Ethical hacking is becoming a popular skill for IT operations personnel to have, and an important checkmark for many IT ops positions.
This Certified Ethical Hacker (CEH) Preparation is designed for them who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). This course covers everything you need to know about becoming a certified professional ethical hacker. With this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaisance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.
The course will also prepare you to take the CEH exam.
How is this qualification is delivered?
Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.
These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.
Certification:
Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.
Course Curriculum
Overview | |||
Overview | FREE | 00:35:00 | |
Reconnaissance | |||
Reconnaissance | FREE | 00:25:00 | |
Protocols | |||
Protocols | 01:25:00 | ||
Windows Hacking | |||
Windows Hacking | 01:19:00 | ||
Attacking Web Technologies | |||
Attacking Web Technologies | 00:56:00 | ||
Pen Testing Wireless Networks | |||
Pen Testing Wireless Networks | 01:34:00 | ||
Security Fundamentals | |||
Security Fundamentals | FREE | 00:51:00 | |
Access Controls | |||
Access Controls | 00:33:00 | ||
Protocols | |||
Protocols | 00:36:00 | ||
Cryptography | |||
Cryptography | 00:52:00 | ||
Why Vulnerability Assessments? | |||
Why Vulnerability Assessments? | 00:36:00 | ||
Vulnerability Tools of the Trade | |||
Vulnerability Tools of the Trade | 00:10:00 | ||
Output Analysis and Reports | |||
Output Analysis and Reports | 00:13:00 | ||
Reconnaisance, Enumeration and Scanning | |||
Reconnaisance, Enumeration and Scanning | 00:51:00 | ||
Gaining Access | |||
Gaining Access | 00:31:00 | ||
Maintaining Access | |||
Maintaining Access | 00:17:00 | ||
Covering Tracks | |||
Covering Tracks | 00:18:00 | ||
Malware | |||
Malware | 00:28:00 | ||
Buffer Overflows | |||
Buffer Overflows | 00:22:00 | ||
Password Cracking | |||
Password Cracking | 00:33:00 | ||
Mock Exam | |||
Mock Exam – Ethical Hacker Certification Course | 00:20:00 | ||
Final Exam | |||
Final Exam – Ethical Hacker Certification Course | 00:20:00 |
Course Reviews
No Reviews found for this course.