Certified Ethical Hacker Labs

Certified Ethical Hacker (CEH) Labs

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

The EC-Council has certified over 237,000 security professionals from private and public enterprises. They have certified members working at companies such as IBM, Microsoft, the US Army, the FBI, and the United Nations.

101 Labs – Certified Ethical Hacker has been updated for the latest v11 exam objectives. It prepares you for the written and practical exams:

  • 312-50 (ECC EXAM), 312-50 (VUE)
  • CEH Practical Exam

 

If you pass both you qualify as a CEH Master.

Certified Ethical Hacker Certification (CEH) Labs

We take you by the hand and guide you through the CEH exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day. You can choose to sit just the written test or progress onto the practical test if you wish.

Holding a CEH certification indicates the holder has acquired essential skills required to work in the following roles, among others:

  • Security Analyst
  • Computer Forensics Analyst
  • Security Specialist
  • Penetration Tester
  • Security Engineer
  • Security Code Auditor
  • Malware Analyst
  • Security Consultant

 

Global cyber crime costs are expected to grow exponentially over the next few years. Now more than ever, it is imperative that organizations prevent sensitive data from falling into the wrong hands.

This course teaches you the very latest hacking techniques for the latest attack surfaces, including the cloud, network foot printing, advanced scanning techniques, password cracking, malware, MAC flooding, hybrid environments, and web applications, as well as more ethical hacking concepts, vulnerability scanning and code analysis.

This course shows you how to carry out security scans on network to find vulnerabilities and analyze results. You learn how to use common hacking tools as well as Kali Linux. It’s all hands-on so if you want to learn the theory please check out our sister website howtonetwork.com for the CEH certification course.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of internetworking.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Want to learn advanced hacking techniques
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your CEH exams
Module 1Module 1
Unit 1Introduction to Ethical Hacking
Unit 2Footprinting Through Search Engines
Unit 3TLD and Subdomains
Unit 4Social Media
Unit 5Shodan
Unit 6Web Spiders
Unit 7Website mirroring
Unit 8Wayback machine
Unit 9Public documents metadata
Unit 10Whois footprinting
Unit 11DNS footprinting
Unit 12Network footprinting
Unit 13Maltego
Unit 14Recon-ng
Unit 15Recon-dog
Unit 16OSRFramework
Unit 17Passive Reconnaissance Wrap-up
Unit 18Scanning Tools
Unit 19Advanced Scanning Techniques
Unit 20Scanning Beyond IDS and Firewall
Module 2Module 2
Unit 1Banner Grabbing
Unit 2Network Scanning Wrap-up
Unit 3NetBIOS Enumeration
Unit 4SNMP Enumeration
Unit 5SMTP Enumeration 2
Unit 6SMB Enumeration
Unit 7Enumeration Wrap-up
Unit 8Nessus
Unit 9OpenVAS
Unit 10Password recovery tools
Unit 11Local Password Cracking
Unit 12Remote Password Brute Forcing
Unit 13Password Cracking Wrap-up
Unit 14Local Vulnerability Exploitation
Unit 15Executing Local Apps
Unit 16Keylogging
Unit 17Steganography
Unit 18Clearing Logs and Other Tracks
Unit 19Post Exploitation Wrap-up
Unit 20Malware
Module 3Module 3
Unit 1MSFVenom Encoders
Unit 2Creating a Trojan
Unit 3Veil
Unit 4Malware Wrap-up
Unit 5MAC Flooding
Unit 6DHCP Starvation Attack
Unit 7Rogue DHCP Server
Unit 8ARP Poisoning
Unit 9MAC Spoofing
Unit 10DNS Poisoning
Unit 11Sniffing Wrap-up
Unit 12Social Engineering
Unit 13DoS Flood Attacks
Unit 14SlowLoris
Unit 15DoS Attack Tools
Unit 16XSS
Unit 17CSRF
Unit 18Session Hijacking
Unit 19Session Attacks Wrap-up
Unit 20Directory Traversal
Module 4Module 4
Unit 1Phishing
Unit 2Web Server Pentesting
Unit 3Authorization Attacks
Unit 4Web Application Logic Attacks
Unit 5BeEF
Unit 6Web Application Pentesting
Unit 7SQL Injection
Unit 8Blind SQLi
Unit 9SQLMap
Unit 10SQLi Wrap-up
Unit 11Wi-Fi Hacking
Unit 12Wi-Fi Sniffing
Unit 13Hashes
Unit 14Cryptography Tools
Unit 15VeraCrypt
Unit 16Monitoring Web Apps for Changes
Unit 17Email Header Analysis
Unit 18DLL Hijacking
Unit 19Rootkits
Unit 20NTFS File Streams
Module 5Module 5
Unit 1Auditpol
Unit 2Tools for Clearing Tracks
Unit 3Creating a Worm
Unit 4Switch Port Stealing
Unit 5IRDP Spoofing
Unit 6TCP Hijacking
Unit 7IP Spoofing: Source Routed Packets
Unit 8RST Attack
Unit 9UDP Hijacking
Unit 10Websploit
Unit 11PackETH
Unit 12DNS Server Hijacking
Unit 13DNS Amplification Attack
Unit 14HTTP Request Smuggling
Unit 15Web Cache Poisoning
Unit 16Windows Cryptography Tools
Unit 17Cryptanalysis
Unit 18ZeuS/zBot Malware Analysis
Unit 19ZeuS/zBot Malware Analysis
Unit 20ZeuS/zBot Malware Analysis
Unit 21ZeuS/zBot Malware Analysis Wrap Up
Module 6Exams
Unit 1Exam 1
Unit 2Exam 2
Unit 3Exam 3
Unit 4Exam 4