BLACK FRIDAY SALE

50% OFF SITEWIDE

USE COUPON CODE: SAVE50

Sale!
,

Certified Ethical Hacker (CEH) Version 11 (ECC 312-50) Part 1, 2, 3

$99.00

SKU: ceh-v11-123 Categories: ,

This Extensive CEH v11 Instructional Series Includes 3 Individual Courses:

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)

Instructor – Chrys Thorsen

 

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)

Course Includes

  • 113 Videos
  • 24 Hours of Video Content
  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, all lessons and topics are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning.

In this Foundations course, students will learn how networks, protocols, and networking devices work. They will understand the security limits found in a traditional network and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer network. They will examine the controls used to protect a company’s digital assets—and what it takes to circumvent such controls.

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)

Course Includes

  • 180 Videos
  • 22 Hours of Video Content
  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

Course description:

Ethical Hacker is the second in a three-part comprehensive series on white-hat hacking. Students will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a computer system, collect evidence of success, and escape unnoticed. As before, every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

Students will learn to hack Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks. They will crack passwords, intercept transmissions, use malware to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service their way to “pwning” a target*. Along with such venerable tools as nmap and netcat, students will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. They will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.

* To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)

Course Includes

  • 188 Videos
  • 20 Hours of Video Content
  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

Course description:

Advanced Ethical Hacker is the last in a three-part comprehensive series on white-hat hacking. In this course, students will take their pentesting skills to the next level, branching out into websites, Wi-Fi, mobile devices, IoT/OT, and cloud computing. They will employ encryption, hijack sessions, evade firewalls and intrusion detection, and test honeypots.

Students will evaluate a wide array of exploits against web apps. These include website defacement, command/SQL/iFrame injection, man-in-the-browser parameter tampering, cross-site scripting and request forgeries, and attacks against XXE, SOAP, and AJAX. Students will then learn how to deploy a Wi-Fi “pineapple”, performing Evil Twin, KARMA, and KR00K attacks on wireless clients. They will crack WPA2 and WPS while learning the secret vulnerabilities of WPA3. They will hack mobile devices, steal files from an iPhone, capture audio and video from an Android phone, hack Bluetooth, clone an RFID badge, crack an encrypted NFC card, and plant a Raspberry PI “back door” on a target network. They will then move on to more exotic targets such as the Internet of Things, Industrial Control/SCADA Systems, and cloud-based networks.

Why you should take this course:

This course ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a “script kiddie”. Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct a successful ethical hacking campaign.

Intended audience:

This course is intended for IT professionals including:

  • Ethical hackers
  • System Administrators
  • Network Administrators
  • Engineers
  • Web managers
  • Auditors
  • Security Professionals

 

Course prerequisites:

Before taking this course:

  • You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required).
  • You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later.