Certified Ethical Hacker (CEH) Career Course

(2 customer reviews)
Sale!

Leading the way

Certified Ethical Hacker (CEH) Career Course

(2 customer reviews)

| Courses: 3 parts
| Total Course Video Hours:
70
|  Videos: 482
|  Topics: 100
|  Course Access: 12 Months Unlimited Access
|  Study Method: Online Video Lessons
|  Course Type: Certificate Course
|  Award: Cyber Studies Institute
|  International Certification (optional): EC-Council (CEH 312-50 exam)

Course Fee:

R2600,00

Current Special Ends in:

Days
Hours
Minutes
Seconds

Description

This course is the first step in becoming an ethical hacker. You will learn how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

Learn to be an Ethical Hacker

This is an exciting training series teaching students to become an ethical hacker. This Extensive CEH v11 Instructional Series Includes 3 Individual Courses:

  • Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 12

What is an Ethical Hacker

Ethical hacking, also known as “white hat” hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hackers use their expertise to identify and fix vulnerabilities in systems, rather than exploit them for personal gain or to cause harm. This type of hacking is typically done with the permission of the owner of the system being tested and is often done by cybersecurity professionals as a way to prevent malicious hackers, who are sometimes referred to as “black hat” hackers, from gaining access to a system.

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, all lessons and topics are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning.

In this Foundations course, students will learn how networks, protocols, and networking devices work. They will understand the security limits found in a traditional network and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer network. They will examine the controls used to protect a company’s digital assets—and what it takes to circumvent such controls.

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

 

Course description:

Ethical Hacker is the second in a three-part comprehensive series on white-hat hacking. Students will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a computer system, collect evidence of success, and escape unnoticed. As before, every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

Students will learn to hack Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks. They will crack passwords, intercept transmissions, use malware to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service their way to “pwning” a target*. Along with such venerable tools as nmap and netcat, students will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. They will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.

* To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

Course description:

Advanced Ethical Hacker is the last in a three-part comprehensive series on white-hat hacking. In this course, students will take their pentesting skills to the next level, branching out into websites, Wi-Fi, mobile devices, IoT/OT, and cloud computing. They will employ encryption, hijack sessions, evade firewalls and intrusion detection, and test honeypots.

Students will evaluate a wide array of exploits against web apps. These include website defacement, command/SQL/iFrame injection, man-in-the-browser parameter tampering, cross-site scripting and request forgeries, and attacks against XXE, SOAP, and AJAX. Students will then learn how to deploy a Wi-Fi “pineapple”, performing Evil Twin, KARMA, and KR00K attacks on wireless clients. They will crack WPA2 and WPS while learning the secret vulnerabilities of WPA3. They will hack mobile devices, steal files from an iPhone, capture audio and video from an Android phone, hack Bluetooth, clone an RFID badge, crack an encrypted NFC card, and plant a Raspberry PI “back door” on a target network. They will then move on to more exotic targets such as the Internet of Things, Industrial Control/SCADA Systems, and cloud-based networks.

Why you should take this course:

This course ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a “script kiddie”. Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct a successful ethical hacking campaign.

Intended audience:

This course is intended for IT professionals including:

  • Ethical hackers
  • System Administrators
  • Network Administrators
  • Engineers
  • Web managers
  • Auditors
  • Security Professionals

Course prerequisites:

Before taking this course:

  • You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required).
  • You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later.

 

Certified Ethical Hacker (CEH) Version 12

Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

Course description:

The most recent version of EC-Council’s Certified Ethical Hacker v12 series is called Certified Ethical Hacker v12. Learn the skills to do research, find and scan targets, evaluate vulnerabilities, and test attack strategies and equipment.. This online CEH training course focuses on finding a solution to the problem of successfully breaching a target network, gathering proof of accomplishment, and making an undetected exit. Step-by-step guided practice with actual hardware- and software-based hacking tools is integrated into every course and topic. Chrys Thorsen, the instructor, offers commentary from the field along with practical advice and lessons learnt through lecture and hands-on activities.

An extensive grasp of ethical hacking phases, attack vectors, and preventive countermeasures is provided by the Certified Ethical Hacker (CEH) v12 course. The goal of this course is to give students the abilities they need to recognize system vulnerabilities and take appropriate action to safeguard them. This course guarantees thorough understanding of ethical hacking by covering a wide range of issues, from malware threats and mobile platform hacking to footprinting and reconnaissance.

Students will work with a range of practical exercises and real-world settings, including vulnerability analysis, OSINT tools, and Nmap scanning. After completing this course, students will have a firm grasp of ethical hacking concepts, methods, and resources, which will equip them for both the CEH certification test and a future in cybersecurity.

 

Possible Jobs You Can Get With This Knowledge from Certified Ethical Hacker (CEH) v12

With the skills acquired from the CEH v12 course, you will be suited for roles such as:

  • Ethical Hacker
  • Penetration Tester
  • Information Security Analyst
  • Cybersecurity Consultant
  • Network Security Engineer
  • IT Security Administrator
  • Security Auditor

These roles span across multiple industries, providing a robust career path in the ever-growing field of cybersecurity.

 

Programme Benefits:

What will you get with this package? A comprehensive learning path from beginner to advanced ethical hacker, that prepares you for a career in cybersecurity;

Expert delivery by practitioners such as Chrys Thorsen, a professional with years of real-world experience;

Updated Content: Learn about modern trends and technologies in the world of cybersecurity, including the very latest version of the CEH certification.

Hands-On Experience Labs that are practical and richly designed offer simulation real-world scenarios that give confidence to apply skills in the work setup.

 

CAREER OPPORTUNITIES

Graduates of the CEH Programme are well-placed for a wide range of roles in cybersecurity, including:

Ethical Hacker, Penetration Tester, Security Analyst, Network Security Engineer, Information Security Consultant.

 

Average Salary in South Africa:

There is a high demand for ethical hackers and cybersecurity professionals, demanding an average salary ranging from ZAR 400,000 to ZAR 900,000 per year, depending on the experience and qualification level of the candidate.

 

Why Choose This Programme?

The CEH programme from the Cyber Studies Institute provides in-depth curricula, expert instructions, and hands-on learning. This course has been designed for people at the beginner level and those with experience in an IT career but wishing to specialize in cybersecurity. This means that it will provide tools and knowledge for your academic and professional success. Moreover, CEH itself is an international certification leading up to ample opportunities worldwide and locally in South Africa.

 

Enroll Now

To enroll for this course, simply click on Enroll Now at the bottom of the screen and follow the check out procedure.

Curriculum

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Outline

Module 61 – CEH v11 Advanced Ethical Hacker Course Intro
  •    61.1 About This Course: Advanced Ethical Hacker
  •    61.2 About the Instructor
Module 62 – CEH v11 Session Hjacking
  •    62.1 Session Hijacking Concepts
  •    62.2 Token-based Authentication
  •    62.3 Compromising a Session Token
  •    62.4 XSS
  •    62.5 CSRF
  •    62.6 Other Attacks
Module 63 – CEH v11 Defending Against Hijacking
  •    63.1 Network Level Hijacking
  •    63.2 Session Hijacking Tools
  •    63.3 Session Hijacking Countermeasures
  •    63.4 Session Penetration Hijacking
  •    63.5 Review
Module 64 – CEH v11 Implementing Intrusion Detection
  •    64.1 IDS-IPS
  •    64.2 Snort
  •    64.3 Snort Rules
  •    64.4 Syslog
Module 65 – CEH v11 Testing Intrusion Detection
  •    65.1 WIPS
  •    65.2 IDS Considerations
  •    65.3 IDS Tools
  •    65.4 IDS Evasion
  •    65.5 IDS-Firewall Evasion Tools
  •    65.6 IDS Scenerios
Module 66 – CEH v11 Implementing Firewalls
  •    66.1 Firewalls
  •    66.2 Packet Filtering Rules
  •    66.3 Firewall Deployments
  •    66.4 Traffic Flow through Firewalls
  •    66.5 Split DNS
Module 67 – CEH v11 Testing Firewallls
  •    67.1 Firewall Tools
  •    67.2 Firewall Evasion
  •    67.3 Firewall Scenarios
Module 68 – CEH v11 Implementing Honeypots
  •    68.1 Honeypots
  •    68.2 Honeypot Detection
  •    68.3 IDS-Firewall Evasion Countermeasures
  •    68.4 IDS-Firewall Honeypot Penetration Testing
  •    68.5 Review
Module 69 – CEH v11 Attacker Webserver
  •    69.1 Webserver Security Overview
  •    69.2 Common Webservers
  •    69.3 Webserver Attacks
  •    69.4 Misconfiguration Attack Examples
Module 70 – CEH v11 Webserver Defense
  •    70.1 Webserver Attack Tools
  •    70.2 Attack Countermeasures
  •    70.3 Webserver Penetration Testing
  •    70.4 Review
Module 71 – CEH v11 Intro To Web Apps
  •    71.1 Web Application Concepts
  •    71.2 Attacking Web Apps
Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities
  •    72.1 A01 – Broken Access Control
  •    72.2 A02 – Cryptographic Failures
  •    72.3 A03 – Injection
  •    72.4 A04 – Insecure Design
  •    72.5 A05 – Security Misconfiguration
Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities
  •    73.1 A06 – Vulnerable and Outdated Components
  •    73.2 A07 – Identification and Authentication Failures
  •    73.3 A08 – Software and Data Integrity Failures
  •    73.4 A09 – Security Logging and Monitoring
  •    73.5 A10 – Server Side Request Forgery
Module 74 – CEH v11 Common Web App Attacks
  •    74.1 XSS Attacks
  •    74.2 CSRF
  •    74.3 Parameter Tampering
  •    74.4 Clickjacking
  •    74.5 SQL Injection
Module 75 – CEH v11 Unauthorized Access Through Web Apps
  •    75.1 Insecure Deserialization Attacks
  •    75.2 IDOR
  •    75.3 Directory Traversal
  •    75.4 Session Management Attacks
  •    75.5 Response Splitting
Module 76 – CEH v11 Web App Overflow Attacks
  •    76.1 Denial of Service
  •    76.2 Overflow Attacks
  •    76.3 XXE Attacks
  •    76.4 Soap Attacks
  •    76.5 Ajax Attacks
Module 77 – CEH v11 Defending Web Apps
  •    77.1 Web App Hacking Tools
  •    77.2 Web Hacking Countermeasures
  •    77.3 Web Application Penetration Testing
  •    77.4 Review
Module 78 – CEH v11 Intro To SQL Injection
  •    78.1 SQL Overview
  •    78.2 SQL Injection Concepts
  •    78.3 Basic SQL Injection
Module 79 – CEH v11 Performing SQL Injection
  •    79.1 Finding Vulnerable Websites
  •    79.2 Error-based SQL Injection
  •    79.3 Union SQL Injection
  •    79.4 Blind SQL Injection
  •    79.5 SQL Injection Scenarios
  •    79.6 Evading Detection
Module 80 – CEH v11 Defending Against SQL Injection
  •    80.1 SQL Injection Tools
  •    80.2 SQL Injection Countermeasures
  •    80.3 Safe Coding Examples
  •    80.4 SQL Wildcards
  •    80.5 SQL Injection Penetration Testing
  •    80.6 Review
Module 81 – CEH v11 Wireless Networking Overview
  •    81.1 Wireless Concepts
  •    81.2 Wireless Signal Encoding
  •    81.3 Wi-Fi Standards
  •    81.4 Wi-Fi Antennas
  •    81.5 Wireless Authentication
Module 82 – CEH v11 Wi-Fi Security
  •    82.1 Wi-Fi Security Standards
  •    82.2 Wireless Network Troubleshooting Tools
  •    82.3 Wi-Fi Discovery Tools
  •    82.4 Sniffing Wi-Fi
Module 83 – CEH v11 Hacking Wi-Fi
  •    83.1 Wi-Fi Attack Types
  •    83.2 Wi-Fi Rogue Access Point Attacks
  •    83.3 Wi-Fi Denial of Service Attacks
  •    83.4 Wi-Fi Password Cracking Attacks
  •    83.5 WEP Cracking
Module 84 – CEH v11 Advanced Wireless Attacks
  •    84.1 WPA-WPA2 Cracking
  •    84.2 WPA3 Attacks
  •    84.3 WPS Cracking
  •    84.4 Wi-Fi Attack Tools for Mobile Devices
  •    84.5 Bluetooth Hacking
  •    84.6 Other Wireless Hacking
Module 85 – CEH v11 Defending Wireless Networks
  •    85.1 Wireless Hacking Countermeasures
  •    85.2 Wireless Security Tools
  •    85.3 Wireless Penetration Testing
  •    85.4 Review
Module 86 – CEH v11 Mobile Platform Overview
  •    86.1 Mobile Platform Overview
  •    86.2 Mobile Device Vulnerabilities
  •    86.3 Mobile Device Attacks
Module 87 – CEH v11 Hacking Android
  •    87.1 Android
  •    87.2 Android Vulnerabilities
  •    87.3 Rooting Android
  •    87.4 Android Exploits
  •    87.5 Android Hacking Tools
  •    87.6 Reverse Engineering an Android App
  •    87.7 Securing Android
Module 88 – CEH v11 Hacking iOS
  •    88.1 iOS
  •    88.2 iOS Vulnerabilities
  •    88.3 Jailbreaking iOS
  •    88.4 iOS Exploits
  •    88.5 iOS Hacking Tools
  •    88.6 Securing iOS
Module 89 – CEH v11 Mobile Platform Defense
  •    89.1 Mobile Device Management
  •    89.2 BYOD
  •    89.3 Mobile Security Guidelines and Tools
  •    89.4 Mobile Device Penetration Testing
  •    89.5 Review
Module 90 – CEH v11 IoT Hacking
  •    90.1 loT Concepts
  •    90.2 loT Infrastructure
  •    90.3 Fog Computing
  •    90.4 loT Vulnerabilities
  •    90.5 loT Threats
Module 91 – CEH v11 IoT Defense
  •    91.1 IoT Hacking Methodologies and Tools
  •    91.2 IoT Hacking Methodolgies and Tools Part 2
  •    91.3 Hacking Countermeasures
  •    91.4 IoT Penetration Testing
  •    91.5 OT Concepts
  •    91.6 Industrial IoT
Module 92 – CEH v11 Operational Technology Overview
  •    92.1 IT-OT Convergence
  •    92.2 ICS
  •    92.3 SCADA
  •    92.4 DCS
  •    92.5 RTU
  •    92.6 PLC
  •    92.7 Addition OT Components
Module 93 – CEH v11 Hacking OT
  •    93.1 OT Variables
  •    93.2 Well-known OT attacks
  •    93.3 OT Attack Methodology and Basic Tools
  •    93.4 OT Reconnaissance
  •    93.5 OT Penetration and Control
Module 94 – CEH v11 Defending OT
  •    94.1 OT Attack Tools
  •    94.2 OT Hacking Countermeasures
  •    94.3 OT Penetration Testing
  •    94.4 Review
Module 95 – CEH v11 Attacking The Cloud
  •    95.1 Cloud Computing Concepts
  •    95.2 Virtualization
  •    95.3 Cloud Types
  •    95.4 Cloud Benefits and Considerations
  •    95.5 Cloud Risks and Vulnerablilities
Module 96 – CEH v11 Cloud Defense
  •    96.1 Cloud Threats and Countermeasures
  •    96.2 Cloud Security Tools
  •    96.3 Cloud Security Best Practices
  •    96.4 Cloud Penetration Testing
  •    96.5 Review
Module 97 – CEH v11 Cryptography Overview
  •    97.1 Cryptography Concepts
  •    97.2 Symetric Encryption
  •    97.3 Asymmetric Encryption
  •    97.4 Public Key Exchange
  •    97.5 PKI
Module 98 – CEH v11 Protecting Data With Crytography
  •    98.1 Digital Certificates
  •    98.2 Digital Signatures
  •    98.3 Hashing
  •    98.4 Email Encryption
  •    98.5 Network Communication Encryption
Module 99 – CEH v11 Protecting Data at Home and in Transit
  •    99.1 Disk Encryption
  •    99.2 VPN Encryption
  •    99.3 Cryptography Tools
Module 100 – CEH v11 Pentesting Cryptography
  •    100.1 Cryptography Attacks
  •    100.2 Cryptography Penetration Testing
  •    100.3 Review
  •    100.4 Conclusion

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Outline

Module 21 – CEH v11 Ethical Hacker Course Intro
  •    21.1 About this course – Ethical Hacker
  •    21.2 About the Instructor
Module 22 – CEH v11 Intro to Footprinting
  •    22.1 Footprinting Concepts
  •    22.2 Footprinting Methodology
  •    22.3 OSINT Tools
  •    22.4 Advanced Google Search
  •    22.5 Whois Footprinting
  •    22.6 Activity – Performing a Whois Lookup
Module 23 – CEH v11 Footprinting Network Services
  •    23.1 DNS Footprinting
  •    23.2 Website Footprinting
  •    23.3 Email Footprinting
  •    23.4 Network Footprinting
  •    23.5 Footprinting through Social Networking Sites
Module 24 – CEH v11 Defend Against Footprinting
  •    24.1 Competitive Intelligence Gathering
  •    24.2 Footprinting Countermeasures
  •    24.3 Footprinting Penetration Testing
  •    24.4 Review
Module 25 – CEH v11 Intro to Scanning
  •    25.1 Scanning Concepts
  •    25.2 ICMP Discovery Scans
  •    25.3 Other Discovery Scans
Module 26 – CEH v11 Port Scanning
  •    26.1 Ports
  •    26.2 TCP Flags and Handshakes
  •    26.3 TCP Scan Types
  •    26.4 Other Scanning Techniques
Module 27 – CEH v11 Vulnerability Scanning
  •    27.1 Banner Grabbing
  •    27.2 Vulnerability Scanning
  •    27.3 SSDP Scanning
Module 28 – CEH v11 NMAP
  •    28.1 Nmap
  •    28.2 Common Nmap Scans
  •    28.3 Nmap Options
  •    28.4 Nmap Stealth Scans
  •    28.5 Hping and Other Scanners
Module 29 – CEH v11 Firewalls and Intrusion Detection
  •    29.1 Firewall Types
  •    29.2 Firewall Features
  •    29.3 Firewall Features Part 2
  •    29.4 Firewall Configurations
  •    29.5 Intrusion Detection and Prevention
Module 30 – CEH v11 Evading Detection
  •    30.1 Firewall and IDS Evasion
  •    30.2 Firewall and IDS Evasion Part 2
  •    30.3 Firewalking
  •    30.4 Probing a Firewall
  •    30.5 Probing a Firewall Part 2
Module 31 – CEH v11 Proxies and VPNs
  •    31.1 Proxies
  •    31.2 VPNs
  •    31.3 Tor
  •    31.4 Scanning Countermeasures
  •    31.5 Scanning Penetration Testing
  •    31.6 Review
Module 32 – CEH v11 Accessing Vulnerability
  •    32.1 Vulnerability Assessment Overview
  •    32.2 Vulnerability Scoring Systems
  •    32.3 Vulnerability Assessment Tools
Module 33 – CEH v11 Vulnerability Research
  •    33.1 Scanner Output and Reports
  •    33.2 Vulnerability Research
  •    33.3 Review
Module 34 – CEH v11 Intro to Enumeration
  •    34.1 Enumeration Concepts
  •    34.2 Enumeration Techniques and Tools
  •    34.3 Service and Application Enumeration
  •    34.4 SMB and NetBIOS Enumeration
Module 35 – CEH v11 Service Enumeration
  •    35.1 SNMP Enumeration
  •    35.2 LDAP Enumeration
  •    35.3 DNS Enumeration
  •    35.4 SMTP Enumeration
  •    35.5 NTP Enumeration
Module 36 – CEH v11 Advanced Enumeration
  •    36.1 Remote Connection Enumeration
  •    36.2 File Transfer Enumeration
  •    36.3 VoIP Enumeration
  •    36.4 IPSEC Enumeration
  •    36.5 IPv6 Enumeration
  •    36.6 BGP Enumeration
Module 37 – CEH v11 Command Line Enumeration
  •    37.1 Windows Command Line Enumeration
  •    37.2 Linux Command Line Enumeration
  •    37.3 Linux Command Line Enumeration Part 2
Module 38 – CEH v11 Defending Against Enumeration
  •    38.1 Enumeration Countermeasures
  •    38.2 Enumeration Countermeasures Part 2
  •    38.3 Enumeration Penetration Testing
  •    38.4 Review
Module 39 – CEH v11 Intro to System Hacking
  •    39.1 System Hacking Concepts
  •    39.2 System Hacking Tools and Frameworks
  •    39.3 Searchsploit
  •    39.4 Compiling and Running Exploits
Module 40 – CEH v11 System Hacking with Metasploit
  •    40.1 Metasploit
  •    40.2 Metasploit Search
  •    40.3 Metasploit Exploits and Payloads
  •    40.4 Metasploit Meterpreter
  •    40.5 Metasploit Connectivity
  •    40.6 Metasploit Impersonation and Migration
Module 41 – CEH v11 Further Attacking a Compromised System
  •    41.1 Netcat
  •    41.2 Pivoting
  •    41.3 Netcat Relays
  •    41.4 Metasploit Post Exploitation Modules
  •    41.5 Common Operating System Exploits
Module 42 – CEH v11 Hacking an Operating System
  •    42.1 Hacking Windows
  •    42.2 Hacking Linux
  •    42.3 Network Service Exploits
  •    42.4 Password Attacks
Module 43 – CEH v11 Password Cracking Overview
  •    43.1 Dictionary Attack
  •    43.2 Brute Force Attack
  •    43.3 Password Spraying
  •    43.4 Rainbow Tables
Module 44 – CEH v11 Performing Password Attacks
  •    44.1 Network Service Password Attacks
  •    44.2 Password Cracking Tools
  •    44.3 Online Password Cracking Sites
  •    44.4 Windows Password Cracking
  •    44.5 Linux Password Cracking
  •    44.6 Other Methods for Obtaining Passwords
Module 45 – CEH v11 Using Exploits
  •    45.1 Keylogging
  •    45.2 Spyware
  •    45.3 Rootkits
  •    45.4 Buffer Overflows
  •    45.5 Privilege Escalation
  •    45.6 Hiding Files
Module 46 – CEH v11 Hiding Information
  •    46.1 Alternate Data Streams
  •    46.2 Steganography
  •    46.3 Creating and Maintaining Remote Access
  •    46.4 Hiding Evidence
Module 47 – CEH v11 Covering Tracks
  •    47.1 Covering Tracks in Windows
  •    47.2 Covering Tracks in Linux
  •    47.3 System Hacking Counter-Measures
  •    47.4 System Hacking Penetration Testing
  •    47.5 Review
Module 48 – CEH v11 Malware Overview
  •    48.1 Intro to Malware
  •    48.2 Virus Overview
  •    48.3 Virus Types
  •    48.4 Self-Hiding Viruses
  •    48.5 Worms
  •    48.6 Trojans
  •    48.7 Trojan Types
  •    48.8 RATS
Module 49 – CEH v11 Hacking With Malware
  •    49.1 Ransomware
  •    49.2 Botnets
  •    49.3 Covert Channel Trojans
  •    49.4 Banking Trojans
  •    49.5 Rootkits
Module 50 – CEH v11 Creating Malware
  •    50.1 Other Malware
  •    50.2 Malware Makers
  •    50.3 Dropper and Stage Creation
  •    50.4 Exploit Kits
Module 51 – CEH v11 Detecting Malware
  •    51.1 Malware Detection
  •    51.2 Malware Detection Part 2
  •    51.3 Malware Analysis
Module 52 – CEH v11 Defending Against Malware
  •    52.1 Malware Reverse Engineering
  •    52.2 Malware Countermeasures
  •    52.3 Malware Penetration Testing
  •    52.4 Review
Module 53 – CEH v11 Sniffing
  •    53.1 Sniffing Concepts
  •    53.2 Types of Sniffing
  •    53.3 Sniffing Protocols
  •    53.4 Sniffing Tools
Module 54 – CEH v11 Spoofing and MITM
  •    54.1 ARP
  •    54.2 ARP Spoofing
  •    54.3 MITM
  •    54.4 MAC Attacks
  •    54.5 MAC Spoofing
  •    54.6 DHCP Attacks
Module 55 – CEH v11 Defending Against Poisoning and Sniffing
  •    55.1 Name Resolution Poisoning
  •    55.2 VLAN Hopping
  •    55.3 Sniffing Counter Measures
  •    55.4 Sniffing Penetration Testing
  •    55.5 Review
Module 56 – CEH v11 Social Engineering
  •    56.1 Social Engineering Concepts
  •    56.2 Social Engineering Techniques
  •    56.3 Social Engineering Examples
  •    56.4 Social Engineering Tools
Module 57 – CEH v11 Defending Against Social Engineering
  •    57.1 Social Media
  •    57.2 Identity Theft
  •    57.3 Insider Threats
  •    57.4 Social Engineering Countermeasures
  •    57.5 Social Engineering Penetration Testing
  •    57.6 Review
Module 58 – CEH v11 Denial-of-Service
  •    58.1 DoS-DDoS Concepts
  •    58.2 Volumetric Attacks
  •    58.3 Fragmentation Attacks
  •    58.4 State Exhaustion Attacks
  •    58.5 Application Layer Attacks
Module 59 – CEH v11 Advanced DoS Attacks
  •    59.1 Protocol Attacks
  •    59.2 Other Attacks
  •    59.3 Botnets
Module 60 – CEH v11 Defending Against Denial-of-Service
  •    60.1 DoS-DDoS Attack Tools
  •    60.2 DoS-DDoS Countermeasures
  •    60.3 Dos Penetration Testing
  •    60.4 Review

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Outline

Module 1 – CEH v11 Foundations Course Introduction
  •    1.1 About this course: CEH Foundations
  •    1.2 About the Instructor
Module 2 – CEH v11 Introduction To Networking
  •    2.1 Networking Overview
  •    2.2 Network Scope
  •    2.3 Network Addressing
  •    2.4 Activity – Examining Network Addressing
Module 3 – CEH v11 Lan Components
  •    3.1 Protocols, Ports, Sockets
  •    3.2 Network Topologies
  •    3.3 LAN Devices
  •    3.4 LAN Devices Part 2
  •    3.5 VLANs
  •    3.6 Activity – Examining Ports and Sockets
  •    3.7 Activity – Examining Switches and VLANs
Module 4 – CEH v11 Routing and Network Access
  •    4.1 Routers
  •    4.2 Layer 3 Switches
  •    4.3 Modems and Remote Access
  •    4.4 Firewalls and Proxies
  •    4.5 Activity – Examining Routing
  •    4.6 Activity – Examining VLAN Routing
  •    4.7 Activity – Examining Firewall Rules
Module 5 – CEH v11 Intrusion Detection and Network Layers
  •    5.1 IDS and IPS
  •    5.2 OSI Model
  •    5.3 TCP-IP
  •    5.4 Activity – Examining Network Layers
Module 6 – CEH v11 Networking Protocols and Addressing
  •    6.1 Layer 4 Protocols
  •    6.2 Layer 3 Protocols
  •    6.3 Layer 2 Protocols
  •    6.4 IP Addressing
  •    6.5 Subnetting
  •    6.6 DHCP
  •    6.7 Activity – Examining TCP
  •    6.8 Activity – Examining UDP
  •    6.9 Activity – Examining IP
  •    6.10 Activity – Examining ICMP
  •    6.11 Activity – Examining ARP
Module 7 – CEH v11 Network Services
  •    7.1 DNS
  •    7.2 DNS Records
  •    7.3 NTP
  •    7.4 Authentication
  •    7.5 Biometrics
  •    7.6 Activity – Examining DNS
  •    7.7 Activity – Examining DNS Records
Module 8 – CEH v11 Access Control
  •    8.1 Local Authentication
  •    8.2 Directory Service Authentication
  •    8.3 Extending Authentication
  •    8.4 Authorization
  •    8.5 Activity – Testing Access Control
Module 9 – CEH v11 Intro to Linux
  •    9.1 Linux Overview
  •    9.2 Linux File System
  •    9.3 Linux Core Commands
  •    9.4 Linux Search and Read Commands
  •    9.5 Activity – Exploring Linux
  •    9.6 Activity – Using Linux Core Commands
  •    9.7 Activity – Using Linux Search Commands
  •    9.8 Activity – Using Linux Read Commands
Module 10 – CEH v11 Configuring Linux
  •    10.1 Linux File Permissions
  •    10.2 Linux Special Permissions
  •    10.3 Linux Configuration
  •    10.4 Linux Packages
  •    10.5 Linux User Management
Module 11 – CEH v11 Practicing Linux Configuration
  •    11.1 Activity – Setting Linux Permissions
  •    11.2 Activity – Setting Linux Special Permissions
  •    11.3 Activity – Managing Packages in Kali Linux
  •    11.4 Activity – Managing Users and Groups in Linux
Module 12 – CEH v11 Managing Linux
  •    12.1 Linux Job Scheduling
  •    12.2 Linux File, Directory, and Download Commands
  •    12.3 Linux System Commands
  •    12.4 Linux Network Management
  •    12.5 Linux Firewall
Module 13 – CEH v11 Practicing Linux Management
  •    13.1 Activity – Scheduling Tasks in Linux
  •    13.2 Activity – Using Linux File, Directory, and Download Commands
  •    13.3 Activity – Compiling Malicious Code
  •    13.4 Activity – Using Linux Process and System Commands
  •    13.5 Activity – Using Linux Disk Management and Hardware Commands
  •    13.6 Activity – Using Linux Networking Commands
Module 14 – CEH v11 Intro to Windows
  •    14.1 Windows Overview
  •    14.2 Windows Registry
  •    14.3 Windows Security
Module 15 – CEH v11 Windows Commands
  •    15.1 Windows Commands
  •    15.2 Windows Admin Commands
  •    15.3 Windows Network Commands
  •    15.4 Windows Run Line Commands
  •    15.5 Windows PowerShell
Module 16 – CEH v11 Practicing Windows Commands
  •    16.1 Activity – Using Windows Built-in Commands
  •    16.2 Activity – Using Windows Task Commands
  •    16.3 Activity – Using Windows Admin Commands
  •    16.4 Activity – Using Windows Network Commands
  •    16.5 Activity – Using Windows PowerShell
  •    16.6 Networking and OS Penetration Testing
  •    16.7 Review
Module 17 – CEH v11 Intro to Hacking
  •    17.1 Information Security Overview
  •    17.2 Hacking Concepts
  •    17.3 Ethical Hacking Concepts
  •    17.4 Penetration Testing
  •    17.5 Penetration Testing Part 2
  •    17.6 Activity – Performing a Static Code Review
Module 18 – CEH v11 Information Security
  •    18.1 Cyber Kill Chain Concepts
  •    18.2 Activity – Performing Weaponization
  •    18.3 Information Security
  •    18.4 Security Policies
  •    18.5 Security Controls
  •    18.6 Access Control
Module 19 – CEH v11 Protecting Data
  •    19.1 Data Protection
  •    19.2 Backup Sites
  •    19.3 Vulnerability Management
  •    19.4 SIEM
  •    19.5 Risks
Module 20 – CEH v11 Managing Risk
  •    20.1 Risk Management
  •    20.2 Incident Handling
  •    20.3 Information Security Laws and Standards
  •    20.4 Activity – Assessing Risk
  •    20.5 Ethical Hacking Penetration Testing
  •    20.6 Review
  •    20.7 Conclusion

2 reviews for Certified Ethical Hacker (CEH) Career Course

  1. Grace

    I loved the interactive quizzes throughout the course. They kept me engaged and helped me retain information.

  2. Siphokazi

    The quality and value provided by CSI are unmatched. Thank you for the incredible course!

Add a review

Your email address will not be published. Required fields are marked *

Excited to Study Enroll Qualify

If you are ready to take the next step, click on the “Enroll Now” button below or “Contact us now” on this course for a detailed course outline or if you have any questions. An expert course adviser is standing by to assist you.

CompTIA Authorized Partner

Cyber Studies Institute (Pty) Ltd is proud to be an Official CompTIA Authorized Partner. Ensuring that you receive the best training in the world.

CompTIA Authorized Partner

How does studying with CSI work?

Click here to read how the process of studying at CSI work.