Certified Ethical Hacker will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
The importance of ethical hacking isn't in the breaking, it's in the fixing. To that end, you will need to understand remediation, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.
The CEH is a very dense exam. It covers a very broad range of material. This course will be a good resource for you to understand not only the material but the breadth of the material. As EC-Council expects you to have two years of experience before you can even register to take the exam, I don't expect this course alone will be enough for you to pass the test. Hands-on experience will help a lot. While this course is an excellent way to start preparing for the exam, I will also mention other resources you can use to set yourself up for success.
400 Practice Questions With Answers
312-50v11 EC-Council Certified Ethical Hacker CEH v11 ,VCE test , Q&A PDF Book ,VCE exam , Q&A emulator (VCE emulator is for Windows)
The Top Subjects You Will Learn
- Footprinting
- Scanning Network
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial Of Services
- Hacking Web Servers
- Hacking Web Application
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platform
- ioT Hacking
- Cloud Computing
- Cryptography
Requirements
-
Experience with TCP/IP networking
-
Familiarity with command line systems
-
Text length of individual points can be shorter or longer depending on your needs
-
Be able to launch applications on a computer system and operate them
-
Understanding of basic computer architectural components -- processor, memory, disk
Top Companies Offer This Course To Their Employees
Certificate Of Completion
Receive Your "Certificate Of Completion" At Then End Of This Course.
Pricing Options
-
$89.95
Regular price
Certified Ethical Hacker and CEH are registered trademarks with EC-Council. Their use here is not an indication that any of the material here is authorized or endorsed by EC-Council.
Course curriculum
-
1
-
CEH Review Guide
-
Computer Security Dictionary
-
312-50v11 Exam Q&A
-
Download Quesitons And Answers Emulators
-
Installing And Running Kali On Your Windows 10 Computer
-
Download Kali Linux For Windows 10
-
Installing Kali Linux 2.0 as ISO image
-
Installing Kali Linux 2.0 as a Virtual Machine (VMware) Part 2
-
-
2
-
Introduction To Current Cyber Threats
-
Pre-History
-
Taking A Look Back In History
-
Cyber Crime Evolution
-
Popular Myths About IT Security
-
Myths #2 - Never Been Hacked
-
Myths 2 - You Don't Need Any Protection Software Or Hardware
-
Myths #3 - IT Security Is Always A Priority
-
Trends In IT Security
-
The Birth Of Technology Society
-
EXERCISE - How Much Info Can You Gather
-
Fake Identity
-
Online Privacy
-
Analyzing Sniffing Software
-
Cyber War
-
Objective #1 - Data Security - Introduction
-
Confidentiality Of Data
-
EXERCISE - Finding Confidential Data With Search Engines
-
Integrity Of Data
-
-
3
-
Introduction - Network Security
-
OSI Model #1 - Physical Layer
-
OSI Model #2 - Data Link Layer
-
Threats MAC Spoofing
-
Threats ARP Poisoning
-
EXERCISE - Data Link Layer Attack
-
OSI Model #3 - Network Layer
-
TCP Tunnelling Over ICMP
-
Threats Enumerating Remote Computers
-
EXERCISE - Transport Laywer Attack Using METASPLOIT
-
EXERCISE - Transport Layer Attack Using METASPLOIT PART 2
-
OSI Model 5 - Session Layer
-
OSI Model 6 - Presentation Layer
-
OSI Model 7 - Application Layer
-
Exercise Application Layer Attacks
-
Backtrack Attack Demonstration
-
Man-In-The-Middle And Denial Of Service Attacks
-
Modifying Transmitted Packets
-
Unencrypted Protocols
-
-
4
-
Designing Computer Networks - Introduction
-
Subnetting IPv4
-
Subnetting IPv6
-
IPv6 Address Notation
-
DMZ Demilitarized Zone
-
Protocols And Services IP SEC
-
Network Address Translation
-
Network Access Control RADIUS
-
-
5
-
Introduction To Monitoring Transmitted Data
-
Monitoring Transmitted Data - Basic Informations
-
Intrusion Detection Systems
-
Why Are Firewalls And NIDS Not Enough
-
Wireshark - Introduction To Network Analysis
-
How To Use Wireshark
-
Analyzing Captured Data
-
How To Analyze Telnet Protocol
-
Intrusion Detection
-
Scanning Computers
-
-
6
-
Wireless Networks
-
WIFI Security Solutions - Introduction
-
WIFI - Working Principles
-
Other Wireless Technologies
-
Threats And Risks
-
Ineffective Solutions
-
Authentication Methods
-
802.11 WEP
-
802.11i WEP
-
Threats Of WIFI Networks
-
Client Attacks Launching A Rogue Access Point
-
Client Attacks Evil Twin
-
Client attacks Denial Of Service
-
Exercise WPA Attack
-
-
7
-
Operating Systems Security - Introduction
-
Security Boundaries
-
Three Core
-
Exercise OS Boundaries
-
Process Isolation
-
Kernel Mode Code Signing
-
Java Virtual Machine And Code Access Security
-
Malware
-
Exercise - Vulnerability
-
Exercise Identifying Suspicious Process
-
Demonstration Process Explorer
-
Exercise - Detecting Rootkits
-
Exercise Security Evaluation
-
-
8
-
Authentication And Authorization - Introduction
-
Authentication Users
-
How Secure Is Your Password
-
Authentication Protocols And Services
-
LM Hash
-
Cached Credentials
-
KERBEROS
-
Identity Theft
-
Exercise Offline Attacks
-
Using Online Cracking Services
-
-
9
-
Windows Security - What You'll Learn
-
User Account Control
-
UAC Configuration
-
Additional Security Features - ASLR And DEP
-
PatchGuard
-
Encryption - Key Protection
-
Drive Encryption
-
BitLocker
-
BitLocker To Go Reader
-
File And Folder Encryption - EFS
-
Exercise EFS
-