Intro to Ethical Hacking Certification - CEHv9 Boot Camp
4.0 (284 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,309 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Intro to Ethical Hacking Certification - CEHv9 Boot Camp to your Wishlist.

Add to Wishlist

Intro to Ethical Hacking Certification - CEHv9 Boot Camp

Certified Ethical Hacking Introduction
4.0 (284 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,309 students enrolled
Created by Chad Russell
Last updated 12/2016
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Ethically hack systems by following examples in the course.
  • Scan systems for vulnerabilities.
  • Have an introductory understanding of what is required to pass the Certified Ethical Hacking course.
View Curriculum
Requirements
  • Basic knowledge of Windows and Linux operating systems and networking.
  • A computer and a working internet connection.
Description

This course covers basic information related to Certified Ethical Hacker certification.  

This course includes  lessons where you will learn what Ethical Hacking is, what the Certified Ethical Hacking Certification is and how to use these skills to become a paid security professional.  This course is a starting point for you to chart your course to a well paying and satisfying Cyber Security career. This course will get you on the fast track to certification, and ultimately, relentlessly pursued by recruiters.

The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise.   You can do it!

What are the requirements?

•  You only need an internet connection and a Udemy account to access the course.

What am I going to get from this course?

•  Learn the basics of Ethical Hacking

•  Introduction to Certified Ethical Hacker subject matter

•  Learn hacking techniques through multiple hands-on examples in this course

What is the target audience?

•  This course is intended for absolute beginners and IT professionals looking to make the  move into the Cyber Security field.  No programming experience or prior security knowledge is required.  A basic understanding of networking and TCP/IP is helpful.  This course is intended for anyone who is interested in a career in Cyber Security

•  Certified Ethical Hacker  concepts teach  many professionals  to plan for and address Cyber Security issues on a daily basis using free open source software tools.

Who is the target audience?
  • Anyone looking to learn more about ethical hacking.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Ethical Hacking - Vulnerability Assessment and Penetration Testing
1 Lecture 09:25

In this introductory lesson you will learn about ethical hacking and how to use it to self-assess your own networks and your customers networks utilizing software vulnerability scans and penetration tests.  

Preview 09:25
+
The First Steps in an Ethical Hack
1 Lecture 05:24

Footprinting is the first step in the pen testing process.    You will learn how to use Maltego to gather information and map out potential targets.    

Preview 05:24
+
Penetration Testing
2 Lectures 22:05

There are an increasing types of cyber attacks on systems and networks.   Learn the different types of attack, how they are categorized and how hackers use them to gain system access.  

Cyber Attacks
17:54

After footprinting a target network it's time to run some vulnerability scans.   I'll show you how to use OWASP's Zed Attack Proxy to check for SQL Injection vulnerabilities in this lesson so you can run vulnerability scans on your own.  

Vulnerability Scanning Websites using Zed Attack Proxy
04:11
+
Wireless Hacking
1 Lecture 08:28

Wireless networks can be vulnerable access points into company networks.   Learn how to find vulnerabilities in wireless networks and how to exploit them in this lesson.  

Wireless Hacking
08:28
+
Incident Response
2 Lectures 09:18

As an ethical hacker you need to have an understanding of what you are up against.   Most networks use intrusion detection systems to detect breaches.    Learn the basics of Snort and incident response through hands-on demonstration.  

Incident Response
03:06

Hackers and defenders can both use network sniffing tools.   Hackers use sniffers like Wireshark to lift sensitive data like passwords from the network.   Learn how to use Wireshark to monitor network segments.   

Network Sniffing Tools - Wireshark
06:12
About the Instructor
Chad Russell
3.6 Average rating
1,047 Reviews
16,801 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!