Certified Ethical Hacker Boot Camp!
Gain the knowledge required to pass the CEH exam and move on to a career as a professional pentester!
Would you like to learn ethical hacking and gain the knowledge required to pass the CEH exam because this will help you level up your cyber security and ethical hacking career?
In this course you will learn:
This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!
What is an ethical hacker?
FREE PREVIEWTerminology crash course part 1
FREE PREVIEWTerminology crash course part 2
FREE PREVIEWTerminology crash course part 3
Confidentiality, integrity and availability
Legal considerations
Surveying the attack surface
Recon types and goals
Passive recon part 1
Passive recon part 2
Active recon
Recon walk-through and tools summary
DEMO - Maltego real world example
DEMO - FOCA to examine metadata
DEMO - Harvester
DEMO - Information collection using Recon-ng
Scanning & enumeration
Identifying active hosts part 1
Identifying active hosts part 2
Identifying active services
OS and services fingerprinting
Network mapping
Final thoughts
DEMO - Nmap syntax part 1
DEMO - Nmap syntax part 2
DEMO - Nmap hosts discovery
DEMO - Nmap service discovery
DEMO - Nmap scripts
DEMO - masscan
Network insecurity
Sniffing and spoofing
Sniffing tools
Spoofing, crypto, and wifi
DEMO - tcpdump
DEMo - Wireshark
DEMO - Ettercap
DEMO - Burp Suite
DEMO - Scapy
Security overview part 1: Windows architecture
Security overview part 2: credentials security
Security overview part 3: memory corruption & exploitation
Windows hacking basics
Local access and privilege escalation
Dumping hashes and cracking passwords
Linux attacking basics part 1
Linux attacking basics part 2
References
DEMO - Windows msf exploit part 1
DEMO - Windows msf exploit part 2
DEMO - Post exploitation activities
DEMO - Mimikatz
DEMO - Dumping hashes
DEMO - Hashcat
DEMO - Konboot
DEMO - Post exploitation Windows cmd
DEMO - Post exploitation Windows powershell
DEMO - Online password cracking part 1
DEMO - Online password cracking part 2
DEMO - Attacking Linux targets part 1
DEMO - Attacking Linux targets part 2
Introduction to web hacking
Web security architecture overview part 1
Web security architecture overview part 2
Attacking the web server part 1
Attacking the web server part 2
Attacking the platform part 1
Attacking the platform part 2
Attacking the technology part 1
Attacking the technology part 2
OWASP top 10 part 1
OWASP top 10 part 2
Attacking the business logic part 1
Attacking the business logic part 2
Tools and methodology
References
DEMO - OWASP Mutillidae
DEMO - SQL injection
DEMO - SQLMAP intro
DEMO - SQLMAP practice
DEMO - Burpsuite
DEMO - Burpsuite XSS Hunter
DEMO - mitmproxy
DEMO - Skipfish part 1
DEMO - Skipfish part 2
Social engineering basics
Social engineering methods
Tools and techniques part 1
Tools and techniques part 2
Tools and techniques part 3
Physical security considerations
Final thoughts
DEMO - Social engineering intro
DEMO - Social engineering toolkit prep
DEMO - Credential harvesting
DEMO - Website cloning
DEMO - Automating an attack
DEMO - Anti-virus evasion part 1
DEMO - Anti-virus evasion part 2
Joseph Delgadillo
Best-Selling Instructor
The digital age is upon us. Would you like to build/protect the systems that shape our future?
I am here on Uthena to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.
"Certified Ethical Hacker Boot Camp!"
$27.81
Lifetime enrollment
You may like these other courses by JTDigital Courses.