Certified Ethical Hacker Labs

Certified Ethical Hacker (CEH) Labs

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

The EC-Council has certified over 237,000 security professionals from private and public enterprises. They have certified members working at companies such as IBM, Microsoft, the US Army, the FBI, and the United Nations.

101 Labs – Certified Ethical Hacker has been updated for the latest v11 exam objectives. It prepares you for the written and practical exams:

  • 312-50 (ECC EXAM), 312-50 (VUE)
  • CEH Practical Exam

 

If you pass both you qualify as a CEH Master.

Certified Ethical Hacker Certification (CEH) Labs

We take you by the hand and guide you through the CEH exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day. You can choose to sit just the written test or progress onto the practical test if you wish.

Holding a CEH certification indicates the holder has acquired essential skills required to work in the following roles, among others:

  • Security Analyst
  • Computer Forensics Analyst
  • Security Specialist
  • Penetration Tester
  • Security Engineer
  • Security Code Auditor
  • Malware Analyst
  • Security Consultant

 

Global cyber crime costs are expected to grow exponentially over the next few years. Now more than ever, it is imperative that organizations prevent sensitive data from falling into the wrong hands.

This course teaches you the very latest hacking techniques for the latest attack surfaces, including the cloud, network foot printing, advanced scanning techniques, password cracking, malware, MAC flooding, hybrid environments, and web applications, as well as more ethical hacking concepts, vulnerability scanning and code analysis.

This course shows you how to carry out security scans on network to find vulnerabilities and analyze results. You learn how to use common hacking tools as well as Kali Linux. It’s all hands-on so if you want to learn the theory please check out our sister website howtonetwork.com for the CEH certification course.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of internetworking.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Want to learn advanced hacking techniques
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your CEH exams
Module 1 Module 1
Unit 1 Introduction to Ethical Hacking  
Unit 2 Footprinting Through Search Engines  
Unit 3 TLD and Subdomains  
Unit 4 Social Media  
Unit 5 Shodan  
Unit 6 Web Spiders  
Unit 7 Website mirroring  
Unit 8 Wayback machine  
Unit 9 Public documents metadata  
Unit 10 Whois footprinting  
Unit 11 DNS footprinting  
Unit 12 Network footprinting  
Unit 13 Maltego  
Unit 14 Recon-ng  
Unit 15 Recon-dog  
Unit 16 OSRFramework  
Unit 17 Passive Reconnaissance Wrap-up  
Unit 18 Scanning Tools  
Unit 19 Advanced Scanning Techniques  
Unit 20 Scanning Beyond IDS and Firewall  
Module 2 Module 2
Unit 1 Banner Grabbing  
Unit 2 Network Scanning Wrap-up  
Unit 3 NetBIOS Enumeration  
Unit 4 SNMP Enumeration  
Unit 5 SMTP Enumeration 2  
Unit 6 SMB Enumeration  
Unit 7 Enumeration Wrap-up  
Unit 8 Nessus  
Unit 9 OpenVAS  
Unit 10 Password recovery tools  
Unit 11 Local Password Cracking  
Unit 12 Remote Password Brute Forcing  
Unit 13 Password Cracking Wrap-up  
Unit 14 Local Vulnerability Exploitation  
Unit 15 Executing Local Apps  
Unit 16 Keylogging  
Unit 17 Steganography  
Unit 18 Clearing Logs and Other Tracks  
Unit 19 Post Exploitation Wrap-up  
Unit 20 Malware  
Module 3 Module 3
Unit 1 MSFVenom Encoders  
Unit 2 Creating a Trojan  
Unit 3 Veil  
Unit 4 Malware Wrap-up  
Unit 5 MAC Flooding  
Unit 6 DHCP Starvation Attack  
Unit 7 Rogue DHCP Server  
Unit 8 ARP Poisoning  
Unit 9 MAC Spoofing  
Unit 10 DNS Poisoning  
Unit 11 Sniffing Wrap-up  
Unit 12 Social Engineering  
Unit 13 DoS Flood Attacks  
Unit 14 SlowLoris  
Unit 15 DoS Attack Tools  
Unit 16 XSS  
Unit 17 CSRF  
Unit 18 Session Hijacking  
Unit 19 Session Attacks Wrap-up  
Unit 20 Directory Traversal  
Module 4 Module 4
Unit 1 Phishing  
Unit 2 Web Server Pentesting  
Unit 3 Authorization Attacks  
Unit 4 Web Application Logic Attacks  
Unit 5 BeEF  
Unit 6 Web Application Pentesting  
Unit 7 SQL Injection  
Unit 8 Blind SQLi  
Unit 9 SQLMap  
Unit 10 SQLi Wrap-up  
Unit 11 Wi-Fi Hacking  
Unit 12 Wi-Fi Sniffing  
Unit 13 Hashes  
Unit 14 Cryptography Tools  
Unit 15 VeraCrypt  
Unit 16 Monitoring Web Apps for Changes  
Unit 17 Email Header Analysis  
Unit 18 DLL Hijacking  
Unit 19 Rootkits  
Unit 20 NTFS File Streams  
Module 5 Module 5
Unit 1 Auditpol  
Unit 2 Tools for Clearing Tracks  
Unit 3 Creating a Worm  
Unit 4 Switch Port Stealing  
Unit 5 IRDP Spoofing  
Unit 6 TCP Hijacking  
Unit 7 IP Spoofing: Source Routed Packets  
Unit 8 RST Attack  
Unit 9 UDP Hijacking  
Unit 10 Websploit  
Unit 11 PackETH  
Unit 12 DNS Server Hijacking  
Unit 13 DNS Amplification Attack  
Unit 14 HTTP Request Smuggling  
Unit 15 Web Cache Poisoning  
Unit 16 Windows Cryptography Tools  
Unit 17 Cryptanalysis  
Unit 18 ZeuS/zBot Malware Analysis  
Unit 19 ZeuS/zBot Malware Analysis  
Unit 20 ZeuS/zBot Malware Analysis  
Unit 21 ZeuS/zBot Malware Analysis Wrap Up  
Module 6 Exams
Unit 1 Exam 1  
Unit 2 Exam 2  
Unit 3 Exam 3  
Unit 4 Exam 4