Certified Ethical Hacker (CEH) Version 11 (ECC 312-50) Part 3
This course is a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work.
This is an exciting cyber security training series teaching students hacking techniques and types of attacks to become an ethical hacker. This Extensive CEH v11 Instructional Series Includes 3 Individual online courses covering current security domains and is the path to achieving your ethical hacking certification:
Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)
Instructor – Chrys Thorsen
What is an Ethical Hacker
Ethical hacking, also known as “white hat” hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hacking uses expertise to identify and fix vulnerabilities in systems, rather than exploit them for personal gain or to cause harm. This type of ethical hacking is typically done with the permission of the owner of the system being tested and is often done by cybersecurity professionals as a way to prevent malicious hackers, who are sometimes referred to as “black hat” hackers, from gaining access to a system.
Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Includes
Copies of all slides used in course
Flashcards
Games
Practice Exam Questions/Test
Certificate of Completion
This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, all lessons and topics are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning for ethical hacking.
In this Ethical hacking Foundations course, students will learn network security and how networks, protocols, and networking devices work. They will gain in-depth understanding of the network security limits found in a traditional networks and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities, network security and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a cyber security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer or network security. They will examine the controls used to protect a company’s digital assets and what it takes to circumvent such controls.
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Includes
Copies of all slides used in course
Flashcards
Games
Practice Exam Questions/Test covering cybersecurity domain
Certificate of Completion
Online Ethical Hacking Online Course Description:
Ethical Hacker is the second in a three-part comprehensive series on white-hat hacking. Students will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools for practical experience. The focus of this course is to solve the challenge of breaking into a computer system, collect evidence of success, and escape unnoticed. As before, every lesson and topic are infused with step-by-step guided practice using real hardware and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.
Students will learn to application hacking with Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks with this application attacks. They will crack passwords, intercept transmissions, use malware threats to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service their way to “pwning” a target*. Along with such venerable tools as nmap and netcat, students will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks and find app vulnerability. They will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.
* To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Includes
Copies of all slides used in course
Flashcards
Games
Practice Exam Questions/Test
Certificate of Completion
Online Course Description:
Advanced Ethical Hacker is the last in a three-part comprehensive series on white-hat hacking. In this course, students will take their penetrating skills to the next level, branching out into hacking web applications, websites, Wi-Fi, hacking mobile platforms, IoT/OT, hacking web servers, and cloud computing. They will employ encryption, hijack sessions, evade firewalls and intrusion detection, and test honeypots.
Students will evaluate a wide array of concepts of hacking and exploits against web applications and develop a vulnerability analysis. These include website defacement, command/SQL/iFrame injection, man-in-the-browser parameter tampering, cross-site scripting, malicious attacks, request forgeries, and attacks against XXE, SOAP, and AJAX. Students will then learn how to deploy a Wi-Fi “pineapple”, performing Evil Twin, KARMA, and KR00K attacks on wireless clients. They will crack WPA2 and WPS while learning the secret vulnerabilities of WPA3. They will hack mobile devices, steal files from an iPhone, capture audio and video from an Android phone, hack Bluetooth, clone an RFID badge, crack an encrypted NFC card, and plant a Raspberry PI “back door” on a target network. They will then move on to more exotic targets such as the Internet of Things, Industrial Control/SCADA Systems, and cloud-based networks.
Why you should take this course:
This online course ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a “script kiddie”. Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct attack techniques for successful ethical hacking campaign.
Intended audience:
This course is intended for IT professionals including:
Ethical hackers
System Administrators
Security Analyst
Security Consultant
Subject Matter Experts
Cloud Security Experts
Network Administrators
Engineers
Web managers
Auditors
Security Professionals
SOC Security
Course prerequisites:
Before taking this course:
You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required).
You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later.
Course Outline
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Outline