Get our Bestselling Ethical Hacker Course V13 for Only $12.99

For a limited time, check out some of our most popular courses for free on Udemy.  View Free Courses.

Ethical Hacking for the v13 Exam

Course Level: Intermediate, Experienced
Duration: 68 Hrs 56 Min
Total Videos: 320 On-demand Videos

Master ethical hacking skills to advance your cybersecurity career by understanding attack methods, defense strategies, and real-world security workflows.

Purchase Options

You can purchase this course individually on Udemy, or unlock every course we offer with the exclusive 365 Training Pass—one low price, unlimited access for a full year.

Learning Objectives

01

Understand the fundamentals of information security, ethical hacking, and risk management.

02

Learn how to use open-source intelligence (OSINT) tools and techniques for footprinting and reconnaissance.

03

Acquire skills to conduct network scanning and enumeration for potential vulnerabilities.

04

Understand the process of vulnerability analysis and how to exploit system vulnerabilities.

05

Learn to identify, analyze, and mitigate malware threats and denial-of-service attacks.

06

Gain knowledge of various hacking methods for web servers, web applications, and mobile platforms.

07

Understand the risks and vulnerabilities associated with cloud computing and IoT devices.

08

Learn the principles of cryptography and how to use cryptographic tools and techniques for data protection.

Course Description

When you sit down for a CEH exam, the first thing that matters is whether you can think like the person on the other side of the keyboard. Ethical Hacking CEH v13 Course is built to help you do exactly that: understand attack methods, map them to defensive controls, and recognize the patterns that show up again and again in real security work. I built this course around the practical skills that matter in the field, not around buzzwords or vague theory. If you can identify how an attack starts, how it spreads, and how it leaves clues behind, you are already becoming much harder to fool, much easier to trust, and far more useful to a security team.

This on-demand training is designed for self-paced study, so you can start immediately and work through the material on your schedule. That is important, because CEH v13 is not a “watch it once and hope for the best” subject. The exam expects you to understand reconnaissance, scanning, enumeration, evasive techniques, incident response concepts, risk management, and the modern use of AI in ethical hacking. Those are not separate islands. They connect. A good ethical hacker understands how one action informs the next. This course keeps that thread visible from the first lesson to the last.

What This Ethical Hacking CEH v13 Course Actually Teaches You

I want to be very direct here: this course is not about memorizing a list of tools and hoping the exam asks you about the same commands in the same order. That is a weak strategy, and it fails fast once you move beyond the test. What you are really learning is methodology. You start with the fundamentals of information security, then move into the mindset and workflow of ethical hacking, and from there into the technical phases that make up a real assessment.

The early modules build the foundation. You study elements of security, the cyber kill chain, and the MITRE ATT&CK framework so you can describe attacks in a structured way. That matters because security teams do not just need someone who can say “this looks bad.” They need someone who can explain why it is bad, where it fits in the attack lifecycle, and what countermeasure should break that chain. Later modules move into footprinting, reconnaissance, scanning, enumeration, and the practical interpretation of network and host information. Those are the stages where most attackers quietly gather what they need before anyone notices.

You also get exposure to the use of AI in ethical hacking, which is no longer a side topic. Security professionals are increasingly expected to understand how AI-assisted tools can accelerate analysis, widen reconnaissance, and support defensive decision-making. I cover that thoughtfully, because you should know both the value and the limits of those tools. If you overtrust automation, you become careless. If you ignore it, you fall behind.

Why the CEH v13 Mindset Matters Before You Touch a Tool

One of the biggest mistakes students make is jumping straight to tools. They want to use Nmap, Shodan, or other utilities before they understand what problem they are solving. That approach gives you shaky results and a weak exam performance. In this course, I make you build the mental model first. You learn how an attacker thinks about target selection, information gathering, and exposure analysis. Then the tools make sense because you know what question each one answers.

The CEH v13 exam is built around practical awareness. You are expected to recognize how threats are staged, where security controls fit, and how attackers use publicly available data to reduce effort and increase success. That is why this course starts with the basics of security, risk, incident management, and standards. Those topics may seem formal at first, but they give you the language to discuss security work in a professional setting. If you are aiming for roles where you need to work with analysts, administrators, auditors, or incident responders, that language matters.

The strongest ethical hackers are not the ones who know the most tools. They are the ones who know when a tool is the wrong answer.

That principle shows up all through the course. You will see where a manual review is more useful than an automated scan, where OSINT is enough to expose risk, and where enumeration provides more actionable detail than broad discovery. That is the kind of judgment employers care about.

Footprinting and Reconnaissance: Where Real Attacks Begin

Footprinting is where the work gets interesting, because it is where the target starts giving away information without realizing it. In the footprinting and reconnaissance sections, you explore OSINT tools, advanced search techniques, WHOIS data, DNS details, website clues, email patterns, network tracing, and social network analysis. These are not abstract topics. They are the same kinds of techniques used to identify exposed assets, map relationships, and uncover weak points before an attack ever begins.

This is one of the most valuable sections in the Ethical Hacking CEH v13 Course because it teaches restraint and precision. Good reconnaissance does not mean collecting everything; it means collecting the right things. A company’s domain records can expose naming conventions. A website can reveal technologies and hidden directories. Public social media can reveal staff structure, business timing, or even the kind of software a team is using. If you understand those signals, you understand how attackers build context.

The practical value here is substantial for roles in security operations, penetration testing, and threat analysis. You are not just learning how to gather data. You are learning how to evaluate exposure, document findings, and recommend countermeasures. That is the difference between trivia and professional security work.

Scanning, Nmap, and the Art of Turning Noise into Signal

Scanning is where many beginners think they are doing the real work. In practice, scanning is only useful if you know what you are looking for and what a result actually means. This course covers discovery scans, port scans, other scan types, scanning tools, firewall and IDS evasion concepts, proxies, and scanning countermeasures. I also spend time on Nmap because it remains one of the most important tools in the security toolbox. If you cannot read Nmap output carefully, you are not really using Nmap—you are just running it.

Students often underestimate how much interpretation matters. An open port does not automatically mean a vulnerability. A filtered port does not mean safety. A service fingerprint is only useful if you know which version details matter and what those details imply. That is why the scanning section includes more than syntax. You will learn to connect the scan to the next step: enumeration, validation, and risk assessment.

For job performance, this is the kind of knowledge that supports penetration tester, security analyst, vulnerability analyst, and red team assistant roles. It is also relevant for defensive teams. A defender who understands scanning behavior can better tune controls, investigate alerts, and spot anomalous network activity. If you are serious about CEH preparation, this is a section you should study carefully and revisit as needed.

Enumeration: The Details Attackers Want Most

Enumeration is where a target begins to reveal structure. While scanning tells you what is present, enumeration tells you what is usable. This course covers SMB/NetBIOS enumeration, file transfer enumeration, WMI enumeration, SNMP enumeration, LDAP enumeration, and DNS enumeration. Each of these areas can expose accounts, shares, services, host names, directory data, and network relationships that help an attacker move from broad visibility to specific opportunity.

This is one of those topics where students either “get it” or they do not. The turning point comes when you realize that security failures are often not dramatic. They are ordinary misconfigurations, permissive services, stale accounts, weak access controls, or information leakage through management protocols. Enumeration exposes those weaknesses. If you can read the results carefully, you can identify where exposure is concentrated and what a defender should lock down first.

The CEH v13 exam expects you to know not just what these protocols are, but why they matter during an assessment. That is exactly why this course emphasizes process. You should leave this section able to explain how enumeration differs from scanning, what information each protocol can reveal, and how to reduce the exposure when you are on the defensive side of the table.

Frameworks, Risk, and Incident Management: The Professional Side of Hacking

A lot of technical training stops at tools. That is a mistake. If you want to work in security, you have to understand the business side of the work: risk, incident handling, standards, and legal boundaries. This course covers information assurance, risk management, incident management, and information security laws and standards because those topics shape what ethical hacking is allowed to do and how its results are used.

Frameworks like the Cyber Kill Chain and MITRE ATT&CK are not just checkboxes for exam prep. They help you organize what you see into a repeatable model. If you are writing findings, briefing a manager, or supporting a remediation plan, structure matters. A good report does not merely list vulnerabilities. It explains impact, likelihood, attack path, and practical next steps. That is why I spend time showing how these frameworks fit together.

This section is especially useful if you are aiming for a career that touches governance, compliance, or security operations. Employers want people who can speak clearly about risk, not just demonstrate a technical trick. If you understand how incidents are managed and how controls are documented, you will stand out from the crowd of tool-only learners.

Using AI in Ethical Hacking Without Getting Careless

The AI discussion in this course is there for a reason. Security teams are already using AI-assisted tools to help with analysis, triage, reconnaissance, and content generation. Ethical hackers need to understand what those tools can accelerate and what they can distort. Used well, AI can help summarize information, spot patterns, and speed up repetitive research. Used badly, it can encourage lazy assumptions and false confidence.

I treat this topic with the seriousness it deserves. You should never assume an AI-generated conclusion is correct just because it sounds polished. In ethical hacking, accuracy matters more than confidence. AI can support analysis, but it cannot replace your judgment. That distinction is becoming more important as more organizations adopt automated security workflows and AI-assisted investigation tools.

For CEH v13 preparation, this topic helps you stay current with the exam’s direction and with workplace expectations. A modern security professional should know how AI changes both offense and defense. You do not need to be a data scientist to benefit from that understanding. You do need to know how to ask the right questions and verify the answers.

Who Should Take This Course

This course is a strong fit if you are preparing for the EC-Council® Certified Ethical Hacker (C|EH™) certification, but it is also useful if you simply want to become more competent in offensive security concepts. I would especially recommend it to help desk technicians moving into security, system administrators who need to understand attack behavior, network professionals expanding into security, junior analysts, and aspiring penetration testers.

You do not need to be a veteran hacker to start, but you should be comfortable with basic networking ideas such as IP addressing, ports, DNS, and common operating system concepts. If those terms still feel foreign, you may want to spend a little time strengthening your foundation first. CEH v13 is accessible, but it is not shallow. You will get more out of it if you already know how networks are put together and how services behave.

It is also a good course for managers and technical leads who need a clear understanding of what ethical hackers actually do. You do not have to run exploits every day to benefit from learning the logic behind reconnaissance, scanning, enumeration, and defensive countermeasures.

How This Course Helps You Prepare for CEH v13

The CEH v13 exam is broad, and that breadth is exactly why a structured course matters. You need to know terminology, tools, concepts, and attack methodology well enough to recognize them in different forms. This course is designed to support that kind of preparation. It walks you through the major topics in a sequence that makes sense: first the security foundation, then information gathering, then network discovery, then deeper enumeration, and finally the defensive and ethical context around the work.

According to the U.S. Bureau of Labor Statistics, information security analysts earned a median annual wage of about $120,360 in May 2023, and the field is projected to grow much faster than average. That does not mean a certification alone guarantees a salary. It does mean that validated security knowledge can support a real career move when it is paired with hands-on understanding and solid professional judgment.

As you study, pay attention to the relationships between topics rather than treating them as isolated facts. The exam and the job both reward people who can move from a clue to a conclusion. That is why the content in this Ethical Hacking CEH v13 Course is built around workflow, not trivia.

What You Should Know Before You Start

You do not need to arrive as a seasoned offensive security professional, but a few basics will help a great deal. I recommend that you be comfortable with the following before you begin:

  • Basic TCP/IP concepts, including IP addressing, ports, and protocols
  • Core Windows and Linux navigation concepts
  • What DNS does and why it matters
  • Common web and network service terminology
  • General security concepts such as confidentiality, integrity, and availability

If you already work in IT, you probably know more than you think. If you are newer to the field, this course can still be the right move, but give yourself time to review foundational networking concepts as you go. CEH v13 is most useful when you study actively: pause the video, think through the scenario, and ask yourself what the attacker would try next. That habit is worth more than passive watching.

Career Value and the Roles This Knowledge Supports

Studying ethical hacking is useful whether or not you plan to become a full-time penetration tester. The knowledge transfers into several security-adjacent roles because it improves how you think about exposure, validation, and defense. A security analyst who understands scanning and enumeration will investigate alerts more intelligently. A network administrator who understands footprinting will notice what information is unintentionally exposed. A junior consultant who understands ATT&CK can communicate findings in the language clients expect.

Common job titles that benefit from this material include:

  • Security Analyst
  • Junior Penetration Tester
  • Vulnerability Analyst
  • SOC Analyst
  • Network Security Administrator
  • Information Security Specialist

Employers care about whether you can reason through a problem, document what you found, and explain the risk in plain English. This course helps you build those habits. It gives you a framework for understanding attacks and a vocabulary for discussing them professionally. That combination is what creates career momentum.

Final Word: How to Get the Most from the Course

If you want the best results, do not rush. The temptation with any on-demand security course is to treat it like a checklist. Resist that. Review the frameworks carefully, pay attention to reconnaissance methods, and make sure you understand why a scan result matters before you move on. Ethical hacking is a discipline built on evidence. The more carefully you train your eye, the better your judgment becomes.

The Ethical Hacking CEH v13 Course is for students who want more than test cram. It is for learners who want the logic behind the exam, the vocabulary behind the tools, and the confidence to think like a professional. If that is what you want, this course gives you a strong, practical path forward.

CEH™ and Certified Ethical Hacker™ are trademarks of EC-Council®.

All certification names and trademarks are the property of their respective trademark holders. This course is for educational purposes and does not imply endorsement by or affiliation with any certification body.

Who Benefits From This Course

  • Information security professionals seeking to enhance their skills in ethical hacking and cybersecurity.
  • IT administrators interested in understanding vulnerabilities and improving security measures within their organizations.
  • Network engineers looking to gain insights into network security and attack detection.
  • Software developers aiming to learn secure coding practices and how to defend against web application attacks.
  • Business leaders and executives who want to understand the implications of cybersecurity threats on their organizations.
  • Students and recent graduates aspiring to start a career in cybersecurity and ethical hacking.
  • Compliance officers needing to stay informed about security laws and standards relevant to their industry.
  • Incident response teams wanting to refine their skills in managing and mitigating security incidents.
  • Individuals interested in developing advanced skills in penetration testing and vulnerability assessment.
  • Those seeking to understand the intersection of artificial intelligence and cybersecurity.

Frequently Asked Questions

What topics are covered in the CEH v13 exam, and how does this course prepare me for them?

The CEH v13 exam covers a broad range of topics related to offensive security, including reconnaissance, scanning, enumeration, vulnerability analysis, system hacking, malware threats, sniffing and spoofing, social engineering, denial-of-service attacks, session hijacking, attack detection and prevention, web server and web application hacking, SQL injection, wireless and mobile hacking, IoT and OT hacking, cloud computing, cryptography, and practical challenge labs.

This course is designed to systematically guide you through these domains, starting with foundational security principles and advancing toward technical attack methodologies. It emphasizes understanding attack lifecycle patterns, attack frameworks like MITRE ATT&CK, and the application of real-world tools such as Nmap, Shodan, and Metasploit. Additionally, it covers how to interpret findings, assess risks, and implement countermeasures, enabling you to recognize, analyze, and defend against modern threats while reinforcing the practical skills needed to succeed in the exam and real-world scenarios.

How does this course help me develop the mindset of an ethical hacker for the CEH v13 exam?

This course emphasizes building a strategic mindset rather than just memorizing tools and commands. It starts with security fundamentals, teaching you how attackers think about target selection, information gathering, and attack pathways. The focus is on understanding the attacker's methodology, motives, and patterns, which enables you to anticipate and recognize attack vectors effectively.

<pBy learning to think like an attacker, you will better understand how to identify vulnerabilities, interpret reconnaissance data, and evaluate security controls. This mindset helps you to answer exam questions that test your ability to analyze scenarios critically, propose appropriate countermeasures, and communicate findings in a professional manner—skills that are crucial for both passing the CEH v13 exam and performing effectively as a security professional.

What role does understanding reconnaissance and footprinting play in the CEH v13 certification?

Reconnaissance and footprinting are critical initial phases in the attack lifecycle, where attackers gather information to identify potential vulnerabilities. In this course, you learn techniques such as OSINT tools, advanced search methods, WHOIS data, DNS analysis, social media profiling, and network tracing. These skills help you identify exposed assets, weak configurations, and hidden relationships that could be exploited.

Understanding these techniques allows you to evaluate how attackers build context and plan their operations, which is essential in both offensive assessments and defensive monitoring. For the CEH v13 exam, mastering footprinting means you can recognize these activities and understand their significance in attack scenarios, ultimately supporting your ability to simulate real-world attacks and recommend effective mitigation strategies.

How does this course prepare me to interpret scanning results and use tools like Nmap effectively for the CEH v13 exam?

This course dives deep into scanning concepts, focusing on the importance of interpreting results rather than just running commands. You learn discovery scans, port scans, and advanced techniques, with special emphasis on reading and understanding Nmap output. You will explore how to distinguish between open, filtered, and closed ports, and what service versions imply about vulnerabilities.

<pThis practical approach ensures you can turn raw scan data into actionable intelligence, supporting subsequent enumeration and risk assessment stages. It also helps you understand evasion techniques and countermeasures. For the CEH v13 exam, this skill is vital because it demonstrates your ability to analyze network data accurately and apply that knowledge effectively in real-world security assessments.

Why is understanding frameworks like MITRE ATT&CK and risk management important in the CEH v13 exam, and how does this course cover them?

Frameworks like MITRE ATT&CK and the Cyber Kill Chain organize attack techniques into structured models, helping security professionals understand, detect, and respond to threats systematically. This course emphasizes these frameworks to teach you how to classify attack phases, identify indicators of compromise, and develop effective defense strategies.

Additionally, understanding risk management, incident handling, and compliance standards shapes the way you interpret vulnerability findings and communicate with stakeholders. The course incorporates these topics to ensure you can articulate the impact, likelihood, and mitigation strategies for security issues. Mastering these concepts is essential for the CEH v13 exam because it demonstrates your ability to think holistically about security operations and threat mitigation, which are highly valued in professional security roles.

Included In This Course

Module 1: Information Security and Ethical Hacking Overview

  •    1.0 Introduction to CEH v13
  •    1.1 Elements of Security
  •    1.2 Cyber Kill Chain
  •    1.3 MITRE ATT&CK Framework
  •    1.3.1 ACTIVITY - Examining MITRE ATT&CK
  •    1.4 Hacking
  •    1.5 Ethical Hacking
  •    1.6 Information Assurance
  •    1.7 Risk Management
  •    1.8 Incident Management
  •    1.9 Information Security Laws and Standards
  •    1.10 Using AI in Ethical Hacking
  •    1.11 Information Security and Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  •    2.1 Footprinting Concepts
  •    2.2 OSINT Tools
  •    2.2.1 ACTIVITY - Finding Internet-Connected Devices with Shodan
  •    2.2.2 ACTIVITY - Performing OSINT with theHarvester
  •    2.3 Advanced Google Search
  •    2.3.1 ACTIVITY - Google Hacking
  •    2.4 Whois Footprinting
  •    2.4.1 ACTIVITY - Footprinting with WHOIS
  •    2.5 DNS Footprinting
  •    2.5.1 ACTIVITY - Enumerating DNS
  •    2.6 Website Footprinting
  •    2.7 Email Footprinting
  •    2.8 Network Footprinting
  •    2.8.1 ACTIVITY - Tracing a Network Path with Traceroute
  •    2.9 Social Network Footprinting
  •    2.10 Enhanced OSINT
  •    2.11 Footprinting-and-Reconnaissance-Countermeasures
  •    2.12 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  •    3.1 Scanning Concepts
  •    3.2 Discovery Scans
  •    3.3 Port Scans
  •    3.4 Other Scan Types
  •    3.5 Scanning Tools
  •    3.6 NMAP
  •    3.6.1 ACTIVITY - Port Scanning and Fingerprinting with NMAP
  •    3.7 Firewall and IDS Evasion
  •    3.8 Proxies
  •    3.9 AI Enhanced SCANNING Tools
  •    3.10 Scanning counter-measures
  •    3.11 Scanning Networks Review

Module 4: Enumeration

  •    4.1 Enumeration Overview
  •    4.2 SMB_NetBIOS_Enumeration
  •    4.3 File Transfer Enumeration
  •    4.4 WMI Enumeration
  •    4.5 SNMP Enumeration
  •    4.6 LDAP Enumeration
  •    4.7 DNS Enumeration
  •    4.8 SMTP Enumeration
  •    4.8.1 ACTIVITY - SMTP Enumeration
  •    4.9 Remote Connection Enumeration
  •    4.10 Website Enumeration
  •    4.10.1 ACTIVITY - Enumerating Website Directories
  •    4.11 Local User and Active Directory Enumeration
  •    4.12 Other Enumeration Types
  •    4.13 Enumeration Using AI
  •    4.14 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  •    5.1 Vulnerability Scanning
  •    5.1.1 ACTIVITY - Vulnerability Scanning with OpenVAS
  •    5.2 Vulnerability Assessment
  •    5.3 AI Assisted Vulnerability Assessment
  •    5.4 Vulnerability Analysis Review

Module 6: System Hacking

  •    6.1 System Hacking Concepts
  •    6.2 Common Operating System Exploits
  •    6.3 Buffer Overflows
  •    6.4 System Hacking Tools and Frameworks
  •    6.5 Metasploit
  •    6.5.1 ACTIVITY - Hacking with Metasploit
  •    6.6 Meterpreter
  •    6.6.1 ACTIVITY - Having Fun with Meterpreter
  •    6.7 Keylogging_and_Spyware-
  •    6.8 Netcat
  •    6.8.1 ACTIVITY - Using Netcat
  •    6.9 Windows Exploitation
  •    6.10 Windows Post- Exploitation
  •    6.10.1 ACTIVITY - Windows Post Exploitation with Eternal Blue
  •    6.10.2 ACTIVITY - Escalating Privilege with Token Passing
  •    6.11 Linux Exploitation
  •    6.11.1 ACTIVITY - Pwn a Linux Target from Start to Finish
  •    6.12 Linux Post-Exploitation
  •    6.13 Password Attacks
  •    6.13.1 ACTIVITY - Pass-the-Hash
  •    6.13.2 ACTIVITY - Password Spraying with Hydra
  •    6.14 Linux Password Cracking
  •    6.14.1 ACTIVITY - Password Cracking with Hashcat
  •    6.14.2 ACTIVITY - Brute Forcing with Medusa
  •    6.15 Additional Password Attacks
  •    6.16 Attacking Network Services
  •    6.16.1 ACTIVITY - Cracking Linux Passwords with John-the-Ripper
  •    6.17 Other Methods for Obtaining Passwords
  •    6.18 Network Service Attacks
  •    6.19 Lateral Movement
  •    6.19.1 ACTIVITY - Preparing to Pivot
  •    6.19.2 ACTIVITY - Lateral Movement through Pivoting
  •    6.20 Persistence
  •    6.20.1 ACTIVITY - Creating a Persistent Netcat Back Door
  •    6.20.2 ACTIVITY - APT Persistence
  •    6.21 Hiding Data
  •    6.21.1 ACTIVITY - Hiding Data with Steganography
  •    6.22 Covering Tracks
  •    6.22.1 ACTIVITY - Cover Tracks with Log Tampering
  •    6.23 Side-Channel-Attacks
  •    6.24 AI-Powered Vulnerability Exploitation Tools
  •    6.25 System Hacking Countermeasures
  •    6.26 System Hacking Review

Module 7: Malware Threats

  •    7.1 Malware Overview
  •    7.2 Viruses
  •    7.3 Trojans
  •    7.4 Rootkits
  •    7.5 Other Malware
  •    7.6 Advanced Malware Threats
  •    7.7 Malware Makers
  •    7.7.1 ACTIVITY - Creating a Malware Dropper and Handler
  •    7.8 Malware Deployment
  •    7.9 Malware Detection
  •    7.10 Malware Analysis
  •    7.10.1 ACTIVITY - Analyzing the SolarWinds Orion Hack
  •    7.11 AI and Malware
  •    7.12 Malware Countermeasures
  •    7.13 Malware Threats Review

Module 8: Sniffing and Spoofing

  •    8.1 Network Sniffing
  •    8.2 Sniffing Tools
  •    8.2.1 ACTIVITY - Intercepting Data with Wireshark
  •    8.2.2 ACTIVITY - Capturing Files off the Network
  •    8.3 MAC and ARP Attacks
  •    8.3.1 ACTIVITY - Performing an MITM Attack with Ettercap
  •    8.4 Name Resolution Attacks
  •    8.4.1 ACTIVITY - Spoofing an Authentication Service with Responder
  •    8.5 Other Layer 2 Attacks
  •    8.6 Sniffing and Spoofing Countermeasures
  •    8.7 Sniffing and Spoofing Review

Module 9: Social Engineering

  •    9.1 Social Engineering Concepts
  •    9.2 Social Engineering Techniques
  •    9.3 Social Engineering Tools
  •    9.3.1 ACTIVITY - Phishing for Credentials
  •    9.3.2 ACTIVITY - OMG Cable Baiting
  •    9.4 Social Media, Identity Theft, Insider Threats
  •    9.5 Social Engineering and AI
  •    9.6 Social Engineering Countermeasures
  •    9.7 Social Engineering Review

Module 10: Denial-of-Service

  •    10.1 DoS-DDoS Concepts
  •    10.2 Volumetric Attacks
  •    10.3 Fragmentation Attacks
  •    10.4 State Exhaustion Attacks
  •    10.5 Application Layer Attacks
  •    10.5.1 ACTIVITY - Conducting a Slowloris DDoS Attack
  •    10.6 Other Attacks
  •    10.7 DoS Tools
  •    10.7.1 ACTIVITY - Performing a HOIC DDoS Attack
  •    10.8 DoS Countermeasures
  •    10.9 DoS Review

Module 11: Session Hijacking

  •    11.1 Session Hijacking
  •    11.2 Compromising a Session Token
  •    11.3 XSS
  •    11.3.1 ACTIVITY - Web Session Hijacking with XSS
  •    11.4 CSRF
  •    11.5 Other Web Hijacking Attacks
  •    11.6 Network-Level Session Hijacking
  •    11.7 Session Hijacking Tools
  •    11.8 Session Hijacking Countermeasures
  •    11.9 Session Hijacking Review

Module12: Attack Detection and Prevention

  •    12.1 Types of IDS
  •    12.2 Snort
  •    12.3 Logging and Monitoring
  •    12.4 IDS Considerations
  •    12.5 IDS Evasion
  •    12.6 Firewalls
  •    12.7 Packet Filtering Rules
  •    12.8 Firewall Deployments
  •    12.9 Split DNS
  •    12.10 Firewall Product Types
  •    12.11 Firewall Evasion
  •    12.11.1 ACTIVITY - Busting the DOM for WAF Evasion
  •    12.12 NAC and Endpoint Security
  •    12.13 NAC and EDR Evasion
  •    12.14 Honeypots
  •    12.15 Evasion Countermeasures
  •    12.16 Attack Detection and Prevention Review

Module 13: Hacking Web Servers

  •    13.1 Web Server Operations
  •    13.2 Hacking Web Servers
  •    13.3 Common Web server Attacks
  •    13.4 Webserver Attack Tools
  •    13.5 AI and Webserver Attacks
  •    13.6 Hacking Web Servers Countermeasures
  •    13.7 Hacking Web Servers Review

Module 14: Hacking Web Applications

  •    14.1 Web Application Concepts
  •    14.2 Attacking Web Apps
  •    14.3 A01 Broken Access Control
  •    14.4 A02 Cryptographic Failures
  •    14.5 A03 Injection
  •    14.5.1 ACTIVITY - Command Injection
  •    14.6 A04 Insecure Design
  •    14.7 A05 Security Misconfiguration
  •    14.8 A06 Vulnerable and Outdated Components
  •    14.9 A07 Identification and Authentication Failures
  •    14.10 A08 Software and Data integrity Failures
  •    14.11 A09 Security Logging and Monitoring Failures
  •    14.12 A10 Server-Side Request Forgery
  •    14.13 XSS Attacks
  •    14.14 CSRF
  •    14.15 Parameter Tampering
  •    14.15.1 ACTIVITY - Parameter Tampering with Burp Suite
  •    14.16 Clickjacking
  •    14.16.1 ACTIVITY - Clickjacking with XSS and iFrame Injection
  •    14.17 SQL Injection
  •    14.17.1 ACTIVITY - Using SQL Injection to Steal Sensitive Data
  •    14.18 Insecure Deserialization Attacks
  •    14.19 IDOR
  •    14.19.1 ACTIVITY - IDOR Abuse with Burp Suite
  •    14.20 Directory Traversal
  •    14.20.1 ACTIVITY - Directory Traversal
  •    14.21 Session Management Attacks
  •    14.22 Response Splitting
  •    14.23 Overflow Attacks
  •    14.24 XXE Attacks
  •    14.25 Web App DoS
  •    14.26 Soap Attacks
  •    14.27 AJAX Attacks
  •    14.28 Web API Hacking
  •    14.29 Webhooks and Web Shells
  •    14.30 Web App Hacking Tools
  •    14.31 AI and Web Application Attacks
  •    14.32 Hacking Web Applications Countermeasures
  •    14.33 Hacking Web Applications Review

Module 15: SQL Injection

  •    15.1 SQL Injection Overview
  •    15.2 Basic SQL Injection
  •    15.3 Finding Vulnerable Websites
  •    15.4 Error-based SQL Injection
  •    15.5 Union SQL Injection
  •    15.5.1 ACTIVITY - SQLi on a Live Website - Part 1
  •    15.5.2 ACTIVITY - SQLi on a Live Website - Part 2
  •    15.6 Blind SQL Injection
  •    15.7 SQL Injection Tools
  •    15.8 Evading Detection
  •    15.9 Analyzing SQL Injection
  •    15.10 SQL Injection Countermeasures
  •    15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  •    16.1 Wireless Concepts
  •    16.2 Wireless Security Standards
  •    16.3 WI-FI Discovery Tools
  •    16.4 Common Wi-Fi Attacks
  •    16.5 Wi-Fi Password Cracking
  •    16.6 WEP Cracking
  •    16.7 WPA,WPA2,WPA3 Cracking
  •    16.7.1 ACTIVITY - WPA2 KRACK Attack
  •    16.8 WPS Cracking
  •    16.9 Bluetooth Hacking
  •    16.10 Other Wireless Hacking
  •    16.11 Wireless Security Tools
  •    16.12 Wireless Hacking Countermeasures
  •    16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  •    17.1 Mobile Platform Overview
  •    17.2 Mobile Device Attacks
  •    17.3 Android Overview
  •    17.4 Rooting Android
  •    17.5 Android Exploits
  •    17.5.1 ACTIVITY - Pwn a Mobile Device
  •    17.6 Android-based Hacking Tools
  •    17.7 Reverse Engineering an Android App
  •    17.8 Securing Android
  •    17.9 iOS Overview
  •    17.10 Jailbreaking iOS
  •    17.11 IOS Exploits
  •    17.12 iOS-based Hacking Tools
  •    17.13 Reverse Engineering an iOS App
  •    17.14 Securing iOS
  •    17.15 Mobile Device Management
  •    17.16 Hacking Mobile Platforms Countermeasures
  •    17.17 Hacking Mobile Platforms Review

Module 18: IoT Hacking & OT Hacking

  •    18.1 IoT Overview
  •    18.2 IoT Infrastructure
  •    18.3 IoT Vulnerabilities and Threats
  •    18.4 IoT Hacking Methodology and Tools
  •    18.4.1 ACTIVITY - Card Cloning with Flipper Zero
  •    18.5 IoT Hacking Countermeasures
  •    18.6 OT Concepts
  •    18.7 IT-OT Convergence
  •    18.8 OT Components
  •    18.9 OT Vulnerabilities
  •    18.10 OT Attack Methodology and Tools
  •    18.11 OT Hacking Countermeasures
  •    18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  •    19.1 Cloud Computing Concepts
  •    19.2 Cloud Types
  •    19.3 Cloud Benefits and Considerations
  •    19.4 Cloud Risks and Vulnerabilities
  •    19.5 AWS Hacking
  •    19.5.1 ACTIVITY - AWS S3 Bucket Hacking
  •    19.6 Azure Cloud Hacking
  •    19.7 Google Cloud Hacking
  •    19.8 Container Hacking
  •    19.9 Cloud Threat Countermeasures
  •    19.10 Cloud Computing Review

Module 20: Cryptography

  •    20.1 Cryptography Concepts
  •    20.2 Symmetric Encryption
  •    20.2.1 ACTIVITY - Symmetric Encryption
  •    20.3 Asymmetric Encryption
  •    20.3.1 ACTIVITY - Asymmetric Encryption
  •    20.4 Public Key Exchange
  •    20.5 PKI
  •    20.5.1 ACTIVITY - Generating and Using an Asymmetric Key Pair
  •    20.6 Digital Signatures
  •    20.7 Hashing
  •    20.7.1 ACTIVITY - Calculating Hashes
  •    20.8 Common Encryption Use Cases
  •    20.9 Cryptography Tools
  •    20.10 Cryptography Attacks
  •    20.11 Cryptography Review
  •    20.12 Course Conclusion

Module 21: Challenge Lab

  •    21.1-ACTIVITY-Challenge-Lab-Introduction
  •    21.2-ACTIVITY-Flag 1 - Port Authority, Please!
  •    21.3-ACTIVITY-Flag 2 - Moo-ve Fast and Break Things
  •    21.4-ACTIVITY-Flag 3 - Pixels, Packets & Patient X
  •    21.5-ACTIVITY-Flag 4 - Hexes and Hashes
  •    21.6-ACTIVITY-Flag 5 - APT & the PowerShell Symphony
  •    21.7-ACTIVITY-Flag 6 - Script Kiddie's Revenge
  •    21.8-ACTIVITY-Flag 7 - Oh Mannie, You Shouldn't Have!
  •    21.9-ACTIVITY-Report