Certified Ethical Hacker Labs

Certified Ethical Hacker (CEH) Labs

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

The EC-Council has certified over 237,000 security professionals from private and public enterprises. They have certified members working at companies such as IBM, Microsoft, the US Army, the FBI, and the United Nations.

101 Labs – Certified Ethical Hacker has been updated for the latest v11 exam objectives. It prepares you for the written and practical exams:

  • 312-50 (ECC EXAM), 312-50 (VUE)
  • CEH Practical Exam


If you pass both you qualify as a CEH Master.

Certified Ethical Hacker Certification (CEH) Labs

We take you by the hand and guide you through the CEH exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day. You can choose to sit just the written test or progress onto the practical test if you wish.

Holding a CEH certification indicates the holder has acquired essential skills required to work in the following roles, among others:

  • Security Analyst
  • Computer Forensics Analyst
  • Security Specialist
  • Penetration Tester
  • Security Engineer
  • Security Code Auditor
  • Malware Analyst
  • Security Consultant


Global cyber crime costs are expected to grow exponentially over the next few years. Now more than ever, it is imperative that organizations prevent sensitive data from falling into the wrong hands.

This course teaches you the very latest hacking techniques for the latest attack surfaces, including the cloud, network foot printing, advanced scanning techniques, password cracking, malware, MAC flooding, hybrid environments, and web applications, as well as more ethical hacking concepts, vulnerability scanning and code analysis.

This course shows you how to carry out security scans on network to find vulnerabilities and analyze results. You learn how to use common hacking tools as well as Kali Linux. It’s all hands-on so if you want to learn the theory please check out our sister website howtonetwork.com for the CEH certification course.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of internetworking.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Want to learn advanced hacking techniques
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your CEH exams
Module 1Module 1
Unit 1Introduction to Ethical Hacking 
Unit 2Footprinting Through Search Engines 
Unit 3TLD and Subdomains 
Unit 4Social Media 
Unit 5Shodan 
Unit 6Web Spiders 
Unit 7Website mirroring 
Unit 8Wayback machine 
Unit 9Public documents metadata 
Unit 10Whois footprinting 
Unit 11DNS footprinting 
Unit 12Network footprinting 
Unit 13Maltego 
Unit 14Recon-ng 
Unit 15Recon-dog 
Unit 16OSRFramework 
Unit 17Passive Reconnaissance Wrap-up 
Unit 18Scanning Tools 
Unit 19Advanced Scanning Techniques 
Unit 20Scanning Beyond IDS and Firewall 
Module 2Module 2
Unit 1Banner Grabbing 
Unit 2Network Scanning Wrap-up 
Unit 3NetBIOS Enumeration 
Unit 4SNMP Enumeration 
Unit 5SMTP Enumeration 2 
Unit 6SMB Enumeration 
Unit 7Enumeration Wrap-up 
Unit 8Nessus 
Unit 9OpenVAS 
Unit 10Password recovery tools 
Unit 11Local Password Cracking 
Unit 12Remote Password Brute Forcing 
Unit 13Password Cracking Wrap-up 
Unit 14Local Vulnerability Exploitation 
Unit 15Executing Local Apps 
Unit 16Keylogging 
Unit 17Steganography 
Unit 18Clearing Logs and Other Tracks 
Unit 19Post Exploitation Wrap-up 
Unit 20Malware 
Module 3Module 3
Unit 1MSFVenom Encoders 
Unit 2Creating a Trojan 
Unit 3Veil 
Unit 4Malware Wrap-up 
Unit 5MAC Flooding 
Unit 6DHCP Starvation Attack 
Unit 7Rogue DHCP Server 
Unit 8ARP Poisoning 
Unit 9MAC Spoofing 
Unit 10DNS Poisoning 
Unit 11Sniffing Wrap-up 
Unit 12Social Engineering 
Unit 13DoS Flood Attacks 
Unit 14SlowLoris 
Unit 15DoS Attack Tools 
Unit 16XSS 
Unit 17CSRF 
Unit 18Session Hijacking 
Unit 19Session Attacks Wrap-up 
Unit 20Directory Traversal 
Module 4Module 4
Unit 1Phishing 
Unit 2Web Server Pentesting 
Unit 3Authorization Attacks 
Unit 4Web Application Logic Attacks 
Unit 5BeEF 
Unit 6Web Application Pentesting 
Unit 7SQL Injection 
Unit 8Blind SQLi 
Unit 9SQLMap 
Unit 10SQLi Wrap-up 
Unit 11Wi-Fi Hacking 
Unit 12Wi-Fi Sniffing 
Unit 13Hashes 
Unit 14Cryptography Tools 
Unit 15VeraCrypt 
Unit 16Monitoring Web Apps for Changes 
Unit 17Email Header Analysis 
Unit 18DLL Hijacking 
Unit 19Rootkits 
Unit 20NTFS File Streams 
Module 5Module 5
Unit 1Auditpol 
Unit 2Tools for Clearing Tracks 
Unit 3Creating a Worm 
Unit 4Switch Port Stealing 
Unit 5IRDP Spoofing 
Unit 6TCP Hijacking 
Unit 7IP Spoofing: Source Routed Packets 
Unit 8RST Attack 
Unit 9UDP Hijacking 
Unit 10Websploit 
Unit 11PackETH 
Unit 12DNS Server Hijacking 
Unit 13DNS Amplification Attack 
Unit 14HTTP Request Smuggling 
Unit 15Web Cache Poisoning 
Unit 16Windows Cryptography Tools 
Unit 17Cryptanalysis 
Unit 18ZeuS/zBot Malware Analysis 
Unit 19ZeuS/zBot Malware Analysis 
Unit 20ZeuS/zBot Malware Analysis 
Unit 21ZeuS/zBot Malware Analysis Wrap Up 
Module 6Exams
Unit 1Exam 1 
Unit 2Exam 2 
Unit 3Exam 3 
Unit 4Exam 4