Certified Ethical Hacker (CEH) Version 11 (ECC 312-50) Part 1, 2, 3

$79.00

This online cyber security ethical hacking program is the first step in becoming an ethical hacker. You will learn advanced hacking concepts how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

70  Training Hours
482 Videos
100  Topics
100 Practice Questions

Learn to be an Ethical Hacker

This is an exciting cyber security training series teaching students hacking techniques and types of attacks to become an ethical hacker. This Extensive CEH v11 Instructional Series Includes 3 Individual online courses covering current security domains and is the path to achieving your ethical hacking certification:

  • Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)
  • Instructor - Chrys Thorsen

What is an Ethical Hacker

Ethical hacking, also known as "white hat" hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hacking uses expertise to identify and fix vulnerabilities in systems, rather than exploit them for personal gain or to cause harm. This type of ethical hacking is typically done with the permission of the owner of the system being tested and is often done by cybersecurity professionals as a way to prevent malicious hackers, who are sometimes referred to as "black hat" hackers, from gaining access to a system.

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, all lessons and topics are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning for ethical hacking.

In this Ethical hacking Foundations course, students will learn network security and how networks, protocols, and networking devices work. They will gain in-depth understanding of the network security limits found in a traditional networks and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities, network security and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a cyber security professional, they will also learn about relevant laws and how best to serve their clients' needs when auditing a computer or network security. They will examine the controls used to protect a company's digital assets and what it takes to circumvent such controls.

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test covering cybersecurity domain
  • Certificate of Completion

Online Ethical Hacking Online Course Description:

Ethical Hacker is the second in a three-part comprehensive series on white-hat hacking. Students will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools for practical experience. The focus of this course is to solve the challenge of breaking into a computer system, collect evidence of success, and escape unnoticed. As before, every lesson and topic are infused with step-by-step guided practice using real hardware  and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

Students will learn to application hacking with Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks with this application attacks. They will crack passwords, intercept transmissions, use malware threats to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service their way to "pwning" a target*. Along with such venerable tools as nmap and netcat, students will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks and find app vulnerability. They will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won't do.

* To pwn: (pronounced "pone"). In hacker vernacular, to "punk" and "own" (completely take over) a system.

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

Online Course Description:

Advanced Ethical Hacker is the last in a three-part comprehensive series on white-hat hacking. In this course, students will take their penetrating skills to the next level, branching out into hacking web applications, websites, Wi-Fi, hacking mobile platforms, IoT/OT, hacking web servers,  and cloud computing. They will employ encryption, hijack sessions, evade firewalls and intrusion detection, and test honeypots.

Students will evaluate a wide array of concepts of hacking and exploits against web applications and develop a vulnerability analysis. These include website defacement, command/SQL/iFrame injection, man-in-the-browser parameter tampering, cross-site scripting, malicious attacks, request forgeries, and attacks against XXE, SOAP, and AJAX. Students will then learn how to deploy a Wi-Fi "pineapple", performing Evil Twin, KARMA, and KR00K attacks on wireless clients. They will crack WPA2 and WPS while learning the secret vulnerabilities of WPA3. They will hack mobile devices, steal files from an iPhone, capture audio and video from an Android phone, hack Bluetooth, clone an RFID badge, crack an encrypted NFC card, and plant a Raspberry PI "back door" on a target network. They will then move on to more exotic targets such as the Internet of Things, Industrial Control/SCADA Systems, and cloud-based networks.

Why you should take this course:

This online course ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a "script kiddie". Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct attack techniques for successful ethical hacking campaign.

Intended audience:

This course is intended for IT professionals including:

  • Ethical hackers
  • System Administrators
  • Security Analyst
  • Security Consultant
  • Subject Matter Experts
  • Cloud Security Experts
  • Network Administrators
  • Engineers
  • Web managers
  • Auditors
  • Security Professionals
  • SOC Security

Course prerequisites:

Before taking this course:

  • You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required).
  • You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later.

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Outline

Module 61 - CEH v11 Advanced Ethical Hacker Course Intro
  •    61.1 About This Course: Advanced Ethical Hacker
  •    61.2 About the Instructor
Module 62 - CEH v11 Session Hjacking
  •    62.1 Session Hijacking Concepts
  •    62.2 Token-based Authentication
  •    62.3 Compromising a Session Token
  •    62.4 XSS
  •    62.5 CSRF
  •    62.6 Other Attacks
Module 63 - CEH v11 Defending Against Hijacking
  •    63.1 Network Level Hijacking
  •    63.2 Session Hijacking Tools
  •    63.3 Session Hijacking Countermeasures
  •    63.4 Session Penetration Hijacking
  •    63.5 Review
Module 64 - CEH v11 Implementing Intrusion Detection
  •    64.1 IDS-IPS
  •    64.2 Snort
  •    64.3 Snort Rules
  •    64.4 Syslog
Module 65 - CEH v11 Testing Intrusion Detection
  •    65.1 WIPS
  •    65.2 IDS Considerations
  •    65.3 IDS Tools
  •    65.4 IDS Evasion
  •    65.5 IDS-Firewall Evasion Tools
  •    65.6 IDS Scenerios
Module 66 - CEH v11 Implementing Firewalls
  •    66.1 Firewalls
  •    66.2 Packet Filtering Rules
  •    66.3 Firewall Deployments
  •    66.4 Traffic Flow through Firewalls
  •    66.5 Split DNS
Module 67 - CEH v11 Testing Firewallls
  •    67.1 Firewall Tools
  •    67.2 Firewall Evasion
  •    67.3 Firewall Scenarios
Module 68 - CEH v11 Implementing Honeypots
  •    68.1 Honeypots
  •    68.2 Honeypot Detection
  •    68.3 IDS-Firewall Evasion Countermeasures
  •    68.4 IDS-Firewall Honeypot Penetration Testing
  •    68.5 Review
Module 69 - CEH v11 Attacker Webserver
  •    69.1 Webserver Security Overview
  •    69.2 Common Webservers
  •    69.3 Webserver Attacks
  •    69.4 Misconfiguration Attack Examples
Module 70 - CEH v11 Webserver Defense
  •    70.1 Webserver Attack Tools
  •    70.2 Attack Countermeasures
  •    70.3 Webserver Penetration Testing
  •    70.4 Review
Module 71 - CEH v11 Intro To Web Apps
  •    71.1 Web Application Concepts
  •    71.2 Attacking Web Apps
Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities
  •    72.1 A01 - Broken Access Control
  •    72.2 A02 - Cryptographic Failures
  •    72.3 A03 - Injection
  •    72.4 A04 - Insecure Design
  •    72.5 A05 - Security Misconfiguration
Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities
  •    73.1 A06 - Vulnerable and Outdated Components
  •    73.2 A07 - Identification and Authentication Failures
  •    73.3 A08 - Software and Data Integrity Failures
  •    73.4 A09 - Security Logging and Monitoring
  •    73.5 A10 - Server Side Request Forgery
Module 74 - CEH v11 Common Web App Attacks
  •    74.1 XSS Attacks
  •    74.2 CSRF
  •    74.3 Parameter Tampering
  •    74.4 Clickjacking
  •    74.5 SQL Injection
Module 75 - CEH v11 Unauthorized Access Through Web Apps
  •    75.1 Insecure Deserialization Attacks
  •    75.2 IDOR
  •    75.3 Directory Traversal
  •    75.4 Session Management Attacks
  •    75.5 Response Splitting
Module 76 - CEH v11 Web App Overflow Attacks
  •    76.1 Denial of Service
  •    76.2 Overflow Attacks
  •    76.3 XXE Attacks
  •    76.4 Soap Attacks
  •    76.5 Ajax Attacks
Module 77 - CEH v11 Defending Web Apps
  •    77.1 Web App Hacking Tools
  •    77.2 Web Hacking Countermeasures
  •    77.3 Web Application Penetration Testing
  •    77.4 Review
Module 78 - CEH v11 Intro To SQL Injection
  •    78.1 SQL Overview
  •    78.2 SQL Injection Concepts
  •    78.3 Basic SQL Injection
Module 79 - CEH v11 Performing SQL Injection
  •    79.1 Finding Vulnerable Websites
  •    79.2 Error-based SQL Injection
  •    79.3 Union SQL Injection
  •    79.4 Blind SQL Injection
  •    79.5 SQL Injection Scenarios
  •    79.6 Evading Detection
Module 80 - CEH v11 Defending Against SQL Injection
  •    80.1 SQL Injection Tools
  •    80.2 SQL Injection Countermeasures
  •    80.3 Safe Coding Examples
  •    80.4 SQL Wildcards
  •    80.5 SQL Injection Penetration Testing
  •    80.6 Review
Module 81 - CEH v11 Wireless Networking Overview
  •    81.1 Wireless Concepts
  •    81.2 Wireless Signal Encoding
  •    81.3 Wi-Fi Standards
  •    81.4 Wi-Fi Antennas
  •    81.5 Wireless Authentication
Module 82 - CEH v11 Wi-Fi Security
  •    82.1 Wi-Fi Security Standards
  •    82.2 Wireless Network Troubleshooting Tools
  •    82.3 Wi-Fi Discovery Tools
  •    82.4 Sniffing Wi-Fi
Module 83 - CEH v11 Hacking Wi-Fi
  •    83.1 Wi-Fi Attack Types
  •    83.2 Wi-Fi Rogue Access Point Attacks
  •    83.3 Wi-Fi Denial of Service Attacks
  •    83.4 Wi-Fi Password Cracking Attacks
  •    83.5 WEP Cracking
Module 84 - CEH v11 Advanced Wireless Attacks
  •    84.1 WPA-WPA2 Cracking
  •    84.2 WPA3 Attacks
  •    84.3 WPS Cracking
  •    84.4 Wi-Fi Attack Tools for Mobile Devices
  •    84.5 Bluetooth Hacking
  •    84.6 Other Wireless Hacking
Module 85 - CEH v11 Defending Wireless Networks
  •    85.1 Wireless Hacking Countermeasures
  •    85.2 Wireless Security Tools
  •    85.3 Wireless Penetration Testing
  •    85.4 Review
Module 86 - CEH v11 Mobile Platform Overview
  •    86.1 Mobile Platform Overview
  •    86.2 Mobile Device Vulnerabilities
  •    86.3 Mobile Device Attacks
Module 87 - CEH v11 Hacking Android
  •    87.1 Android
  •    87.2 Android Vulnerabilities
  •    87.3 Rooting Android
  •    87.4 Android Exploits
  •    87.5 Android Hacking Tools
  •    87.6 Reverse Engineering an Android App
  •    87.7 Securing Android
Module 88 - CEH v11 Hacking iOS
  •    88.1 iOS
  •    88.2 iOS Vulnerabilities
  •    88.3 Jailbreaking iOS
  •    88.4 iOS Exploits
  •    88.5 iOS Hacking Tools
  •    88.6 Securing iOS
Module 89 - CEH v11 Mobile Platform Defense
  •    89.1 Mobile Device Management
  •    89.2 BYOD
  •    89.3 Mobile Security Guidelines and Tools
  •    89.4 Mobile Device Penetration Testing
  •    89.5 Review
Module 90 - CEH v11 IoT Hacking
  •    90.1 loT Concepts
  •    90.2 loT Infrastructure
  •    90.3 Fog Computing
  •    90.4 loT Vulnerabilities
  •    90.5 loT Threats
Module 91 - CEH v11 IoT Defense
  •    91.1 IoT Hacking Methodologies and Tools
  •    91.2 IoT Hacking Methodolgies and Tools Part 2
  •    91.3 Hacking Countermeasures
  •    91.4 IoT Penetration Testing
  •    91.5 OT Concepts
  •    91.6 Industrial IoT
Module 92 - CEH v11 Operational Technology Overview
  •    92.1 IT-OT Convergence
  •    92.2 ICS
  •    92.3 SCADA
  •    92.4 DCS
  •    92.5 RTU
  •    92.6 PLC
  •    92.7 Addition OT Components
Module 93 - CEH v11 Hacking OT
  •    93.1 OT Variables
  •    93.2 Well-known OT attacks
  •    93.3 OT Attack Methodology and Basic Tools
  •    93.4 OT Reconnaissance
  •    93.5 OT Penetration and Control
Module 94 - CEH v11 Defending OT
  •    94.1 OT Attack Tools
  •    94.2 OT Hacking Countermeasures
  •    94.3 OT Penetration Testing
  •    94.4 Review
Module 95 - CEH v11 Attacking The Cloud
  •    95.1 Cloud Computing Concepts
  •    95.2 Virtualization
  •    95.3 Cloud Types
  •    95.4 Cloud Benefits and Considerations
  •    95.5 Cloud Risks and Vulnerablilities
Module 96 - CEH v11 Cloud Defense
  •    96.1 Cloud Threats and Countermeasures
  •    96.2 Cloud Security Tools
  •    96.3 Cloud Security Best Practices
  •    96.4 Cloud Penetration Testing
  •    96.5 Review
Module 97 - CEH v11 Cryptography Overview
  •    97.1 Cryptography Concepts
  •    97.2 Symetric Encryption
  •    97.3 Asymmetric Encryption
  •    97.4 Public Key Exchange
  •    97.5 PKI
Module 98 - CEH v11 Protecting Data With Crytography
  •    98.1 Digital Certificates
  •    98.2 Digital Signatures
  •    98.3 Hashing
  •    98.4 Email Encryption
  •    98.5 Network Communication Encryption
Module 99 - CEH v11 Protecting Data at Home and in Transit
  •    99.1 Disk Encryption
  •    99.2 VPN Encryption
  •    99.3 Cryptography Tools
Module 100 - CEH v11 Pentesting Cryptography
  •    100.1 Cryptography Attacks
  •    100.2 Cryptography Penetration Testing
  •    100.3 Review
  •    100.4 Conclusion

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Outline

Module 21 - CEH v11 Ethical Hacker Course Intro
  •    21.1 About this course - Ethical Hacker
  •    21.2 About the Instructor
Module 22 - CEH v11 Intro to Footprinting
  •    22.1 Footprinting Concepts
  •    22.2 Footprinting Methodology
  •    22.3 OSINT Tools
  •    22.4 Advanced Google Search
  •    22.5 Whois Footprinting
  •    22.6 Activity - Performing a Whois Lookup
Module 23 - CEH v11 Footprinting Network Services
  •    23.1 DNS Footprinting
  •    23.2 Website Footprinting
  •    23.3 Email Footprinting
  •    23.4 Network Footprinting
  •    23.5 Footprinting through Social Networking Sites
Module 24 - CEH v11 Defend Against Footprinting
  •    24.1 Competitive Intelligence Gathering
  •    24.2 Footprinting Countermeasures
  •    24.3 Footprinting Penetration Testing
  •    24.4 Review
Module 25 - CEH v11 Intro to Scanning
  •    25.1 Scanning Concepts
  •    25.2 ICMP Discovery Scans
  •    25.3 Other Discovery Scans
Module 26 - CEH v11 Port Scanning
  •    26.1 Ports
  •    26.2 TCP Flags and Handshakes
  •    26.3 TCP Scan Types
  •    26.4 Other Scanning Techniques
Module 27 - CEH v11 Vulnerability Scanning
  •    27.1 Banner Grabbing
  •    27.2 Vulnerability Scanning
  •    27.3 SSDP Scanning
Module 28 - CEH v11 NMAP
  •    28.1 Nmap
  •    28.2 Common Nmap Scans
  •    28.3 Nmap Options
  •    28.4 Nmap Stealth Scans
  •    28.5 Hping and Other Scanners
Module 29 - CEH v11 Firewalls and Intrusion Detection
  •    29.1 Firewall Types
  •    29.2 Firewall Features
  •    29.3 Firewall Features Part 2
  •    29.4 Firewall Configurations
  •    29.5 Intrusion Detection and Prevention
Module 30 - CEH v11 Evading Detection
  •    30.1 Firewall and IDS Evasion
  •    30.2 Firewall and IDS Evasion Part 2
  •    30.3 Firewalking
  •    30.4 Probing a Firewall
  •    30.5 Probing a Firewall Part 2
Module 31 - CEH v11 Proxies and VPNs
  •    31.1 Proxies
  •    31.2 VPNs
  •    31.3 Tor
  •    31.4 Scanning Countermeasures
  •    31.5 Scanning Penetration Testing
  •    31.6 Review
Module 32 - CEH v11 Accessing Vulnerability
  •    32.1 Vulnerability Assessment Overview
  •    32.2 Vulnerability Scoring Systems
  •    32.3 Vulnerability Assessment Tools
Module 33 - CEH v11 Vulnerability Research
  •    33.1 Scanner Output and Reports
  •    33.2 Vulnerability Research
  •    33.3 Review
Module 34 - CEH v11 Intro to Enumeration
  •    34.1 Enumeration Concepts
  •    34.2 Enumeration Techniques and Tools
  •    34.3 Service and Application Enumeration
  •    34.4 SMB and NetBIOS Enumeration
Module 35 - CEH v11 Service Enumeration
  •    35.1 SNMP Enumeration
  •    35.2 LDAP Enumeration
  •    35.3 DNS Enumeration
  •    35.4 SMTP Enumeration
  •    35.5 NTP Enumeration
Module 36 - CEH v11 Advanced Enumeration
  •    36.1 Remote Connection Enumeration
  •    36.2 File Transfer Enumeration
  •    36.3 VoIP Enumeration
  •    36.4 IPSEC Enumeration
  •    36.5 IPv6 Enumeration
  •    36.6 BGP Enumeration
Module 37 - CEH v11 Command Line Enumeration
  •    37.1 Windows Command Line Enumeration
  •    37.2 Linux Command Line Enumeration
  •    37.3 Linux Command Line Enumeration Part 2
Module 38 - CEH v11 Defending Against Enumeration
  •    38.1 Enumeration Countermeasures
  •    38.2 Enumeration Countermeasures Part 2
  •    38.3 Enumeration Penetration Testing
  •    38.4 Review
Module 39 - CEH v11 Intro to System Hacking
  •    39.1 System Hacking Concepts
  •    39.2 System Hacking Tools and Frameworks
  •    39.3 Searchsploit
  •    39.4 Compiling and Running Exploits
Module 40 - CEH v11 System Hacking with Metasploit
  •    40.1 Metasploit
  •    40.2 Metasploit Search
  •    40.3 Metasploit Exploits and Payloads
  •    40.4 Metasploit Meterpreter
  •    40.5 Metasploit Connectivity
  •    40.6 Metasploit Impersonation and Migration
Module 41 - CEH v11 Further Attacking a Compromised System
  •    41.1 Netcat
  •    41.2 Pivoting
  •    41.3 Netcat Relays
  •    41.4 Metasploit Post Exploitation Modules
  •    41.5 Common Operating System Exploits
Module 42 - CEH v11 Hacking an Operating System
  •    42.1 Hacking Windows
  •    42.2 Hacking Linux
  •    42.3 Network Service Exploits
  •    42.4 Password Attacks
Module 43 - CEH v11 Password Cracking Overview
  •    43.1 Dictionary Attack
  •    43.2 Brute Force Attack
  •    43.3 Password Spraying
  •    43.4 Rainbow Tables
Module 44 - CEH v11 Performing Password Attacks
  •    44.1 Network Service Password Attacks
  •    44.2 Password Cracking Tools
  •    44.3 Online Password Cracking Sites
  •    44.4 Windows Password Cracking
  •    44.5 Linux Password Cracking
  •    44.6 Other Methods for Obtaining Passwords
Module 45 - CEH v11 Using Exploits
  •    45.1 Keylogging
  •    45.2 Spyware
  •    45.3 Rootkits
  •    45.4 Buffer Overflows
  •    45.5 Privilege Escalation
  •    45.6 Hiding Files
Module 46 - CEH v11 Hiding Information
  •    46.1 Alternate Data Streams
  •    46.2 Steganography
  •    46.3 Creating and Maintaining Remote Access
  •    46.4 Hiding Evidence
Module 47 - CEH v11 Covering Tracks
  •    47.1 Covering Tracks in Windows
  •    47.2 Covering Tracks in Linux
  •    47.3 System Hacking Counter-Measures
  •    47.4 System Hacking Penetration Testing
  •    47.5 Review
Module 48 - CEH v11 Malware Overview
  •    48.1 Intro to Malware
  •    48.2 Virus Overview
  •    48.3 Virus Types
  •    48.4 Self-Hiding Viruses
  •    48.5 Worms
  •    48.6 Trojans
  •    48.7 Trojan Types
  •    48.8 RATS
Module 49 - CEH v11 Hacking With Malware
  •    49.1 Ransomware
  •    49.2 Botnets
  •    49.3 Covert Channel Trojans
  •    49.4 Banking Trojans
  •    49.5 Rootkits
Module 50 - CEH v11 Creating Malware
  •    50.1 Other Malware
  •    50.2 Malware Makers
  •    50.3 Dropper and Stage Creation
  •    50.4 Exploit Kits
Module 51 - CEH v11 Detecting Malware
  •    51.1 Malware Detection
  •    51.2 Malware Detection Part 2
  •    51.3 Malware Analysis
Module 52 - CEH v11 Defending Against Malware
  •    52.1 Malware Reverse Engineering
  •    52.2 Malware Countermeasures
  •    52.3 Malware Penetration Testing
  •    52.4 Review
Module 53 - CEH v11 Sniffing
  •    53.1 Sniffing Concepts
  •    53.2 Types of Sniffing
  •    53.3 Sniffing Protocols
  •    53.4 Sniffing Tools
Module 54 - CEH v11 Spoofing and MITM
  •    54.1 ARP
  •    54.2 ARP Spoofing
  •    54.3 MITM
  •    54.4 MAC Attacks
  •    54.5 MAC Spoofing
  •    54.6 DHCP Attacks
Module 55 - CEH v11 Defending Against Poisoning and Sniffing
  •    55.1 Name Resolution Poisoning
  •    55.2 VLAN Hopping
  •    55.3 Sniffing Counter Measures
  •    55.4 Sniffing Penetration Testing
  •    55.5 Review
Module 56 - CEH v11 Social Engineering
  •    56.1 Social Engineering Concepts
  •    56.2 Social Engineering Techniques
  •    56.3 Social Engineering Examples
  •    56.4 Social Engineering Tools
Module 57 - CEH v11 Defending Against Social Engineering
  •    57.1 Social Media
  •    57.2 Identity Theft
  •    57.3 Insider Threats
  •    57.4 Social Engineering Countermeasures
  •    57.5 Social Engineering Penetration Testing
  •    57.6 Review
Module 58 - CEH v11 Denial-of-Service
  •    58.1 DoS-DDoS Concepts
  •    58.2 Volumetric Attacks
  •    58.3 Fragmentation Attacks
  •    58.4 State Exhaustion Attacks
  •    58.5 Application Layer Attacks
Module 59 - CEH v11 Advanced DoS Attacks
  •    59.1 Protocol Attacks
  •    59.2 Other Attacks
  •    59.3 Botnets
Module 60 - CEH v11 Defending Against Denial-of-Service
  •    60.1 DoS-DDoS Attack Tools
  •    60.2 DoS-DDoS Countermeasures
  •    60.3 Dos Penetration Testing
  •    60.4 Review

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Outline

Module 1 - CEH v11 Foundations Course Introduction
  •    1.1 About this course: CEH Foundations
  •    1.2 About the Instructor
Module 2 - CEH v11 Introduction To Networking
  •    2.1 Networking Overview
  •    2.2 Network Scope
  •    2.3 Network Addressing
  •    2.4 Activity - Examining Network Addressing
Module 3 - CEH v11 Lan Components
  •    3.1 Protocols, Ports, Sockets
  •    3.2 Network Topologies
  •    3.3 LAN Devices
  •    3.4 LAN Devices Part 2
  •    3.5 VLANs
  •    3.6 Activity - Examining Ports and Sockets
  •    3.7 Activity - Examining Switches and VLANs
Module 4 - CEH v11 Routing and Network Access
  •    4.1 Routers
  •    4.2 Layer 3 Switches
  •    4.3 Modems and Remote Access
  •    4.4 Firewalls and Proxies
  •    4.5 Activity - Examining Routing
  •    4.6 Activity - Examining VLAN Routing
  •    4.7 Activity - Examining Firewall Rules
Module 5 - CEH v11 Intrusion Detection and Network Layers
  •    5.1 IDS and IPS
  •    5.2 OSI Model
  •    5.3 TCP-IP
  •    5.4 Activity - Examining Network Layers
Module 6 - CEH v11 Networking Protocols and Addressing
  •    6.1 Layer 4 Protocols
  •    6.2 Layer 3 Protocols
  •    6.3 Layer 2 Protocols
  •    6.4 IP Addressing
  •    6.5 Subnetting
  •    6.6 DHCP
  •    6.7 Activity - Examining TCP
  •    6.8 Activity - Examining UDP
  •    6.9 Activity - Examining IP
  •    6.10 Activity - Examining ICMP
  •    6.11 Activity - Examining ARP
Module 7 - CEH v11 Network Services
  •    7.1 DNS
  •    7.2 DNS Records
  •    7.3 NTP
  •    7.4 Authentication
  •    7.5 Biometrics
  •    7.6 Activity - Examining DNS
  •    7.7 Activity - Examining DNS Records
Module 8 - CEH v11 Access Control
  •    8.1 Local Authentication
  •    8.2 Directory Service Authentication
  •    8.3 Extending Authentication
  •    8.4 Authorization
  •    8.5 Activity - Testing Access Control
Module 9 - CEH v11 Intro to Linux
  •    9.1 Linux Overview
  •    9.2 Linux File System
  •    9.3 Linux Core Commands
  •    9.4 Linux Search and Read Commands
  •    9.5 Activity - Exploring Linux
  •    9.6 Activity - Using Linux Core Commands
  •    9.7 Activity - Using Linux Search Commands
  •    9.8 Activity - Using Linux Read Commands
Module 10 - CEH v11 Configuring Linux
  •    10.1 Linux File Permissions
  •    10.2 Linux Special Permissions
  •    10.3 Linux Configuration
  •    10.4 Linux Packages
  •    10.5 Linux User Management
Module 11 - CEH v11 Practicing Linux Configuration
  •    11.1 Activity - Setting Linux Permissions
  •    11.2 Activity - Setting Linux Special Permissions
  •    11.3 Activity - Managing Packages in Kali Linux
  •    11.4 Activity - Managing Users and Groups in Linux
Module 12 - CEH v11 Managing Linux
  •    12.1 Linux Job Scheduling
  •    12.2 Linux File, Directory, and Download Commands
  •    12.3 Linux System Commands
  •    12.4 Linux Network Management
  •    12.5 Linux Firewall
Module 13 - CEH v11 Practicing Linux Management
  •    13.1 Activity - Scheduling Tasks in Linux
  •    13.2 Activity - Using Linux File, Directory, and Download Commands
  •    13.3 Activity - Compiling Malicious Code
  •    13.4 Activity - Using Linux Process and System Commands
  •    13.5 Activity - Using Linux Disk Management and Hardware Commands
  •    13.6 Activity - Using Linux Networking Commands
Module 14 - CEH v11 Intro to Windows
  •    14.1 Windows Overview
  •    14.2 Windows Registry
  •    14.3 Windows Security
Module 15 - CEH v11 Windows Commands
  •    15.1 Windows Commands
  •    15.2 Windows Admin Commands
  •    15.3 Windows Network Commands
  •    15.4 Windows Run Line Commands
  •    15.5 Windows PowerShell
Module 16 - CEH v11 Practicing Windows Commands
  •    16.1 Activity - Using Windows Built-in Commands
  •    16.2 Activity - Using Windows Task Commands
  •    16.3 Activity - Using Windows Admin Commands
  •    16.4 Activity - Using Windows Network Commands
  •    16.5 Activity - Using Windows PowerShell
  •    16.6 Networking and OS Penetration Testing
  •    16.7 Review
Module 17 - CEH v11 Intro to Hacking
  •    17.1 Information Security Overview
  •    17.2 Hacking Concepts
  •    17.3 Ethical Hacking Concepts
  •    17.4 Penetration Testing
  •    17.5 Penetration Testing Part 2
  •    17.6 Activity - Performing a Static Code Review
Module 18 - CEH v11 Information Security
  •    18.1 Cyber Kill Chain Concepts
  •    18.2 Activity - Performing Weaponization
  •    18.3 Information Security
  •    18.4 Security Policies
  •    18.5 Security Controls
  •    18.6 Access Control
Module 19 - CEH v11 Protecting Data
  •    19.1 Data Protection
  •    19.2 Backup Sites
  •    19.3 Vulnerability Management
  •    19.4 SIEM
  •    19.5 Risks
Module 20 - CEH v11 Managing Risk
  •    20.1 Risk Management
  •    20.2 Incident Handling
  •    20.3 Information Security Laws and Standards
  •    20.4 Activity - Assessing Risk
  •    20.5 Ethical Hacking Penetration Testing
  •    20.6 Review
  •    20.7 Conclusion
Certified Ethical Hacker V11 Training Course
Certified Ethical Hacker (CEH) Version 11 (ECC 312-50) Part 1, 2, 3

$79.00

This online cyber security ethical hacking program is the first step in becoming an ethical hacker. You will learn advanced hacking concepts how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

Related Courses

$79.00

The purpose of this course is to help you study for the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) examination, which leads to receiving your CCNP® Enterprise and Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certifications.

$79.00

Whether you are currently running an IT department, looking to advance your career, or the only one in the IT department expected to know and do everything.  This new bundle offers students our most popular courses covering a wide spectrum of learning IT technologies and IT management tools.

$79.00

If you’re a customer-facing technical sales expert, then this course will help you get started talking about blockchain. Blockchain technologies are becoming increasingly important, and as a pre-sales engineer or solutions engineer, it’s vital that you understand how to speak about them. This course will help you become more knowledgeable about blockchain so that you can effectively sell products and services to customers.

$79.00

For years, Microsoft has been the go-to brand for database technology and it remains a top preference among many corporations and individual users alike. This comprehensive training series covers versions 2012 through 2019 of Microsoft SQL Server that are still extensively utilized at present. You will be given an in-depth look into SQL Server administration, database design, analysis services, reporting services, PowerBI and more during this learning program.

UNLOCK

25% OFF

Sign up for updates, discounts, and more.