Certified Ethical Hacker – CEH Microsoft Edition

This course in its 10th iteration is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information
security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

The following module has been broken up by objective to give students the option to watch a topic in short bursts, but for those who want to go in and see the full module the way the course would be taught in a life class we have added a full module at the end of the list.

Course Content

Lessons Status

Meet Your Instructor - CEH - Microsoft Edition


Module 01: Introduction to Ethical Hacking - CEH - Microsoft Edition


Module 02: Footprinting and Reconnaissance - CEH - Microsoft Edition


Module 03: Scanning Networks - CEH - Microsoft Edition


Module 04: Enumeration - CEH - Microsoft Edition


Module 05: Vulnerability Analysis - CEH - Microsoft Edition


Module 06: System Hacking - CEH - Microsoft Edition


Module 07: Malware Threats - CEH - Microsoft Edition


Module 08: Sniffing - CEH - Microsoft Edition


Module 09: Social Engineering - CEH - Microsoft Edition


Module 10: Denial-of-Service - CEH - Microsoft Edition


Module 11: Session Hijacking - CEH - Microsoft Edition


Module 12: Evading IDS, Firewalls, and Honeypots - CEH - Microsoft Edition


Module 13: Hacking Web Servers CEH - Microsoft Edition- CEH - Microsoft Edition


Module 14: Hacking Web Applications - CEH - Microsoft Edition


Module 15: SQL Injection - CEH - Microsoft Edition


Module 16: Hacking Wireless Networks - CEH - Microsoft Edition


Module 17: Hacking Mobile Platforms - CEH - Microsoft Edition


Module 18: IoT Hacking - CEH - Microsoft Edition


Module 19: Cloud Computing

« » page 1 / 2