Certified Ethical Hacker (CEH) Certification Prep Course
4.3 (316 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,941 students enrolled

Certified Ethical Hacker (CEH) Certification Prep Course

Ethical Hacker (CEH)
4.3 (316 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,941 students enrolled
Last updated 9/2018
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6.5 hours on-demand video
  • 6 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Foot printing
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing
Requirements
  • The course requires the students to have at least two years of IT security experience along with a strong working knowledge of TCP/IP.
Description

The Ethical Hacker training course is a generalized training course for the information security professionals. This training course provides the students with an overview of the tools, techniques and skills required to become a successful and effective ethical hacker. The goal of this course is to help the candidates master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. 

This course covers all the tools and techniques in an encyclopedic approach that are fundamental to understand the domain of ethical hacking and implement the knowledge gained to secure the IT infrastructure and conduct effective penetration testing.


Who this course is for:
  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure
Course content
Expand all 21 lectures 06:15:01
+ Module 02 - Reconnaissance
2 lectures 24:55

Download files here

Reconnaissance Part1
12:08
Reconnaissance Part2
12:47
Module 02
3 questions
+ Module 03 - Protocols
5 lectures 01:25:27

Download files here

Protocols Part1
16:59
Protocols Part2
21:11
Protocols Part3
20:44
Protocols Part4
13:01
Protocols Part5
13:32
Module 03 - Quiz
3 questions
+ Module 04 - Windows Hacking
4 lectures 01:18:52

Download files here

Windows Hacking Part1
19:34
Windows Hacking Part2
18:30
Windows Hacking Part3
20:27
Windows Hacking Part4
20:21
Module 04 - Quiz
3 questions
+ Module 05 - Attacking Web Technologies
3 lectures 55:57

Download files here

Attacking Web Technologies Part1
15:45
Attacking Web Technologies Part2
21:43
Attacking Web Technologies Part3
18:29
Module 05 - Quiz
3 questions
+ Module 06 -Pen Testing Wireless Networks
5 lectures 01:34:23

Download files here

Pen Testing Wireless Networks Part1
19:00
Pen Testing Wireless Networks Part2
19:32
Pen Testing Wireless Networks Part3
17:54
Pen Testing Wireless Networks Part4
19:07
Pen Testing Wireless Networks Part5
18:50
Module 06 - Quiz
3 questions