Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
Offered By: A Cloud Guru
Course Description
Overview
Welcome to the Certified Ethical Hacker Course! (v10).Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then the CEH certificate will be of great benefit to you and your organization.This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.
Syllabus
- Getting Started
- Overview of Information Security
- Overview of Information Security Threats and Attacks
- History of Hacking
- Protecting Information
- Penetration Testing
- Footprinting Process
- Reports and Countermeasures
- Network Scanning Techniques
- Password Cracking Techniques
- Techniques for Creating and Maintaining Access to the Remote System
- Hiding Malicious Programs
- Covering Tracks and Destroying Evidence
- Spoofing Techniques
- Attacking and Exploiting Wireless Networks
- Tip, Tricks and Real Life Scenarios
- Firewalls
- Honeypots
- Let's Attack Web Servers and Web Applications!
- About Cryptography
- Encryption, Decryption, Cryptanalysis and Attack Vectors
- Final
- Final SOLUTIONS
Taught by
Ermin
Related Courses
Fundamentals of Computer Network SecurityUniversity of Colorado System via Coursera Penetration Testing and Ethical Hacking
Cybrary Ethical Hacking Course Certification
Cybrary Password Cracking 101
Cybrary Password Cracking Tool Fundamentals
Cybrary