Certified Ethical Hacker (CEH) Version 11

Course Level: Beginner
Duration: 72 Hrs 58 Min
Total Videos: 484 On-demand Videos

Master the art of ethical hacking with our comprehensive "Certified Ethical Hacker (CEH) Version 11" course. Perfect for IT professionals and anyone preparing for their ethical hacking certification, this course offers an in-depth exploration of various hacking techniques, real-life penetration testing scenarios, and vital security domains, equipping you with the skills to protect your organization's networks against cyber threats.

Learning Objectives

01

Understand the basics of Ethical Hacking and Penetration Testing with CEH v11 Foundations.

02

Gain proficiency in Networking, including Network Addressing, Protocols, and LAN Components.

03

Master the workings of Routing, Network Access, Intrusion Detection, and Network Layers.

04

Develop a deep understanding of Networking Protocols, IP Addressing, and Subnetting.

05

Learn about various Network Services, DNS, NTP, Authentication, and Biometrics.

06

Gain hands-on experience with Linux, including Core Commands, File Permissions, and User Management.

07

Acquire knowledge on Windows operations, Registry, Security, and Command usage.

08

Understand key concepts of Information Security, Hacking, Data Protection, and Risk Management.

Course Description

Step into the captivating world of cybersecurity with our Certified Ethical Hacker (CEH) Version 11 course. This all-inclusive, intensive program is meticulously designed for those passionate about cybersecurity and aspiring for a successful career in this ever-evolving field. The course offers a comprehensive understanding of critical security domains required to qualify as a Certified Ethical Hacker. Unlike other standard courses, our CEH v11 course ensures a profound understanding of various hacking techniques and the nature of different cyber-attacks, rather than just focusing on the tools used in ethical hacking.

The course is expertly curated by seasoned instructor Chrys Thorsen, incorporating real-life examples and actual penetration testing scenarios to provide a practical approach to learning. This in-depth course is an ideal fit for IT professionals such as ethical hackers, system administrators, security analysts, network administrators, web managers, auditors, and security professionals. Additionally, this course serves as an excellent stepping stone for anyone preparing for their ethical hacking certification. The prerequisites for this course include a basic understanding of networking and operating system essentials, along with a 64-bit PC that supports VMware Workstation Player virtualization.

Our CEH v11 course offers a unique blend of theoretical knowledge and practical hands-on experience. It empowers learners to practice Windows and Linux commands, research and download the latest exploit source code, and use it against a target. This course not only prepares you for the CEH certification but also equips you with the knowledge and skills necessary to protect your organization’s networks and systems against cyber threats. It covers the legal and best practice frameworks guiding ethical hacking activities, ensuring you’re ready to conduct audits of a computer or network security system. Enroll in the Certified Ethical Hacker (CEH) Version 11 course today and embark on your journey to becoming a successful cybersecurity professional.

Who Benefits From This Course

  • Individuals interested in cyber security and ethical hacking
  • Professionals currently working in IT or network security fields
  • Those looking to enhance their skills in intrusion detection and network layers
  • IT administrators wanting to learn more about Linux and Windows commands
  • Security analysts seeking to improve their knowledge on information security and data protection
  • Individuals aiming to understand and manage risks related to information security
  • Professionals preparing for the Certified Ethical Hacker (CEH) examination
  • Network engineers and system administrators interested in ethical hacking concepts and penetration testing

Frequently Asked Questions

What are the key differences between Certified Ethical Hacker (CEH) Version 11 and earlier versions?

The Certified Ethical Hacker (CEH) Version 11 introduces significant enhancements and updates compared to its predecessors. Here are some key differences:

  • Updated Curriculum: CEH v11 includes the latest hacking techniques and vulnerabilities identified in recent years. This ensures that learners are well-informed about current threats in cybersecurity.
  • Enhanced Hands-On Labs: The new version provides more practical labs and scenarios, allowing students to apply theoretical knowledge in real-world situations, which is essential for grasping ethical hacking concepts.
  • Focus on Emerging Technologies: CEH v11 addresses topics related to cloud computing, mobile security, and IoT (Internet of Things), reflecting the rapid evolution of technology and the corresponding security challenges.
  • Incorporation of Cybersecurity Frameworks: The course emphasizes best practices and legal frameworks that guide ethical hacking, offering a more comprehensive view of the responsibilities and ethics involved in cybersecurity.
  • Stronger Emphasis on Penetration Testing: Version 11 puts a greater focus on penetration testing methodologies, equipping learners with the skills to conduct thorough security assessments.

These updates make CEH v11 a more relevant and effective certification for aspiring ethical hackers, ensuring they are prepared to tackle contemporary cybersecurity challenges.

What skills and knowledge should I have before enrolling in the CEH v11 course?

Before enrolling in the Certified Ethical Hacker (CEH) Version 11 course, it is highly recommended that learners possess certain foundational skills and knowledge to maximize their understanding and success. Here are the key prerequisites:

  • Basic Networking Knowledge: Familiarity with networking concepts such as TCP/IP, subnets, and common network protocols (e.g., HTTP, DNS) is crucial as ethical hacking heavily involves network security.
  • Operating System Proficiency: A solid understanding of operating systems, particularly Windows and Linux, is essential. Ethical hackers often work in command-line environments, and knowing how to navigate and manipulate these systems is vital.
  • Familiarity with Security Concepts: An understanding of fundamental security concepts, including firewalls, intrusion detection systems, and encryption, will provide context for the techniques taught in the course.
  • Virtualization Skills: Since the course requires using VMware Workstation Player or similar virtualization software, learners should know how to set up and manage virtual machines.
  • Problem-Solving and Analytical Skills: A mindset geared towards troubleshooting and analyzing problems will help learners effectively apply ethical hacking techniques and methodologies.

Having a grasp of these areas will not only prepare you for the CEH course but also enhance your overall competency in the field of cybersecurity.

How does the CEH v11 course prepare me for real-world ethical hacking scenarios?

The Certified Ethical Hacker (CEH) Version 11 course is specifically designed to bridge the gap between theoretical knowledge and practical application in real-world scenarios. Here’s how the course effectively prepares you:

  • Hands-On Labs: The course includes a plethora of hands-on labs where you will engage in real hacking scenarios. This practical exposure allows you to experiment with various hacking techniques and tools in a controlled environment.
  • Real-Life Case Studies: Instructors incorporate real-life examples and case studies, providing insights into successful and failed cyber-attacks. Understanding these scenarios helps students learn from actual incidents.
  • Penetration Testing Frameworks: The course covers established penetration testing methodologies, equipping you with the skills to conduct comprehensive security assessments, identify vulnerabilities, and recommend remediation strategies.
  • Collaboration and Teamwork: Many practical exercises encourage collaboration with peers, mimicking real-world scenarios where ethical hackers often work in teams to tackle complex security challenges.
  • Legal and Ethical Considerations: The course emphasizes the importance of ethical and legal standards in cybersecurity. This knowledge is crucial for conducting audits and ensuring compliance with regulations.

By integrating these elements, the CEH v11 course provides a robust foundation for aspiring ethical hackers to confidently approach real-world cybersecurity challenges.

What are some common misconceptions about ethical hacking?

Ethical hacking is often misunderstood, leading to several misconceptions. Here are some common myths and the truths behind them:

  • Myth 1: Ethical hacking is illegal. Contrary to this belief, ethical hacking is legal when performed with the explicit permission of the organization being tested. Ethical hackers operate within legal boundaries to identify vulnerabilities.
  • Myth 2: All hackers are criminals. While some hackers engage in malicious activities, ethical hackers use their skills to enhance security and protect systems. They work to prevent cyber-attacks, not perpetrate them.
  • Myth 3: You need to be a programming expert. Although programming knowledge can be beneficial, ethical hacking primarily relies on understanding security protocols, networking, and operating systems. Many successful ethical hackers have diverse backgrounds that don’t necessarily include extensive programming skills.
  • Myth 4: Ethical hackers only find vulnerabilities. While identifying vulnerabilities is a key component, ethical hackers also provide recommendations for remediation and work closely with organizations to improve their overall security posture.
  • Myth 5: Ethical hacking is a one-time job. Cybersecurity is an ongoing process. Ethical hackers are often involved in continuous assessments, training, and updates to security protocols to adapt to evolving threats.

Understanding these misconceptions is essential for anyone considering a career in ethical hacking, as it clarifies the role and responsibilities of cybersecurity professionals.

What are the legal and ethical responsibilities of an ethical hacker?

Ethical hackers play a critical role in enhancing cybersecurity, and with that role comes significant legal and ethical responsibilities. Here are the primary responsibilities that ethical hackers must adhere to:

  • Obtain Permission: Before conducting any testing, ethical hackers must obtain explicit written consent from the organization. This legal authorization is crucial to ensure that their activities are lawful.
  • Scope of Work: Define and adhere to the agreed-upon scope of work. This includes specifying what systems can be tested and what methods can be employed. Overstepping these boundaries can lead to legal repercussions.
  • Maintain Confidentiality: Ethical hackers often have access to sensitive information. They must maintain confidentiality and ensure that any data obtained during testing is not disclosed to unauthorized parties.
  • Report Findings Responsibly: Any vulnerabilities or security issues discovered during testing should be reported promptly and responsibly to the organization. Ethical hackers should provide a detailed report outlining the risks and recommended remediation strategies.
  • Continuous Education: The cybersecurity landscape is constantly evolving. Ethical hackers are responsible for staying updated on the latest threats, vulnerabilities, and legal regulations to ensure they operate within the bounds of the law.

By understanding and adhering to these responsibilities, ethical hackers contribute positively to the field of cybersecurity, fostering trust and integrity within the industry.

Included In This Course

Module 61 - CEH v11 Advanced Ethical Hacker Course Intro

  •    61.1 About This Course: Advanced Ethical Hacker
  •    61.2 About the Instructor

Module 62 - CEH v11 Session Hjacking

  •    62.1 Session Hijacking Concepts
  •    62.2 Token-based Authentication
  •    62.3 Compromising a Session Token
  •    62.4 XSS
  •    62.5 CSRF
  •    62.6 Other Attacks

Module 63 - CEH v11 Defending Against Hijacking

  •    63.1 Network Level Hijacking
  •    63.2 Session Hijacking Tools
  •    63.3 Session Hijacking Countermeasures
  •    63.4 Session Penetration Hijacking
  •    63.5 Review

Module 64 - CEH v11 Implementing Intrusion Detection

  •    64.1 IDS-IPS
  •    64.2 Snort
  •    64.3 Snort Rules
  •    64.4 Syslog

Module 65 - CEH v11 Testing Intrusion Detection

  •    65.1 WIPS
  •    65.2 IDS Considerations
  •    65.3 IDS Tools
  •    65.4 IDS Evasion
  •    65.5 IDS-Firewall Evasion Tools
  •    65.6 IDS Scenerios

Module 66 - CEH v11 Implementing Firewalls

  •    66.1 Firewalls
  •    66.2 Packet Filtering Rules
  •    66.3 Firewall Deployments
  •    66.4 Traffic Flow through Firewalls
  •    66.5 Split DNS

Module 67 - CEH v11 Testing Firewallls

  •    67.1 Firewall Tools
  •    67.2 Firewall Evasion
  •    67.3 Firewall Scenarios

Module 68 - CEH v11 Implementing Honeypots

  •    68.1 Honeypots
  •    68.2 Honeypot Detection
  •    68.3 IDS-Firewall Evasion Countermeasures
  •    68.4 IDS-Firewall Honeypot Penetration Testing
  •    68.5 Review

Module 69 - CEH v11 Attacker Webserver

  •    69.1 Webserver Security Overview
  •    69.2 Common Webservers
  •    69.3 Webserver Attacks
  •    69.4 Misconfiguration Attack Examples

Module 70 - CEH v11 Webserver Defense

  •    70.1 Webserver Attack Tools
  •    70.2 Attack Countermeasures
  •    70.3 Webserver Penetration Testing
  •    70.4 Review

Module 71 - CEH v11 Intro To Web Apps

  •    71.1 Web Application Concepts
  •    71.2 Attacking Web Apps

Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities

  •    72.1 A01 - Broken Access Control
  •    72.2 A02 - Cryptographic Failures
  •    72.3 A03 - Injection
  •    72.4 A04 - Insecure Design
  •    72.5 A05 - Security Misconfiguration

Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities

  •    73.1 A06 - Vulnerable and Outdated Components
  •    73.2 A07 - Identification and Authentication Failures
  •    73.3 A08 - Software and Data Integrity Failures
  •    73.4 A09 - Security Logging and Monitoring
  •    73.5 A10 - Server Side Request Forgery

Module 74 - CEH v11 Common Web App Attacks

  •    74.1 XSS Attacks
  •    74.2 CSRF
  •    74.3 Parameter Tampering
  •    74.4 Clickjacking
  •    74.5 SQL Injection

Module 75 - CEH v11 Unauthorized Access Through Web Apps

  •    75.1 Insecure Deserialization Attacks
  •    75.2 IDOR
  •    75.3 Directory Traversal
  •    75.4 Session Management Attacks
  •    75.5 Response Splitting

Module 76 - CEH v11 Web App Overflow Attacks

  •    76.1 Denial of Service
  •    76.2 Overflow Attacks
  •    76.3 XXE Attacks
  •    76.4 Soap Attacks
  •    76.5 Ajax Attacks

Module 77 - CEH v11 Defending Web Apps

  •    77.1 Web App Hacking Tools
  •    77.2 Web Hacking Countermeasures
  •    77.3 Web Application Penetration Testing
  •    77.4 Review

Module 78 - CEH v11 Intro To SQL Injection

  •    78.1 SQL Overview
  •    78.2 SQL Injection Concepts
  •    78.3 Basic SQL Injection

Module 79 - CEH v11 Performing SQL Injection

  •    79.1 Finding Vulnerable Websites
  •    79.2 Error-based SQL Injection
  •    79.3 Union SQL Injection
  •    79.4 Blind SQL Injection
  •    79.5 SQL Injection Scenarios
  •    79.6 Evading Detection

Module 80 - CEH v11 Defending Against SQL Injection

  •    80.1 SQL Injection Tools
  •    80.2 SQL Injection Countermeasures
  •    80.3 Safe Coding Examples
  •    80.4 SQL Wildcards
  •    80.5 SQL Injection Penetration Testing
  •    80.6 Review

Module 81 - CEH v11 Wireless Networking Overview

  •    81.1 Wireless Concepts
  •    81.2 Wireless Signal Encoding
  •    81.3 Wi-Fi Standards
  •    81.4 Wi-Fi Antennas
  •    81.5 Wireless Authentication

Module 82 - CEH v11 Wi-Fi Security

  •    82.1 Wi-Fi Security Standards
  •    82.2 Wireless Network Troubleshooting Tools
  •    82.3 Wi-Fi Discovery Tools
  •    82.4 Sniffing Wi-Fi

Module 83 - CEH v11 Hacking Wi-Fi

  •    83.1 Wi-Fi Attack Types
  •    83.2 Wi-Fi Rogue Access Point Attacks
  •    83.3 Wi-Fi Denial of Service Attacks
  •    83.4 Wi-Fi Password Cracking Attacks
  •    83.5 WEP Cracking

Module 84 - CEH v11 Advanced Wireless Attacks

  •    84.1 WPA-WPA2 Cracking
  •    84.2 WPA3 Attacks
  •    84.3 WPS Cracking
  •    84.4 Wi-Fi Attack Tools for Mobile Devices
  •    84.5 Bluetooth Hacking
  •    84.6 Other Wireless Hacking

Module 85 - CEH v11 Defending Wireless Networks

  •    85.1 Wireless Hacking Countermeasures
  •    85.2 Wireless Security Tools
  •    85.3 Wireless Penetration Testing
  •    85.4 Review

Module 86 - CEH v11 Mobile Platform Overview

  •    86.1 Mobile Platform Overview
  •    86.2 Mobile Device Vulnerabilities
  •    86.3 Mobile Device Attacks

Module 87 - CEH v11 Hacking Android

  •    87.1 Android
  •    87.2 Android Vulnerabilities
  •    87.3 Rooting Android
  •    87.4 Android Exploits
  •    87.5 Android Hacking Tools
  •    87.6 Reverse Engineering an Android App
  •    87.7 Securing Android

Module 88 - CEH v11 Hacking iOS

  •    88.1 iOS
  •    88.2 iOS Vulnerabilities
  •    88.3 Jailbreaking iOS
  •    88.4 iOS Exploits
  •    88.5 iOS Hacking Tools
  •    88.6 Securing iOS

Module 89 - CEH v11 Mobile Platform Defense

  •    89.1 Mobile Device Management
  •    89.2 BYOD
  •    89.3 Mobile Security Guidelines and Tools
  •    89.4 Mobile Device Penetration Testing
  •    89.5 Review

Module 90 - CEH v11 IoT Hacking

  •    90.1 loT Concepts
  •    90.2 loT Infrastructure
  •    90.3 Fog Computing
  •    90.4 loT Vulnerabilities
  •    90.5 loT Threats

Module 91 - CEH v11 IoT Defense

  •    91.1 IoT Hacking Methodologies and Tools
  •    91.2 IoT Hacking Methodolgies and Tools Part 2
  •    91.3 Hacking Countermeasures
  •    91.4 IoT Penetration Testing
  •    91.5 OT Concepts
  •    91.6 Industrial IoT

Module 92 - CEH v11 Operational Technology Overview

  •    92.1 IT-OT Convergence
  •    92.2 ICS
  •    92.3 SCADA
  •    92.4 DCS
  •    92.5 RTU
  •    92.6 PLC
  •    92.7 Addition OT Components

Module 93 - CEH v11 Hacking OT

  •    93.1 OT Variables
  •    93.2 Well-known OT attacks
  •    93.3 OT Attack Methodology and Basic Tools
  •    93.4 OT Reconnaissance
  •    93.5 OT Penetration and Control

Module 94 - CEH v11 Defending OT

  •    94.1 OT Attack Tools
  •    94.2 OT Hacking Countermeasures
  •    94.3 OT Penetration Testing
  •    94.4 Review

Module 95 - CEH v11 Attacking The Cloud

  •    95.1 Cloud Computing Concepts
  •    95.2 Virtualization
  •    95.3 Cloud Types
  •    95.4 Cloud Benefits and Considerations
  •    95.5 Cloud Risks and Vulnerablilities

Module 96 - CEH v11 Cloud Defense

  •    96.1 Cloud Threats and Countermeasures
  •    96.2 Cloud Security Tools
  •    96.3 Cloud Security Best Practices
  •    96.4 Cloud Penetration Testing
  •    96.5 Review

Module 97 - CEH v11 Cryptography Overview

  •    97.1 Cryptography Concepts
  •    97.2 Symetric Encryption
  •    97.3 Asymmetric Encryption
  •    97.4 Public Key Exchange
  •    97.5 PKI

Module 98 - CEH v11 Protecting Data With Crytography

  •    98.1 Digital Certificates
  •    98.2 Digital Signatures
  •    98.3 Hashing
  •    98.4 Email Encryption
  •    98.5 Network Communication Encryption

Module 99 - CEH v11 Protecting Data at Home and in Transit

  •    99.1 Disk Encryption
  •    99.2 VPN Encryption
  •    99.3 Cryptography Tools

Module 100 - CEH v11 Pentesting Cryptography

  •    100.1 Cryptography Attacks
  •    100.2 Cryptography Penetration Testing
  •    100.3 Review
  •    100.4 Conclusion

Module 21 - CEH v11 Ethical Hacker Course Intro

  •    21.1 About this course - Ethical Hacker
  •    21.2 About the Instructor

Module 22 - CEH v11 Intro to Footprinting

  •    22.1 Footprinting Concepts
  •    22.2 Footprinting Methodology
  •    22.3 OSINT Tools
  •    22.4 Advanced Google Search
  •    22.5 Whois Footprinting
  •    22.6 Activity - Performing a Whois Lookup

Module 23 - CEH v11 Footprinting Network Services

  •    23.1 DNS Footprinting
  •    23.2 Website Footprinting
  •    23.3 Email Footprinting
  •    23.4 Network Footprinting
  •    23.5 Footprinting through Social Networking Sites

Module 24 - CEH v11 Defend Against Footprinting

  •    24.1 Competitive Intelligence Gathering
  •    24.2 Footprinting Countermeasures
  •    24.3 Footprinting Penetration Testing
  •    24.4 Review

Module 25 - CEH v11 Intro to Scanning

  •    25.1 Scanning Concepts
  •    25.2 ICMP Discovery Scans
  •    25.3 Other Discovery Scans

Module 26 - CEH v11 Port Scanning

  •    26.1 Ports
  •    26.2 TCP Flags and Handshakes
  •    26.3 TCP Scan Types
  •    26.4 Other Scanning Techniques

Module 27 - CEH v11 Vulnerability Scanning

  •    27.1 Banner Grabbing
  •    27.2 Vulnerability Scanning
  •    27.3 SSDP Scanning

Module 28 - CEH v11 NMAP

  •    28.1 Nmap
  •    28.2 Common Nmap Scans
  •    28.3 Nmap Options
  •    28.4 Nmap Stealth Scans
  •    28.5 Hping and Other Scanners

Module 29 - CEH v11 Firewalls and Intrusion Detection

  •    29.1 Firewall Types
  •    29.2 Firewall Features
  •    29.3 Firewall Features Part 2
  •    29.4 Firewall Configurations
  •    29.5 Intrusion Detection and Prevention

Module 30 - CEH v11 Evading Detection

  •    30.1 Firewall and IDS Evasion
  •    30.2 Firewall and IDS Evasion Part 2
  •    30.3 Firewalking
  •    30.4 Probing a Firewall
  •    30.5 Probing a Firewall Part 2

Module 31 - CEH v11 Proxies and VPNs

  •    31.1 Proxies
  •    31.2 VPNs
  •    31.3 Tor
  •    31.4 Scanning Countermeasures
  •    31.5 Scanning Penetration Testing
  •    31.6 Review

Module 32 - CEH v11 Accessing Vulnerability

  •    32.1 Vulnerability Assessment Overview
  •    32.2 Vulnerability Scoring Systems
  •    32.3 Vulnerability Assessment Tools

Module 33 - CEH v11 Vulnerability Research

  •    33.1 Scanner Output and Reports
  •    33.2 Vulnerability Research
  •    33.3 Review

Module 34 - CEH v11 Intro to Enumeration

  •    34.1 Enumeration Concepts
  •    34.2 Enumeration Techniques and Tools
  •    34.3 Service and Application Enumeration
  •    34.4 SMB and NetBIOS Enumeration

Module 35 - CEH v11 Service Enumeration

  •    35.1 SNMP Enumeration
  •    35.2 LDAP Enumeration
  •    35.3 DNS Enumeration
  •    35.4 SMTP Enumeration
  •    35.5 NTP Enumeration

Module 36 - CEH v11 Advanced Enumeration

  •    36.1 Remote Connection Enumeration
  •    36.2 File Transfer Enumeration
  •    36.3 VoIP Enumeration
  •    36.4 IPSEC Enumeration
  •    36.5 IPv6 Enumeration
  •    36.6 BGP Enumeration

Module 37 - CEH v11 Command Line Enumeration

  •    37.1 Windows Command Line Enumeration
  •    37.2 Linux Command Line Enumeration
  •    37.3 Linux Command Line Enumeration Part 2

Module 38 - CEH v11 Defending Against Enumeration

  •    38.1 Enumeration Countermeasures
  •    38.2 Enumeration Countermeasures Part 2
  •    38.3 Enumeration Penetration Testing
  •    38.4 Review

Module 39 - CEH v11 Intro to System Hacking

  •    39.1 System Hacking Concepts
  •    39.2 System Hacking Tools and Frameworks
  •    39.3 Searchsploit
  •    39.4 Compiling and Running Exploits

Module 40 - CEH v11 System Hacking with Metasploit

  •    40.1 Metasploit
  •    40.2 Metasploit Search
  •    40.3 Metasploit Exploits and Payloads
  •    40.4 Metasploit Meterpreter
  •    40.5 Metasploit Connectivity
  •    40.6 Metasploit Impersonation and Migration

Module 41 - CEH v11 Further Attacking a Compromised System

  •    41.1 Netcat
  •    41.2 Pivoting
  •    41.3 Netcat Relays
  •    41.4 Metasploit Post Exploitation Modules
  •    41.5 Common Operating System Exploits

Module 42 - CEH v11 Hacking an Operating System

  •    42.1 Hacking Windows
  •    42.2 Hacking Linux
  •    42.3 Network Service Exploits
  •    42.4 Password Attacks

Module 43 - CEH v11 Password Cracking Overview

  •    43.1 Dictionary Attack
  •    43.2 Brute Force Attack
  •    43.3 Password Spraying
  •    43.4 Rainbow Tables

Module 44 - CEH v11 Performing Password Attacks

  •    44.1 Network Service Password Attacks
  •    44.2 Password Cracking Tools
  •    44.3 Online Password Cracking Sites
  •    44.4 Windows Password Cracking
  •    44.5 Linux Password Cracking
  •    44.6 Other Methods for Obtaining Passwords

Module 45 - CEH v11 Using Exploits

  •    45.1 Keylogging
  •    45.2 Spyware
  •    45.3 Rootkits
  •    45.4 Buffer Overflows
  •    45.5 Privilege Escalation
  •    45.6 Hiding Files

Module 46 - CEH v11 Hiding Information

  •    46.1 Alternate Data Streams
  •    46.2 Steganography
  •    46.3 Creating and Maintaining Remote Access
  •    46.4 Hiding Evidence

Module 47 - CEH v11 Covering Tracks

  •    47.1 Covering Tracks in Windows
  •    47.2 Covering Tracks in Linux
  •    47.3 System Hacking Counter-Measures
  •    47.4 System Hacking Penetration Testing
  •    47.5 Review

Module 48 - CEH v11 Malware Overview

  •    48.1 Intro to Malware
  •    48.2 Virus Overview
  •    48.3 Virus Types
  •    48.4 Self-Hiding Viruses
  •    48.5 Worms
  •    48.6 Trojans
  •    48.7 Trojan Types
  •    48.8 RATS

Module 49 - CEH v11 Hacking With Malware

  •    49.1 Ransomware
  •    49.2 Botnets
  •    49.3 Covert Channel Trojans
  •    49.4 Banking Trojans
  •    49.5 Rootkits

Module 50 - CEH v11 Creating Malware

  •    50.1 Other Malware
  •    50.2 Malware Makers
  •    50.3 Dropper and Stage Creation
  •    50.4 Exploit Kits

Module 51 - CEH v11 Detecting Malware

  •    51.1 Malware Detection
  •    51.2 Malware Detection Part 2
  •    51.3 Malware Analysis

Module 52 - CEH v11 Defending Against Malware

  •    52.1 Malware Reverse Engineering
  •    52.2 Malware Countermeasures
  •    52.3 Malware Penetration Testing
  •    52.4 Review

Module 53 - CEH v11 Sniffing

  •    53.1 Sniffing Concepts
  •    53.2 Types of Sniffing
  •    53.3 Sniffing Protocols
  •    53.4 Sniffing Tools

Module 54 - CEH v11 Spoofing and MITM

  •    54.1 ARP
  •    54.2 ARP Spoofing
  •    54.3 MITM
  •    54.4 MAC Attacks
  •    54.5 MAC Spoofing
  •    54.6 DHCP Attacks

Module 55 - CEH v11 Defending Against Poisoning and Sniffing

  •    55.1 Name Resolution Poisoning
  •    55.2 VLAN Hopping
  •    55.3 Sniffing Counter Measures
  •    55.4 Sniffing Penetration Testing
  •    55.5 Review

Module 56 - CEH v11 Social Engineering

  •    56.1 Social Engineering Concepts
  •    56.2 Social Engineering Techniques
  •    56.3 Social Engineering Examples
  •    56.4 Social Engineering Tools

Module 57 - CEH v11 Defending Against Social Engineering

  •    57.1 Social Media
  •    57.2 Identity Theft
  •    57.3 Insider Threats
  •    57.4 Social Engineering Countermeasures
  •    57.5 Social Engineering Penetration Testing
  •    57.6 Review

Module 58 - CEH v11 Denial-of-Service

  •    58.1 DoS-DDoS Concepts
  •    58.2 Volumetric Attacks
  •    58.3 Fragmentation Attacks
  •    58.4 State Exhaustion Attacks
  •    58.5 Application Layer Attacks

Module 59 - CEH v11 Advanced DoS Attacks

  •    59.1 Protocol Attacks
  •    59.2 Other Attacks
  •    59.3 Botnets

Module 60 - CEH v11 Defending Against Denial-of-Service

  •    60.1 DoS-DDoS Attack Tools
  •    60.2 DoS-DDoS Countermeasures
  •    60.3 Dos Penetration Testing
  •    60.4 Review

Module 1 - CEH v11 Foundations Course Introduction

  •    1.1 About this course: CEH Foundations
  •    1.2 About the Instructor

Module 2 - CEH v11 Introduction To Networking

  •    2.1 Networking Overview
  •    2.2 Network Scope
  •    2.3 Network Addressing
  •    2.4 Activity - Examining Network Addressing

Module 3 - CEH v11 Lan Components

  •    3.1 Protocols, Ports, Sockets
  •    3.2 Network Topologies
  •    3.3 LAN Devices
  •    3.4 LAN Devices Part 2
  •    3.5 VLANs
  •    3.6 Activity - Examining Ports and Sockets
  •    3.7 Activity - Examining Switches and VLANs

Module 4 - CEH v11 Routing and Network Access

  •    4.1 Routers
  •    4.2 Layer 3 Switches
  •    4.3 Modems and Remote Access
  •    4.4 Firewalls and Proxies
  •    4.5 Activity - Examining Routing
  •    4.6 Activity - Examining VLAN Routing
  •    4.7 Activity - Examining Firewall Rules

Module 5 - CEH v11 Intrusion Detection and Network Layers

  •    5.1 IDS and IPS
  •    5.2 OSI Model
  •    5.3 TCP-IP
  •    5.4 Activity - Examining Network Layers

Module 6 - CEH v11 Networking Protocols and Addressing

  •    6.1 Layer 4 Protocols
  •    6.2 Layer 3 Protocols
  •    6.3 Layer 2 Protocols
  •    6.4 IP Addressing
  •    6.5 Subnetting
  •    6.6 DHCP
  •    6.7 Activity - Examining TCP
  •    6.8 Activity - Examining UDP
  •    6.9 Activity - Examining IP
  •    6.10 Activity - Examining ICMP
  •    6.11 Activity - Examining ARP

Module 7 - CEH v11 Network Services

  •    7.1 DNS
  •    7.2 DNS Records
  •    7.3 NTP
  •    7.4 Authentication
  •    7.5 Biometrics
  •    7.6 Activity - Examining DNS
  •    7.7 Activity - Examining DNS Records

Module 8 - CEH v11 Access Control

  •    8.1 Local Authentication
  •    8.2 Directory Service Authentication
  •    8.3 Extending Authentication
  •    8.4 Authorization
  •    8.5 Activity - Testing Access Control

Module 9 - CEH v11 Intro to Linux

  •    9.1 Linux Overview
  •    9.2 Linux File System
  •    9.3 Linux Core Commands
  •    9.4 Linux Search and Read Commands
  •    9.5 Activity - Exploring Linux
  •    9.6 Activity - Using Linux Core Commands
  •    9.7 Activity - Using Linux Search Commands
  •    9.8 Activity - Using Linux Read Commands

Module 10 - CEH v11 Configuring Linux

  •    10.1 Linux File Permissions
  •    10.2 Linux Special Permissions
  •    10.3 Linux Configuration
  •    10.4 Linux Packages
  •    10.5 Linux User Management

Module 11 - CEH v11 Practicing Linux Configuration

  •    11.1 Activity - Setting Linux Permissions
  •    11.2 Activity - Setting Linux Special Permissions
  •    11.3 Activity - Managing Packages in Kali Linux
  •    11.4 Activity - Managing Users and Groups in Linux

Module 12 - CEH v11 Managing Linux

  •    12.1 Linux Job Scheduling
  •    12.2 Linux File, Directory, and Download Commands
  •    12.3 Linux System Commands
  •    12.4 Linux Network Management
  •    12.5 Linux Firewall

Module 13 - CEH v11 Practicing Linux Management

  •    13.1 Activity - Scheduling Tasks in Linux
  •    13.2 Activity - Using Linux File, Directory, and Download Commands
  •    13.3 Activity - Using Linux Edit and Archive Commands
  •    13.4 Activity - Compiling Malicious Code
  •    13.5 Activity - Using Linux Process and System Commands
  •    13.6 Activity - Using Linux Disk, Hardware, and Network Commands

Module 14 - CEH v11 Intro to Windows

  •    14.1 Windows Overview
  •    14.2 Windows Registry
  •    14.3 Windows Security

Module 15 - CEH v11 Windows Commands

  •    15.1 Windows Commands
  •    15.2 Windows Admin Commands
  •    15.3 Windows Network Commands
  •    15.4 Windows Run Line Commands
  •    15.5 Windows PowerShell

Module 16 - CEH v11 Practicing Windows Commands

  •    16.1 Activity - Using Windows Built-in Commands
  •    16.2 Activity - Using Windows Task Commands
  •    16.3 Activity - Using Windows Admin Commands
  •    16.4 Activity - Using Windows Network Commands
  •    16.5 Activity - Using Windows PowerShell
  •    16.6 Networking and OS Penetration Testing
  •    16.7 Review

Module 17 - CEH v11 Intro to Hacking

  •    17.1 Information Security Overview
  •    17.2 Hacking Concepts
  •    17.3 Ethical Hacking Concepts
  •    17.4 Penetration Testing
  •    17.5 Penetration Testing Part 2
  •    17.6 Activity - Performing a Static Code Review

Module 18 - CEH v11 Information Security

  •    18.1 Cyber Kill Chain Concepts
  •    18.2 Activity - Performing Weaponization
  •    18.3 Information Security
  •    18.4 Security Policies
  •    18.5 Security Controls
  •    18.6 Access Control

Module 19 - CEH v11 Protecting Data

  •    19.1 Data Protection
  •    19.2 Backup Sites
  •    19.3 Vulnerability Management
  •    19.4 SIEM
  •    19.5 Risks

Module 20 - CEH v11 Managing Risk

  •    20.1 Risk Management
  •    20.2 Incident Handling
  •    20.3 Information Security Laws and Standards
  •    20.4 Activity - Assessing Risk
  •    20.5 Ethical Hacking Penetration Testing
  •    20.6 Review
  •    20.7 Conclusion
Vision What’s Possible
Join today for over 50% off