This course is a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, every lesson and topic are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning. In this Foundations course, students will learn how networks, protocols, and networking devices work. They will understand the security limits found in a traditional network and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer network. They will examine the controls used to protect a company’s digital assets—and what it takes to circumvent such controls. |
Certified Ethical Hacker (CEH) Version 11 (ECC 312-50)
SKU: ceh-v11-part1
$49.99Price
- Module 1 - CEH v11 Foundations Course Introduction 1 About this course: CEH Foundations 1.2 About the Instructor
- Module 2 - CEH v11 Introduction To Networking 1 Networking Overview 2.2 Network Scope 2.3 Network Addressing 2.4 Activity - Examining Network AddressinG
- Module 3 - CEH v11 Lan Components 1 Protocols, Ports, Sockets 3.2 Network Topologies 3.3 LAN Devices 3.4 LAN Devices Part 2 3.5 VLANs 3.6 Activity - Examining Ports and Sockets 3.7 Activity - Examining Switches and VLANs Module 1 - CEH v11 Foundations Course Introduction 1 About this course: CEH Foundations 1.2 About the Instructor Module 2 - CEH v11 Introduction To Networking 1 Networking Overview 2.2 Network Scope 2.3 Network Addressing 2.4 Activity - Examining Network AddressinG Module 3 - CEH v11 Lan Components 1 Protocols, Ports, Sockets 3.2 Network Topologies 3.3 LAN Devices 3.4 LAN Devices Part 2 3.5 VLANs 3.6 Activity - Examining Ports and Sockets 3.7 Activity - Examining Switches and VLANs
- Module 4 - CEH v11 Routing and Network Access 4.1 Routers 4.2 Layer 3 Switches 4.3 Modems and Remote Access 4.4 Firewalls and Proxies 4.5 Activity - Examining Routing 4.6 Activity - Examining VLAN Routing 4.7 Activity - Examining Firewall RuleS
- Module 5 - CEH v11 Intrusion Detection and Network Layers 5.1 IDS and IPS 5.2 OSI Model 5.3 TCP-IP 5.4 Activity - Examining Network Layers
- Module 6 - CEH v11 Networking Protocols and Addressing 6.1 Layer 4 Protocols 6.2 Layer 3 Protocols 6.3 Layer 2 Protocols 6.4 IP Addressing 6.5 Subnetting 6.6 DHCP 6.7 Activity - Examining TCP 6.8 Activity - Examining UDP 6.9 Activity - Examining IP 6.10 Activity - Examining ICMP 6.11 Activity - Examining ARP
- Module 7 - CEH v11 Network Services 7.1 DNS 7.2 DNS Records 7.3 NTP 7.4 Authentication 7.5 Biometrics 7.6 Activity - Examining DNS 7.7 Activity - Examining DNS Records
- Module 8 - CEH v11 Access Control 8.1 Local Authentication 8.2 Directory Service Authentication 8.3 Extending Authentication 8.4 Authorization 8.5 Activity - Testing Access Control
- Module 9 - CEH v11 Intro to Linux 9.1 Linux Overview 9.2 Linux File System 9.3 Linux Core Commands 9.4 Linux Search and Read Commands 9.5 Activity - Exploring Linux 9.6 Activity - Using Linux Core Commands 9.7 Activity - Using Linux Search Commands 9.8 Activity - Using Linux Read Commands
- Module 10 - CEH v11 Configuring Linux 10.1 Linux File Permissions 10.2 Linux Special Permissions 10.3 Linux Configuration 10.4 Linux Packages 10.5 Linux User Management
- Module 11 - CEH v11 Practicing Linux Configuration 11.1 Activity - Setting Linux Permissions 11.2 Activity - Setting Linux Special Permissions 11.3 Activity - Managing Packages in Kali Linux 11.4 Activity - Managing Users and Groups in Linux
- Module 12 - CEH v11 Managing Linux 12.1 Linux Job Scheduling 12.2 Linux File, Directory, and Download Commands 12.3 Linux System Commands 12.4 Linux Network Management 12.5 Linux Firewall
- Module 13 - CEH v11 Practicing Linux Management 13.1 Activity - Scheduling Tasks in Linux 13.2 Activity - Using Linux File, Directory, and Download Commands 13.3 Activity - Compiling Malicious Code 13.4 Activity - Using Linux Process and System Commands 13.5 Activity - Using Linux Disk Management and Hardware Commands 13.6 Activity - Using Linux Networking Commands
- Module 14 - CEH v11 Intro to Windows 14.1 Windows Overview 14.2 Windows Registry 14.3 Windows Security
- Module 15 - CEH v11 Windows Commands 15.1 Windows Commands 15.2 Windows Admin Commands 15.3 Windows Network Commands 15.4 Windows Run Line Commands 15.5 Windows PowerShell
- Module 16 - CEH v11 Practicing Windows Commands 16.1 Activity - Using Windows Built-in Commands 16.2 Activity - Using Windows Task Commands 16.3 Activity - Using Windows Admin Commands 16.4 Activity - Using Windows Network Commands 16.5 Activity - Using Windows PowerShell 16.6 Networking and OS Penetration Testing 16.7 Review
- Module 17 - CEH v11 Intro to Hacking 17.1 Information Security Overview 17.2 Hacking Concepts 17.3 Ethical Hacking Concepts 17.4 Penetration Testing 17.5 Penetration Testing Part 2 17.6 Activity - Performing a Static Code Review
- Module 18 - CEH v11 Information Security 18.1 Cyber Kill Chain Concepts 18.2 Activity - Performing Weaponization 18.3 Information Security 18.4 Security Policies 18.5 Security Controls 18.6 Access Control
- Module 19 - CEH v11 Protecting Data 19.1 Data Protection 19.2 Backup Sites 19.3 Vulnerability Management 19.4 SIEM 19.5 Risks
- Module 20 - CEH v11 Managing Risk 20.1 Risk Management 20.2 Incident Handling 20.3 Information Security Laws and Standards 20.4 Activity - Assessing Risk 20.5 Ethical Hacking Penetration Testing 20.6 Review 20.7 Conclusion
- Module 21 - CEH v11 Ethical Hacker Course Intro 21.1 About this course - Ethical Hacker 21.2 About the Instructor
- Module 22 - CEH v11 Intro to Footprinting 22.1 Footprinting Concepts 22.2 Footprinting Methodology 22.3 OSINT Tools 22.4 Advanced Google Search 22.5 Whois Footprinting 22.6 Activity - Performing a Whois Lookup
- Module 23 - CEH v11 Footprinting Network Services 23.1 DNS Footprinting 23.2 Website Footprinting 23.3 Email Footprinting 23.4 Network Footprinting 23.5 Footprinting through Social Networking Sites
- Module 24 - CEH v11 Defend Against Footprinting 24.1 Competitive Intelligence Gathering 24.2 Footprinting Countermeasures 24.3 Footprinting Penetration Testing 24.4 Review
- plus 30 more