Test Preperation Course For CEH
3.2 (284 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
20,355 students enrolled

Test Preperation Course For CEH

A Comprehensive Certified Ethical Hacking(CEH) course. Learn most essentials of CEH from scratch
3.2 (284 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
20,355 students enrolled
Last updated 5/2020
English
English [Auto]
Current price: $132.99 Original price: $189.99 Discount: 30% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 35 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Initiating Control - Part 1
  • Retaining Control
  • Bypassing the Same Origin Policy
  • Attacking Users
Requirements
  • Basic computer knowledge
  • NO programming knowledge required
Description

Hacking (both good and bad) seems to be in the news on a daily basis now. Large data breaches, phishing attacks, voter registration hacked, Smartphones hacked, etc. In this course we go over the basics for ethical hacking and penetration testing. We go step by step building a virtual lab, loading various tools and learning how a malicious hacker thinks and operates. Phishing, password hacking, methodology, OSINT, DDOS attacks, and much more is covered in this course. Learn how a hacker thinks, their methodology and tools in order to help defend from them.

Who this course is for:
  • Anyone wanting to learn the absolute basics of hacking
Course content
Expand 7 lectures 35:13
+ Test Preperation Course For CEH
7 lectures 35:13
Initiating Control - Part 2
04:32
Retaining Control
05:29
Bypassing the Same Origin Policy
05:20
Attacking Users - Part 1
05:28
Attacking Users - Part 2
04:11