The Complete CEH® Exam Prep Course: Become An Ethical Hacker
4.5 (80 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,368 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Complete CEH® Exam Prep Course: Become An Ethical Hacker to your Wishlist.

Add to Wishlist

The Complete CEH® Exam Prep Course: Become An Ethical Hacker

Master Cyber Security by Passing the Ethical Hacker Exam. Learn about Pen Testing, Enumeration, Malware, SQL Injections
New
4.5 (80 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,368 students enrolled
Created by Tim Pierson
Last updated 9/2017
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 16.5 hours on-demand video
  • 19 Supplemental Resources
  • 1 Practice Test
  • Full lifetime access
  • Access on mobile and TV
  • Assignments
  • Certificate of Completion
What Will I Learn?
  • Master the topics needed to pass the Certified Ethical Hacker Exam from EC-Council.
  • Discover the why behind security administrators’ work and secure your corporate and/or home-based network.
  • Build your career towards becoming a professional penetration tester.
  • Get paid for providing a valuable service for companies with sensitive data.
View Curriculum
Requirements
  • You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
  • In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
  • I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
  • The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects.
Description

If you are curious about new technologies and passionate about jumpstarting your career as a ethical hacker, then this course is for you!  The Complete CEH® Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Certified Ethical Hacker Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker you’ll know the ins and outs of cybersecurity, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.

In this course, you will:

  • Learn the business and technical logistics behind penetration testing
  • Identify evolving threats from different types of hackers
  • Reveal shocking truths about the information operating systems can divulge
  • Realize the power of footprinting on the Internet
  • Detect live systems by inference
  • Get by a step-by-step, no-nonsense introduction to cryptography
  • Identify differences between vulnerability assessments and penetration tests
  • Master ways to prevent and disable system hacking
  • Protect yourself from malware, including Trojans, backdoors, viruses, and more
  • Thwart hackers attacking wireless networks and mobile devices
  • Understand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewalls
  • Implement countermeasures to stop SQL injections and other database attacks
  • And more!


Along the way, you’ll also watch 15+ special instructor demos and take 15 practice quizzes featuring over 150 exam questions. Each question comes with a carefully crafted explanation for why each answer choice is right or wrong. Set yourself up for success by working towards exam mastery: I highly encourage you to work through these questions at your own pace in order to test your knowledge.

Why Learn Ethical Hacking

A growing number of companies today seek ethical hackers to protect their most sensitive information. Very few days go by without a breaking news story revealing break-ins, security breaches, and massive quantities of data stolen from major business organizations. Companies that house this data are the ones most at risk: therefore, ethical hacking has quickly become one of the most sought after qualifications in multiple industries including government, banking, research and development, retail, real estate, healthcare, and more. Learn an in-demand skill while making the world a safer place. You’ll also find that ethical hacking is a surefire way to increase your income and work towards professional development.

Why Learn From Me

The ethical hacking landscape is huge and not for the faint of heart. To become a successful ethical hacker, you don’t just need the knowledge to pass the CEH [1]  exam; you also need the real-world skills to excel as a practicing security professional. That’s why this course has been so carefully crafted; I have distilled my 27 years of experience as a technical trainer, consultant, and pen tester into this course material.

I have personally taught my Ethical Hacker Exam prep course in person well over 300 times and have developed a very good idea of the required skill sets necessary to pass the exam. Whether you take a defensive approach against the would-be attacker or whether you wish to become a penetration tester yourself, the Ethical Hacker exam is designed to assess the tools that are in your security toolbox. If you commit the time and effort to mastering the concepts covered and completing the assignments and quizzes, you will set yourself up for success on exam day.

I took a lighthearted approach in several sections of the course–just like I do in my regular classes–to make the course more interesting and humorous for you. I greatly enjoy hearing from my students and hope to hear about your success in the future. Preparing for an upcoming exam date? Make sure to check out the “So You’re Ready to Take Your Test” lecture to gain insights on how to answer questions more accurately–even if you’re not sure of the answer.

By the end of the course, you’ll have everything you need to ace the Certified Ethical Hacker[1] exam and hopefully encourage new students to take this course. I look forward to sharing my knowledge with you.

Join me on this journey, and enroll in the course today.


References:  [1] Certified Ethical Hacker and CEH are Registered Trade Marks of EC-Council, 

Note: Ethical Hacker is not a registered trade mark.

Who is the target audience?
  • Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network
  • This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.
  • This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.
  • People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
189 Lectures
16:31:20
+
Opening Section
2 Lectures 08:30
+
Build Your Lab - In the Future We will offer an Online Solution
12 Lectures 54:46
Create A VeraCrypt Container to Protect Your Laptop or Desktop
10:48

This is where I am going to keep the things that you will really only want to download once.  Things that are rather large and you will not want to be downloading them over and over again.  I will reference them Throughout the course and tell you where to find them, but its a good idea to go ahead and get them downloaded and put into your veracrypt repository for safekeeping when you do need them.  They will generally be in the form of an .iso file that you will mount as a CD ROM on a VM to get access to utilities.

Utilities, CheatSheets, VariousItems You really only Want to Download Once
01:55

Build a Manual Lab 01
03:47

Lab Legalities
02:44

Here you will find some useful Utilities that will be used throughout the course.

Housekeeping
01:40

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these essential VMs to you

Getting to Know Your Win2k VM
05:25

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then
select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these
essential VMs to you

Getting to Know Your XPAttacker VM
03:04

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these essential VMs to you

Getting to Know You Win7 VM
03:56

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these essential VMs to you

Getting to Know Your Win2k3-AD
01:27

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these essential VMs to you

Getting to Know Your WebApp
01:31

Putting Our Lab Together Step By Step
12:45

Tying everying together in our Lab
05:44
+
Ethical Hacking Overview
22 Lectures 01:09:44
Introduction to Pentesting and Ethical Hacking
00:31


Defintion of a Penetration Test
01:46

The Evolving Threat
01:49

The Vulnerabilty Lifecycle
02:15

Map.Norsecorp.com
01:56

Botnet Definition
05:12

Defense in Depth
04:47

I was asked to appear on the NBC Today Show Local Edition in Miami.  I was preparing to do a segment on the Dangers of Social Media.  And I must admit I did a fairly good job of getting my point across on that.  But unbeknownst to me the host, and attractive girl had a stalker, and I showed her how posting information on social media can divulge the latitude and longitude of where the photo was taken.  Watch the video as she realizes, and asks questions like.."What if you take a picture of your family in front of your front door?"  After the Segment, I had not noticed anything strange, and I thanked her kindly for her time.  She Sternly said..."YOUR NOT GOING ANYWHERE!!!"  We looked at her pictures and sure enough the Exif data showed her location of where she lived.  She asked what could be done.  I said..Well not much short of moving.  :-(



MetaData
03:29

Types of PenTests
04:47

Types of Hackers
01:31

Common Definitions
01:43

Hacker vs. Penetration Tester
05:27

Penetration Testing Terminology
03:10

Essential Terminology
03:51

OSSTMM Methodology
08:42

Tools vs Technique
04:45


Calculating Risk & Formulas
02:48

Analyzing Findings
00:44

Calculating SLE, ARO, ALE
01:06

Other Penetration Testing Methodologies
03:14

Quiz Check.  Not all items have been covered before purposely.  It is important that you go through the sample questions in order to prepare yourself for the exam

Ethical Hacking Overview Quiz
15 questions
+
FootPrinting - Reconnaissance and Information Gathering
21 Lectures 01:31:42
Introduction to Footprinting
00:43

What Information is Gathered by the Hacker
05:37

Methods of Obtaining Information And Physical Access
01:24

Social Access
04:27

Digital Access
03:02

Passive vs Active Reconnaissance
02:14

Footprinting Defined
01:32

Exercise: Footprinting Tool: Maltego
02:03




Instructor Demo: GoogleAlerts
04:24

Removing Searchable Content
04:55

Internet Archive: The WayBack Machine
06:43

Domain Name Registration-WhoIs Information
01:19

Instructor Demonstation - CentralOps
06:14

DNS Databases
03:20

Traceroute Operation
05:30

InstructorDemonstration: Online Tools
04:19


Netcraft, DoaminsbyProxy, Countermeasures
08:43

Quiz

Check.  Not all items have been covered before purposely.  It is
important that you go through the sample questions in order to prepare
yourself for the exam

FootPrinting Quiz
10 questions
+
Linux Overview
9 Lectures 25:57
Introduction to Linux
00:24

Linux History - Linus + Minux = Linux
02:29

Linux GUI Desktops
02:09

Linux Shell Linux Bash Shell
02:31

Passwd & Shadow File Formats
01:52

InstructorDemo:User Account Management
06:20

Tarballs & Zips & Installing VMware Tools
05:30

Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
02:44

Most Popular Linux Security Distribution
01:58

Linux Quiz
2 questions
+
Detecting Live Systems - Port Scanning
9 Lectures 29:19
Introduction to Port Scanning
00:15

Introduction to Port Scanning
02:31

TCP/IP Stack
06:22


NMap ServiceVersion Detection And Demo
01:44

Instructor Demonstration-Engage, NmapScans
08:02

Hping3, NMap -O
01:32


Countermeasures: Scanning
02:20

Understand NMap and the NMap Scrpting Enging
NMap Assignment
1 question

Detecting Live Systems Quiz
10 questions
+
Enumernation - What Can We Get For Free?
7 Lectures 32:20
Intro to Enumeration
00:17

Grabbing Banners
04:25

Shodan
05:20

ZoneTransfers
05:00

DNS Enumeration
04:26

SNMP Countermeasures, AD and AD Countermeasures
04:13

Null Sessions
08:39

Enumeration Quiz
10 questions
+
Cryptography
8 Lectures 39:05
Intro Into Cryptography
00:30

Beginings of Cryptography
04:36

Implementation, Stream Cipher, Block Cipher and the Enigima
08:54

Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange
05:07

Hashing, Hashing Collisions, Common Hash Algorithms
09:38

Ransomware
03:07

IPSec and SSH
03:46

PKI Applications, Quantum Crypto and VeraCrypt
03:27

You will try to break the Caeser encryption, and the 20 Bit Symmetric Encryption
Cryptography Assignement
1 question

Cryptography Quiz
10 questions
+
Malware - Sofware Goes Undercover
17 Lectures 01:41:53
Introduction to Malware and How The Internet Makes Money
01:00


Trojans and Back Doors
06:17

Defining Malware: Viruses and Worms
07:13

Defining Malware: Spyware
05:35

Data Loss Prevention (DLP) and other Creepy things
10:31

Distributing Malware
06:19

Malware Capabilities
05:27

Auto Starting Malware
01:44

Tool: Netcat
03:41

Demo: NetCat Procedure
10:28

Executable Wrappers
04:22

Instructor Demo: Executeable Wrappers 1
08:51

Instructor Demo: Executeable Wrappers 2
01:53

Malware Avoiding Detection
04:33

Malware Countermeasures 1
08:10

Malware Countermeasures 2
06:39

Malware Quiz
10 questions
+
System Hacking
24 Lectures 03:03:08
Introduction to System Hacking Introduction
01:00

Types of Password Attacks, Keystroke Loggers
05:44

Password Guessing Online
07:44

Cracking Windows Passwords - A
03:25

Cracking Windows Passwords - B
08:32

Cracking Windows Passwords - C
07:00

Cracking Windows Passwords - D
08:00

Cracking Windows Passwords - E
08:25

Countermeasures: Stealing the Passwords, Syskey, Salting
08:41

Cloud Cracking Techniques
01:55

Generating Rainbow Tables, Free Rainbow Tables
03:17

Password Hash Insertion Attack
09:20

Demonstration MimiKatz
10:59

Privilege Escalation, Countermeasures
05:37

Covering Tracks, Disable Auditing, Clearing the Event Log
03:04

Alternate Data Streams Demonstration - A
08:07

Alternate Data Streams Demonstration - B
11:55

Alternate Data Streams Demonstration - C
10:38

Anonymizers - JAP
03:42


Virtually Complete Secrecy, TOR
11:02

RootKits - Overview
08:39


Root Kit Countermeasures, Tokens and Smart Cards
11:19

System Hacking Quiz
10 questions
8 More Sections
About the Instructor
Tim Pierson
4.5 Average rating
79 Reviews
1,368 Students
1 Course
Security Evangelist

Hi, I’m Tim Pierson. I’m a technical consultant and pen tester who is passionate about teaching. For the past 27 years, I’ve gained industry experience in security, secure coding, virtualization, and cloud. My first love, however, has always been teaching. I enjoy explaining complex topics to both technical and non-technical clients, and I’ve taken this passion around the world, where I have delivered seminars, keynotes, and trainings for global corporations. 

I have taught my Ethical Hacking Exam preparation course well over 300 times–from San Francisco to Malaysia to London. IT certification has now evolved into an industry staple; now all people who operate computers with privileged network access should obtain this certification to stay current with new technologies and jump the curve.

If you are serious about obtaining your Certified Ethical Hacker Certification, you have come to the right place. In 2009, EC-Council, the creator of the Certified Ethical Hacker exam, voted me Instructor of the Year for successfully preparing countless individuals to pass the exam.

When teaching, I use a combination of hands-on labs, instructional videos, and practice test questions to help all my students easily grasp concepts. I take a lighthearted and fun approach; if you’re not careful, you might find that some of my jokes stick with you even until the day of the exam!

So what are you waiting for? Join me on your journey to passing the CEH exam.