineering an iOS App
  •    17.15 Mobile Device Management
  •    17.14 Securing iOS
  •    17.16 Hacking Mobile Platforms Countermeasures
  •    17.15 Mobile Device Management
  •    17.17 Hacking Mobile Platforms Review
  •    17.16 Hacking Mobile Platforms Countermeasures
  •    17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  •    18.1 IoT Overview
  •    18.2 IoT Infrastructure
  •    18.3 IoT Vulnerabilities and Threats
  •    18.3.1 Activity - Searching for Vulnerable IoT Devices
  •    18.4 IoT Hacking Methodology and Tools
  •    18.5 IoT Hacking Countermeasures
  •    18.6 OT Concepts
  •    18.7 IT-OT Convergence
  •    18.8 OT Components
  •    18.9 OT Vulnerabilities
  •    18.10 OT Attack Methodology and Tools
  •    18.11 OT Hacking Countermeasures
  •    18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  •    19.1 Cloud Computing Concepts
  •    19.1 Cloud Computing Concepts
  •    19.2 Cloud Types
  •    19.2 Cloud Types
  •    19.3 Cloud Benefits and Considerations
  •    19.3 Cloud Benefits and Considerations
  •    19.4 Cloud Risks and Vulnerabilities
  •    19.4 Cloud Risks and Vulnerabilities
  •    19.5 AWS Hacking
  •    19.5 Cloud Threats and Countermeasures
  •    19.5.1 ACTIVITY - AWS S3 Bucket Hacking
  •    19.5.1 Activity - Hacking S3 Buckets
  •    19.6 Azure Cloud Hacking
  •    19.6 Cloud Security Tools And Best Practices
  •    19.7 Cloud Computing Review
  •    19.7 Google Cloud Hacking
  •    19.8 Container Hacking
  •    19.9 Cloud Threat Countermeasures
  •    19.10 Cloud Computing Review

Module 20: Cryptography

  •    20.1 Cryptography Concepts
  •    20.1 Cryptography Concepts
  •    20.2 Symmetric Encryption
  •    20.2 Symmetric Encryption
  •    20.2.1 Activity - Symmetric Encryption
  •    20.2.1 ACTIVITY - Symmetric Encryption
  •    20.3 Asymmetric Encryption
  •    20.3 Asymmetric Encryption
  •    20.3.1 ACTIVITY - Asymmetric Encryption
  •    20.3.1 Activity - Asymmetric Encryption
  •    20.4 Public Key Exchange
  •    20.4 Public Key Exchange
  •    20.5 PKI
  •    20.5 PKI
  •    20.5.1 ACTIVITY - Generating and Using an Asymmetric Key Pair
  •    20.5.1 Activity - Generating and Using an Asymmetric Key Pair
  •    20.6 Digital Signatures
  •    20.6 Digital Signatures
  •    20.7 Hashing
  •    20.7 Hashing
  •    20.7.1 Activity - Calculating Hashes
  •    20.7.1 ACTIVITY - Calculating Hashes
  •    20.8 Common Cryptography Use Cases
  •    20.8 Common Encryption Use Cases
  •    20.9 Cryptography Tools
  •    20.9 Cryptography Tools
  •    20.10 Cryptography Attacks
  •    20.10 Cryptography Attacks
  •    20.11 Cryptography Review
  •    20.11 Cryptography Review
  •    20.12 Course Conclusion
  •    20.12 Course Conclusion

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass