Certified Ethical Hacker (CEH) Labs
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.
The EC-Council has certified over 237,000 security professionals from private and public enterprises. They have certified members working at companies such as IBM, Microsoft, the US Army, the FBI, and the United Nations.
101 Labs – Certified Ethical Hacker has been updated for the latest v11 exam objectives. It prepares you for the written and practical exams:
- 312-50 (ECC EXAM), 312-50 (VUE)
- CEH Practical Exam
If you pass both you qualify as a CEH Master.
Certified Ethical Hacker Certification (CEH) Labs
We take you by the hand and guide you through the CEH exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day. You can choose to sit just the written test or progress onto the practical test if you wish.
Holding a CEH certification indicates the holder has acquired essential skills required to work in the following roles, among others:
- Security Analyst
- Computer Forensics Analyst
- Security Specialist
- Penetration Tester
- Security Engineer
- Security Code Auditor
- Malware Analyst
- Security Consultant
Global cyber crime costs are expected to grow exponentially over the next few years. Now more than ever, it is imperative that organizations prevent sensitive data from falling into the wrong hands.
This course teaches you the very latest hacking techniques for the latest attack surfaces, including the cloud, network foot printing, advanced scanning techniques, password cracking, malware, MAC flooding, hybrid environments, and web applications, as well as more ethical hacking concepts, vulnerability scanning and code analysis.
This course shows you how to carry out security scans on network to find vulnerabilities and analyze results. You learn how to use common hacking tools as well as Kali Linux. It’s all hands-on so if you want to learn the theory please check out our sister website howtonetwork.com for the CEH certification course.
Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of internetworking.
Take this course if you:
- Want to lay a foundation for a career in security
- Want to learn advanced hacking techniques
- Want an understanding of network security, hacking tools and technology
- Want to gain confidence in your hands-on IT skills
- Want to gain an edge in your CEH exams
Module 1 | Module 1 |
---|---|
Unit 1 | Introduction to Ethical Hacking |
Unit 2 | Footprinting Through Search Engines |
Unit 3 | TLD and Subdomains |
Unit 4 | Social Media |
Unit 5 | Shodan |
Unit 6 | Web Spiders |
Unit 7 | Website mirroring |
Unit 8 | Wayback machine |
Unit 9 | Public documents metadata |
Unit 10 | Whois footprinting |
Unit 11 | DNS footprinting |
Unit 12 | Network footprinting |
Unit 13 | Maltego |
Unit 14 | Recon-ng |
Unit 15 | Recon-dog |
Unit 16 | OSRFramework |
Unit 17 | Passive Reconnaissance Wrap-up |
Unit 18 | Scanning Tools |
Unit 19 | Advanced Scanning Techniques |
Unit 20 | Scanning Beyond IDS and Firewall |
Module 2 | Module 2 |
Unit 1 | Banner Grabbing |
Unit 2 | Network Scanning Wrap-up |
Unit 3 | NetBIOS Enumeration |
Unit 4 | SNMP Enumeration |
Unit 5 | SMTP Enumeration 2 |
Unit 6 | SMB Enumeration |
Unit 7 | Enumeration Wrap-up |
Unit 8 | Nessus |
Unit 9 | OpenVAS |
Unit 10 | Password recovery tools |
Unit 11 | Local Password Cracking |
Unit 12 | Remote Password Brute Forcing |
Unit 13 | Password Cracking Wrap-up |
Unit 14 | Local Vulnerability Exploitation |
Unit 15 | Executing Local Apps |
Unit 16 | Keylogging |
Unit 17 | Steganography |
Unit 18 | Clearing Logs and Other Tracks |
Unit 19 | Post Exploitation Wrap-up |
Unit 20 | Malware |
Module 3 | Module 3 |
Unit 1 | MSFVenom Encoders |
Unit 2 | Creating a Trojan |
Unit 3 | Veil |
Unit 4 | Malware Wrap-up |
Unit 5 | MAC Flooding |
Unit 6 | DHCP Starvation Attack |
Unit 7 | Rogue DHCP Server |
Unit 8 | ARP Poisoning |
Unit 9 | MAC Spoofing |
Unit 10 | DNS Poisoning |
Unit 11 | Sniffing Wrap-up |
Unit 12 | Social Engineering |
Unit 13 | DoS Flood Attacks |
Unit 14 | SlowLoris |
Unit 15 | DoS Attack Tools |
Unit 16 | XSS |
Unit 17 | CSRF |
Unit 18 | Session Hijacking |
Unit 19 | Session Attacks Wrap-up |
Unit 20 | Directory Traversal |
Module 4 | Module 4 |
Unit 1 | Phishing |
Unit 2 | Web Server Pentesting |
Unit 3 | Authorization Attacks |
Unit 4 | Web Application Logic Attacks |
Unit 5 | BeEF |
Unit 6 | Web Application Pentesting |
Unit 7 | SQL Injection |
Unit 8 | Blind SQLi |
Unit 9 | SQLMap |
Unit 10 | SQLi Wrap-up |
Unit 11 | Wi-Fi Hacking |
Unit 12 | Wi-Fi Sniffing |
Unit 13 | Hashes |
Unit 14 | Cryptography Tools |
Unit 15 | VeraCrypt |
Unit 16 | Monitoring Web Apps for Changes |
Unit 17 | Email Header Analysis |
Unit 18 | DLL Hijacking |
Unit 19 | Rootkits |
Unit 20 | NTFS File Streams |
Module 5 | Module 5 |
Unit 1 | Auditpol |
Unit 2 | Tools for Clearing Tracks |
Unit 3 | Creating a Worm |
Unit 4 | Switch Port Stealing |
Unit 5 | IRDP Spoofing |
Unit 6 | TCP Hijacking |
Unit 7 | IP Spoofing: Source Routed Packets |
Unit 8 | RST Attack |
Unit 9 | UDP Hijacking |
Unit 10 | Websploit |
Unit 11 | PackETH |
Unit 12 | DNS Server Hijacking |
Unit 13 | DNS Amplification Attack |
Unit 14 | HTTP Request Smuggling |
Unit 15 | Web Cache Poisoning |
Unit 16 | Windows Cryptography Tools |
Unit 17 | Cryptanalysis |
Unit 18 | ZeuS/zBot Malware Analysis |
Unit 19 | ZeuS/zBot Malware Analysis |
Unit 20 | ZeuS/zBot Malware Analysis |
Unit 21 | ZeuS/zBot Malware Analysis Wrap Up |
Module 6 | Exams |
Unit 1 | Exam 1 |
Unit 2 | Exam 2 |
Unit 3 | Exam 3 |
Unit 4 | Exam 4 |