Description
This course is the first step in becoming an ethical hacker. You will learn how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.
Learn to be an Ethical Hacker
This is an exciting training series teaching students to become an ethical hacker. This Extensive CEH v11 Instructional Series Includes 3 Individual Courses:
- Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
- Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
- Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)
- Certified Ethical Hacker (CEH) Version 12
What is an Ethical Hacker
Ethical hacking, also known as “white hat” hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hackers use their expertise to identify and fix vulnerabilities in systems, rather than exploit them for personal gain or to cause harm. This type of hacking is typically done with the permission of the owner of the system being tested and is often done by cybersecurity professionals as a way to prevent malicious hackers, who are sometimes referred to as “black hat” hackers, from gaining access to a system.
Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Includes
- Copies of all slides used in course
- Flashcards
- Games
- Practice Exam Questions/Test
- Certificate of Completion
This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, all lessons and topics are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning.
In this Foundations course, students will learn how networks, protocols, and networking devices work. They will understand the security limits found in a traditional network and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer network. They will examine the controls used to protect a company’s digital assets—and what it takes to circumvent such controls.
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Includes
- Copies of all slides used in course
- Flashcards
- Games
- Practice Exam Questions/Test
- Certificate of Completion
Course description:
Ethical Hacker is the second in a three-part comprehensive series on white-hat hacking. Students will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a computer system, collect evidence of success, and escape unnoticed. As before, every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.
Students will learn to hack Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks. They will crack passwords, intercept transmissions, use malware to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service their way to “pwning” a target*. Along with such venerable tools as nmap and netcat, students will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. They will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.
* To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Includes
- Copies of all slides used in course
- Flashcards
- Games
- Practice Exam Questions/Test
- Certificate of Completion
Course description:
Advanced Ethical Hacker is the last in a three-part comprehensive series on white-hat hacking. In this course, students will take their pentesting skills to the next level, branching out into websites, Wi-Fi, mobile devices, IoT/OT, and cloud computing. They will employ encryption, hijack sessions, evade firewalls and intrusion detection, and test honeypots.
Students will evaluate a wide array of exploits against web apps. These include website defacement, command/SQL/iFrame injection, man-in-the-browser parameter tampering, cross-site scripting and request forgeries, and attacks against XXE, SOAP, and AJAX. Students will then learn how to deploy a Wi-Fi “pineapple”, performing Evil Twin, KARMA, and KR00K attacks on wireless clients. They will crack WPA2 and WPS while learning the secret vulnerabilities of WPA3. They will hack mobile devices, steal files from an iPhone, capture audio and video from an Android phone, hack Bluetooth, clone an RFID badge, crack an encrypted NFC card, and plant a Raspberry PI “back door” on a target network. They will then move on to more exotic targets such as the Internet of Things, Industrial Control/SCADA Systems, and cloud-based networks.
Why you should take this course:
This course ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a “script kiddie”. Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct a successful ethical hacking campaign.
Intended audience:
This course is intended for IT professionals including:
- Ethical hackers
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Auditors
- Security Professionals
Course prerequisites:
Before taking this course:
- You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required).
- You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later.
Certified Ethical Hacker (CEH) Version 12
Course Includes
- Copies of all slides used in course
- Flashcards
- Games
- Practice Exam Questions/Test
- Certificate of Completion
Course description:
The most recent version of EC-Council’s Certified Ethical Hacker v12 series is called Certified Ethical Hacker v12. Learn the skills to do research, find and scan targets, evaluate vulnerabilities, and test attack strategies and equipment.. This online CEH training course focuses on finding a solution to the problem of successfully breaching a target network, gathering proof of accomplishment, and making an undetected exit. Step-by-step guided practice with actual hardware- and software-based hacking tools is integrated into every course and topic. Chrys Thorsen, the instructor, offers commentary from the field along with practical advice and lessons learnt through lecture and hands-on activities.
An extensive grasp of ethical hacking phases, attack vectors, and preventive countermeasures is provided by the Certified Ethical Hacker (CEH) v12 course. The goal of this course is to give students the abilities they need to recognize system vulnerabilities and take appropriate action to safeguard them. This course guarantees thorough understanding of ethical hacking by covering a wide range of issues, from malware threats and mobile platform hacking to footprinting and reconnaissance.
Students will work with a range of practical exercises and real-world settings, including vulnerability analysis, OSINT tools, and Nmap scanning. After completing this course, students will have a firm grasp of ethical hacking concepts, methods, and resources, which will equip them for both the CEH certification test and a future in cybersecurity.
Possible Jobs You Can Get With This Knowledge from Certified Ethical Hacker (CEH) v12
With the skills acquired from the CEH v12 course, you will be suited for roles such as:
- Ethical Hacker
- Penetration Tester
- Information Security Analyst
- Cybersecurity Consultant
- Network Security Engineer
- IT Security Administrator
- Security Auditor
These roles span across multiple industries, providing a robust career path in the ever-growing field of cybersecurity.
Programme Benefits:
What will you get with this package? A comprehensive learning path from beginner to advanced ethical hacker, that prepares you for a career in cybersecurity;
Expert delivery by practitioners such as Chrys Thorsen, a professional with years of real-world experience;
Updated Content: Learn about modern trends and technologies in the world of cybersecurity, including the very latest version of the CEH certification.
Hands-On Experience Labs that are practical and richly designed offer simulation real-world scenarios that give confidence to apply skills in the work setup.
CAREER OPPORTUNITIES
Graduates of the CEH Programme are well-placed for a wide range of roles in cybersecurity, including:
Ethical Hacker, Penetration Tester, Security Analyst, Network Security Engineer, Information Security Consultant.
Average Salary in South Africa:
There is a high demand for ethical hackers and cybersecurity professionals, demanding an average salary ranging from ZAR 400,000 to ZAR 900,000 per year, depending on the experience and qualification level of the candidate.
Why Choose This Programme?
The CEH programme from the Cyber Studies Institute provides in-depth curricula, expert instructions, and hands-on learning. This course has been designed for people at the beginner level and those with experience in an IT career but wishing to specialize in cybersecurity. This means that it will provide tools and knowledge for your academic and professional success. Moreover, CEH itself is an international certification leading up to ample opportunities worldwide and locally in South Africa.
Enroll Now
To enroll for this course, simply click on Enroll Now at the bottom of the screen and follow the check out procedure.
Grace –
I loved the interactive quizzes throughout the course. They kept me engaged and helped me retain information.
Siphokazi –
The quality and value provided by CSI are unmatched. Thank you for the incredible course!