Video description
13+ Hours of Video Instruction
Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam.
Overview:
The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council's updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking, including fundamentals; reconnaissance techniques; network and perimeter hacking; web application hacking; wireless, mobile, IoT and OT hacking; cloud computing, and cryptography. Taught by experienced security experts Omar Santos and Nick Garner, this full-featured video course will help you better understand the world of hacking so you can act to defend attacks, as well as pass the CEH exam.
This complete video course is your full resource for passing the CEH exam. Included are real-world demos and labs so you can see how to use tools, tactics, exploits, and technologies using Parrot Security OS. You also will find step-by-step examples of security penetration testing methodologies and concepts for each topic covered in the exam.
Topics include
* Information security, cybersecurity, and ethical hacking overview
* Reconnaissance techniques
* Network and perimeter hacking
* Web application hacking
* Wireless, mobile, IoT, and OT hacking
* Cloud computing and cryptography
Skill level:
Intermediate
Learn How To
* Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware
* Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration
* Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access
* Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications
* Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors
* Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms
Who Should Take This Course:
* Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam
* Anyone interested in becoming a cybersecurity professional
* Anyone interested in ethical hacking (penetration testing)
Course Requirements:
Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
Table of contents
- Introduction
- Module 1: Information Security, Cybersecurity, and Ethical Hacking Overview
- Lesson 1: Introduction to Ethical Hacking
- Module 2: Reconnaissance Techniques
-
Lesson 2: Footprinting and Reconnaissance
- Learning objectives
- 2.1 Introducing Footprinting Concepts and Methodologies
- 2.2 Performing Footprinting through Search Engines
- 2.3 Performing Footprinting through Web Services and Websites
- 2.4 Performing Footprinting through Social Networking Sites
- 2.5 Exploring Shodan
- 2.6 Understanding Email Footprinting
- 2.7 Understanding Whois Footprinting
- 2.8 Understanding DNS Footprinting
- 2.9 Understanding Network Footprinting
- 2.10 Surveying Footprinting Tools
- 2.11 Understanding Footprinting Countermeasures
-
Lesson 3: Scanning Networks
- Learning objectives
- 3.1 Surveying Network Scanning Concepts
- 3.2 Exploiting Scanning Tools
- 3.3 Understanding Host Discovery
- 3.4 Network Scanning Overview
- 3.5 Network Scanning Methods
- 3.6 Network Scanning Demo
- 3.7 Performing OS Discovery (Banner Grabbing/OS Fingerprinting)
- 3.8 Scanning Beyond IDS and Firewall
- 3.9 Creating Network Diagrams
-
Lesson 4: Enumeration
- Learning objectives
- 4.1 Introducing Enumeration Techniques
- 4.2 Performing NetBIOS Enumeration
- 4.3 Performing SNMP Enumeration
- 4.4 Performing LDAP Enumeration
- 4.5 Performing NTP and NFS Enumeration
- 4.6 Performing SMTP and DNS Enumeration
- 4.7 Conducting Additional Enumeration Techniques
- 4.8 Surveying Enumeration Countermeasures
- Module 3: Network and Perimeter Hacking
- Lesson 5: Sniffing
- Lesson 6: Social Engineering
- Lesson 7: Denial-of-Service
- Lesson 8: Session Hijacking
- Lesson 9: Evading IDS, Firewalls, and Honeypots
- Module 4: Web Application Hacking
- Lesson 10: Hacking Web Servers
-
Lesson 11: Hacking Web Applications
- Learning objectives
- 11.1 Introducing Web Application Concepts
- 11.2 Understanding Web App Threats and Hacking Methodologies
- 11.3 Footprinting Web Infrastructures
- 11.4 Analyzing Web Applications
- 11.5 Introducing the OWASP Top 10
- 11.6 Attacking Authentication, Authorization, and Access Controls - Part 1
- 11.7 Attacking Authentication, Authorization, and Access Controls - Part 2
- 11.8 Performing Command Injection Attacks
- 11.9 Exploiting Directory/Path Traversal Vulnerabilities
- 11.10 Input Validation and Sanitation
- 11.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities
- 11.12 Exploiting XML External Entities
- 11.13 Attacking Web Services, APIs, and Understanding Webhooks
- Lesson 12: SQL Injection
- Module 5: Wireless, Mobile, IoT, and OT Hacking
- Lesson 13: Hacking Wireless Networks
- Lesson 14: Hacking Mobile Platforms
-
Lesson 15: IoT and OT Hacking
- Learning objectives
- 15.1 Introducing IoT Concepts - Part 1
- 15.2 Introducing IoT Concepts - Part 2
- 15.3 Understanding IoT Attacks
- 15.4 Understanding IoT Hacking Methodologies
- 15.5 Surveying IoT Hacking Tools
- 15.6 Understanding IoT Countermeasures
- 15.7 Introducing OT Concepts
- 15.8 Performing OT Attacks
- 15.9 Understanding OT Hacking Methodologies
- 15.10 Surveying OT Hacking Tools
- 15.11 Understanding OT Countermeasures
- Module 6: Cloud Computing and Cryptography
-
Lesson 16: Cloud Computing
- Learning objectives
- 16.1 Introducing Cloud Computing Concepts
- 16.2 Introducing Agile, DevOps, and CI/CD Pipelines
- 16.3 Exploring Container Technology
- 16.4 Understanding Serverless Computing
- 16.5 Surveying Cloud Computing Threats
- 16.6 Introduction to Kubernetes
- 16.7 Introduction to Docker and Kubernetes Security
-
Lesson 17: Cryptography
- Learning objectives
- 17.1 Introducing Cryptography Concepts
- 17.2 Understanding the Different Encryption Algorithms
- 17.3 Surveying Cryptography Tools
- 17.4 Understanding Public Key Infrastructure (PKI)
- 17.5 Understanding Email Encryption
- 17.6 Understanding Disk Encryption
- 17.7 Introducing Cryptanalysis and Countermeasures
- Summary
Product information
- Title: Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition
- Author(s):
- Release date: November 2021
- Publisher(s): Pearson
- ISBN: 0137446790
You might also like
video
Certified Ethical Hacker (CEH) v.12
The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical …
video
The Complete Ethical Hacking Course
A comprehensive course designed to cover from basic to the most advanced ethical hacking techniques using …
video
CompTIA Security+ Certification SY0-601: The Total Course
Excel in the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into …
video
The Complete Cybersecurity Bootcamp, 2nd Edition
26 Hours of Video Instruction 26 Hours of Detailed, Curated Video Training to Take You from …