Certified Ethical Hacker Labs

Certified Ethical Hacker (CEH) Labs

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

The EC-Council has certified over 237,000 security professionals from private and public enterprises. They have certified members working at companies such as IBM, Microsoft, the US Army, the FBI, and the United Nations.

101 Labs – Certified Ethical Hacker has been updated for the latest v11 exam objectives. It prepares you for the written and practical exams:

  • 312-50 (ECC EXAM), 312-50 (VUE)
  • CEH Practical Exam

 

If you pass both you qualify as a CEH Master.

Certified Ethical Hacker Certification (CEH) Labs

We take you by the hand and guide you through the CEH exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day. You can choose to sit just the written test or progress onto the practical test if you wish.

Holding a CEH certification indicates the holder has acquired essential skills required to work in the following roles, among others:

  • Security Analyst
  • Computer Forensics Analyst
  • Security Specialist
  • Penetration Tester
  • Security Engineer
  • Security Code Auditor
  • Malware Analyst
  • Security Consultant

 

Global cyber crime costs are expected to grow exponentially over the next few years. Now more than ever, it is imperative that organizations prevent sensitive data from falling into the wrong hands.

This course teaches you the very latest hacking techniques for the latest attack surfaces, including the cloud, network foot printing, advanced scanning techniques, password cracking, malware, MAC flooding, hybrid environments, and web applications, as well as more ethical hacking concepts, vulnerability scanning and code analysis.

This course shows you how to carry out security scans on network to find vulnerabilities and analyze results. You learn how to use common hacking tools as well as Kali Linux. It’s all hands-on so if you want to learn the theory please check out our sister website howtonetwork.com for the CEH certification course.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of internetworking.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Want to learn advanced hacking techniques
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your CEH exams
Module 1 Module 1
Unit 1 Introduction to Ethical Hacking
Unit 2 Footprinting Through Search Engines
Unit 3 TLD and Subdomains
Unit 4 Social Media
Unit 5 Shodan
Unit 6 Web Spiders
Unit 7 Website mirroring
Unit 8 Wayback machine
Unit 9 Public documents metadata
Unit 10 Whois footprinting
Unit 11 DNS footprinting
Unit 12 Network footprinting
Unit 13 Maltego
Unit 14 Recon-ng
Unit 15 Recon-dog
Unit 16 OSRFramework
Unit 17 Passive Reconnaissance Wrap-up
Unit 18 Scanning Tools
Unit 19 Advanced Scanning Techniques
Unit 20 Scanning Beyond IDS and Firewall
Module 2 Module 2
Unit 1 Stealth Scan
Unit 2 Banner Grabbing
Unit 3 Network Scanning Wrap-up
Unit 4 NetBIOS Enumeration
Unit 5 SNMP Enumeration
Unit 6 SMTP Enumeration 2
Unit 7 SMB Enumeration
Unit 8 Enumeration Wrap-up
Unit 9 Nessus
Unit 10 OpenVAS
Unit 11 Password recovery tools
Unit 12 Local Password Cracking
Unit 13 Remote Password Brute Forcing
Unit 14 Password Cracking Wrap-up
Unit 15 Local Vulnerability Exploitation
Unit 16 Executing Local Apps
Unit 17 Keylogging
Unit 18 Steganography
Unit 19 Clearing Logs and Other Tracks
Unit 20 Post Exploitation Wrap-up
Unit 21 Malware
Module 3 Module 3
Unit 1 MSFVenom Encoders
Unit 2 Creating a Trojan
Unit 3 Veil
Unit 4 Malware Wrap-up
Unit 5 MAC Flooding
Unit 6 DHCP Starvation Attack
Unit 7 Rogue DHCP Server
Unit 8 ARP Poisoning
Unit 9 MAC Spoofing
Unit 10 DNS Poisoning
Unit 11 Sniffing Wrap-up
Unit 12 Social Engineering
Unit 13 DoS Flood Attacks
Unit 14 SlowLoris
Unit 15 DoS Attack Tools
Unit 16 XSS
Unit 17 CSRF
Unit 18 Session Hijacking
Unit 19 Session Attacks Wrap-up
Unit 20 Directory Traversal
Module 4 Module 4
Unit 1 Phishing
Unit 2 Web Server Pentesting
Unit 3 Authorization Attacks
Unit 4 Web Application Logic Attacks
Unit 5 BeEF
Unit 6 Web Application Pentesting
Unit 7 SQL Injection
Unit 8 Blind SQLi
Unit 9 SQLMap
Unit 10 SQLi Wrap-up
Unit 11 Wi-Fi Hacking
Unit 12 Wi-Fi Sniffing
Unit 13 Hashes
Unit 14 Cryptography Tools
Unit 15 VeraCrypt
Unit 16 Monitoring Web Apps for Changes
Unit 17 Email Header Analysis
Unit 18 DLL Hijacking
Unit 19 Rootkits
Unit 20 NTFS File Streams
Module 5 Module 5
Unit 1 Auditpol
Unit 2 Tools for Clearing Tracks
Unit 3 Creating a Worm
Unit 4 Switch Port Stealing
Unit 5 IRDP Spoofing
Unit 6 TCP Hijacking
Unit 7 IP Spoofing: Source Routed Packets
Unit 8 RST Attack
Unit 9 UDP Hijacking
Unit 10 PackETH
Unit 11 DNS Server Hijacking
Unit 12 DNS Amplification Attack
Unit 13 HTTP Request Smuggling
Unit 14 Web Cache Poisoning
Unit 15 Windows Cryptography Tools
Unit 16 Cryptanalysis
Unit 17 ZeuS/zBot Malware Analysis
Unit 18 ZeuS/zBot Malware Analysis
Unit 19 ZeuS/zBot Malware Analysis
Unit 20 ZeuS/zBot Malware Analysis Wrap Up
Module 6 Exams
Unit 1 Exam 1
Unit 2 Exam 2
Unit 3 Exam 3
Unit 4 Exam 4