Certified Ethical Hacker (CEH) Version 11 (ECC 312-50) Part 1

This course is a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, every lesson and topic are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning.

$49.99

SKU: ceh-v11-part1 Category:
Description

This course is a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, every lesson and topic are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning.

In this Foundations course, students will learn how networks, protocols, and networking devices work. They will understand the security limits found in a traditional network and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer network. They will examine the controls used to protect a company’s digital assets—and what it takes to circumvent such controls.

Course Outline

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content

Download Course Outline

1.1 About this course: CEH Foundations

1.2 About the Instructor

2.1 Networking Overview

2.2 Network Scope

2.3 Network Addressing

2.4 Activity – Examining Network Addressing

3.1 Protocols, Ports, Sockets

3.2 Network Topologies

3.3 LAN Devices

3.4 LAN Devices Part 2

3.5 VLANs

3.6 Activity – Examining Ports and Sockets

3.7 Activity – Examining Switches and VLANs

4.1 Routers

4.2 Layer 3 Switches

4.3 Modems and Remote Access

4.4 Firewalls and Proxies

4.5 Activity – Examining Routing

4.6 Activity – Examining VLAN Routing

4.7 Activity – Examining Firewall Rules

5.1 IDS and IPS

5.2 OSI Model

5.3 TCP-IP

5.4 Activity – Examining Network Layers

6.1 Layer 4 Protocols

6.2 Layer 3 Protocols

6.3 Layer 2 Protocols

6.4 IP Addressing

6.5 Subnetting

6.6 DHCP

6.7 Activity – Examining TCP

6.8 Activity – Examining UDP

6.9 Activity – Examining IP

6.10 Activity – Examining ICMP

6.11 Activity – Examining ARP

7.1 DNS

7.2 DNS Records

7.3 NTP

7.4 Authentication

7.5 Biometrics

7.6 Activity – Examining DNS

7.7 Activity – Examining DNS Records

8.1 Local Authentication

8.2 Directory Service Authentication

8.3 Extending Authentication

8.4 Authorization

8.5 Activity – Testing Access Control

9.1 Linux Overview

9.2 Linux File System

9.3 Linux Core Commands

9.4 Linux Search and Read Commands

9.5 Activity – Exploring Linux

9.6 Activity – Using Linux Core Commands

9.7 Activity – Using Linux Search Commands

9.8 Activity – Using Linux Read Commands

10.1 Linux File Permissions

10.2 Linux Special Permissions

10.3 Linux Configuration

10.4 Linux Packages

10.5 Linux User Management

11.1 Activity – Setting Linux Permissions

11.2 Activity – Setting Linux Special Permissions

11.3 Activity – Managing Packages in Kali Linux

11.4 Activity – Managing Users and Groups in Linux

12.1 Linux Job Scheduling

12.2 Linux File, Directory, and Download Commands

12.3 Linux System Commands

12.4 Linux Network Management

12.5 Linux Firewall

13.1 Activity – Scheduling Tasks in Linux

13.2 Activity – Using Linux File, Directory, and Download Commands

13.3 Activity – Using Linux Edit and Archive Commands

13.4 Activity – Compiling Malicious Code

13.5 Activity – Using Linux Process and System Commands

13.6 Activity – Using Linux Disk, Hardware, and Network Commands

14.1 Windows Overview

14.2 Windows Registry

14.3 Windows Security

15.1 Windows Commands

15.2 Windows Admin Commands

15.3 Windows Network Commands

15.4 Windows Run Line Commands

15.5 Windows PowerShell

16.1 Activity – Using Windows Built-in Commands

16.2 Activity – Using Windows Task Commands

16.3 Activity – Using Windows Admin Commands

16.4 Activity – Using Windows Network Commands

16.5 Activity – Using Windows PowerShell

16.6 Networking and OS Penetration Testing

16.7 Review

17.1 Information Security Overview

17.2 Hacking Concepts

17.3 Ethical Hacking Concepts

17.4 Penetration Testing

17.5 Penetration Testing Part 2

17.6 Activity – Performing a Static Code Review

18.1 Cyber Kill Chain Concepts

18.2 Activity – Performing Weaponization

18.3 Information Security

18.4 Security Policies

18.5 Security Controls

18.6 Access Control

19.1 Data Protection

19.2 Backup Sites

19.3 Vulnerability Management

19.4 SIEM

19.5 Risks

20.1 Risk Management

20.2 Incident Handling

20.3 Information Security Laws and Standards

20.4 Activity – Assessing Risk

20.5 Ethical Hacking Penetration Testing

20.6 Review

20.7 Conclusion

Your Training Instructor

Chrys Thorsen
Education and Technology Expert

Example Certificate

Teach Ours Certificate Sample

$49.99

Course features:

24 Hrs 3 Min

113 Videos

1 Year Access

Available on Web

Certificate of completion