YoVDO

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course

Offered By: A Cloud Guru

Tags

Certified Ethical Hacker (CEH) Courses Cybersecurity Courses Cryptography Courses Ethical Hacking Courses Penetration Testing Courses Password Cracking Courses Network Scanning Courses

Course Description

Overview

Welcome to the Certified Ethical Hacker Course! (v10).Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then the CEH certificate will be of great benefit to you and your organization.This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.

Syllabus

  • Getting Started
  • Overview of Information Security
  • Overview of Information Security Threats and Attacks
  • History of Hacking
  • Protecting Information
  • Penetration Testing
  • Footprinting Process
  • Reports and Countermeasures
  • Network Scanning Techniques
  • Password Cracking Techniques
  • Techniques for Creating and Maintaining Access to the Remote System
  • Hiding Malicious Programs
  • Covering Tracks and Destroying Evidence
  • Spoofing Techniques
  • Attacking and Exploiting Wireless Networks
  • Tip, Tricks and Real Life Scenarios
  • Firewalls
  • Honeypots
  • Let's Attack Web Servers and Web Applications!
  • About Cryptography
  • Encryption, Decryption, Cryptanalysis and Attack Vectors
  • Final
  • Final SOLUTIONS

Taught by

Ermin

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera