Scroll to top button
Certified Ethical Hacker (CEH v11)
(CEH-v11.AE1)
/ ISBN: 9781644593219
This course includes
Lessons
TestPrep
LiveLab
Certified Ethical Hacker (CEH v11)
Get hands-on experience in Ethical hacking basics with the Certified Ethical Hacker course and lab. The course provides a vivid introduction to the technical foundations of hacking, social engineering, malware threats, and vulnerability analysis with clear and approachable lesson flowcharts, and other tools. It illustrates how to look after web server hacking, web applications, and database attacks. The Certified Ethical Hacker course will assist you in dealing with Cryptographic attacks and defenses concepts.
Lessons
-
16+ Lessons
-
332+ Exercises
-
225+ Quizzes
-
299+ Flashcards
-
150+ Glossary of terms
TestPrep
-
125+ Pre Assessment Questions
-
2+ Full Length Tests
-
125+ Post Assessment Questions
-
250+ Practice Test Questions
LiveLab
-
48+ LiveLab
-
48+ Video tutorials
-
01:36+ Hours
- What Is a CEH?
- About EC-Council
- Using This Course
- Objective Map
- Let's Get Started!
- Overview of Ethics
- Overview of Ethical Hacking
- Methodologies
- Methodology of Ethical Hacking
- Summary
- Communications Models
- Topologies
- Physical Networking
- IP
- TCP
- UDP
- Internet Control Message Protocol
- Network Architectures
- Cloud Computing
- Summary
- The Triad
- Risk
- Policies, Standards, and Procedures
- Organizing Your Protections
- Security Technology
- Being Prepared
- Summary
- Open Source Intelligence
- Domain Name System
- Passive Reconnaissance
- Website Intelligence
- Technology Intelligence
- Summary
- Ping Sweeps
- Port Scanning
- Vulnerability Scanning
- Packet Crafting and Manipulation
- Evasion Techniques
- Protecting and Detecting
- Summary
- Service Enumeration
- Remote Procedure Calls
- Server Message Block
- Simple Network Management Protocol
- Simple Mail Transfer Protocol
- Web-Based Enumeration
- Summary
- Searching for Exploits
- System Compromise
- Gathering Passwords
- Password Cracking
- Client-Side Vulnerabilities
- Living Off the Land
- Fuzzing
- Post Exploitation
- Summary
- Malware Types
- Malware Analysis
- Creating Malware
- Malware Infrastructure
- Antivirus Solutions
- Persistence
- Summary
- Packet Capture
- Packet Analysis
- Spoofing Attacks
- Summary
- Social Engineering
- Physical Social Engineering
- Phishing Attacks
- Website Attacks
- Wireless Social Engineering
- Automating Social Engineering
- Summary
- Wi-Fi
- Bluetooth
- Mobile Devices
- Summary
- Web Application Attacks
- Denial-of-Service Attacks
- Application Exploitation
- Lateral Movement
- Defense in Depth/Defense in Breadth
- Defensible Network Architecture
- Summary
- Basic Encryption
- Symmetric Key Cryptography
- Asymmetric Key Cryptography
- Certificate Authorities and Key Management
- Cryptographic Hashing
- PGP and S/MIME
- Disk and File Encryption
- Summary
- Data Classification
- Security Models
- Application Architecture
- Security Architecture
- Summary
- Cloud Computing Overview
- Cloud Architectures and Deployment
- Common Cloud Threats
- Internet of Things
- Operational Technology
- Summary
Hands on Activities (Live Labs)
- Creating a Personal Linux Firewall Using iptables
- Viewing Syslog
- Configuring Audit Policies in Windows
- Using Event Viewer
- Using the whois Program
- Using the theHarvester Tool
- Using Maltego
- Using Recon-ng
- Using ipconfig to Perform Reconnaissance
- Using dnsrecon
- Performing Zone Transfer Using dig
- Using nslookup for Passive Reconnaissance
- Using the host Program
- Mirroring Sites with HTTrack
- Using the fping Command
- Using Zenmap
- Scanning a Port Using nmap
- Using the masscan Command
- Performing Vulnerability Scanning Using OpenVAS
- Conducting Vulnerability Scanning Using Nessus
- Using the hping Program
- Using the Metasploit SunRPC Scanner
- Using nmap Scripts for Enumerating Users
- Enumerating Data Using enum4linux
- Using searchsploit
- Grabbing a Screenshot of a Target Machine Using Metasploit
- Using Rainbow Tables
- Cracking Windows Passwords
- Cracking a Linux Password Using John the Ripper
- Exploiting Windows 7 Using Metasploit
- Observing an MD5-Generated Hash Value
- Using the msfvenom Program
- Scanning Malware Using Antivirus
- Capturing Network Packets Using tcpdump
- Using Wireshark
- Using Ettercap for ARP Spoofing
- Performing ARP Spoofing
- Detecting a Phishing Site Using Netcraft
- Using the SET Tool
- Exploiting a Website Using SQL Injection
- Attacking a Website Using XSS Injection
- Simulating a DoS Attack
- Defending Against a Buffer Overflow Attack
- Performing Symmetric Encryption
- Examining Asymmetric Encryption
- Using OpenSSL to Create a Public/Private Key Pair
- Observing an SHA-Generated Hash Value
- Creating PGP Certification
×
Share with your friends and colleagues
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies.
More information
Accept