Certified Ethical Hacker – CEH Microsoft Edition

This course in its 10th iteration is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information
security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

The following module has been broken up by objective to give students the option to watch a topic in short bursts, but for those who want to go in and see the full module the way the course would be taught in a life class we have added a full module at the end of the list.

Course Content

Lessons Status
1

Meet Your Instructor - CEH - Microsoft Edition

2

Module 01: Introduction to Ethical Hacking - CEH - Microsoft Edition

3

Module 02: Footprinting and Reconnaissance - CEH - Microsoft Edition

4

Module 03: Scanning Networks - CEH - Microsoft Edition

5

Module 04: Enumeration - CEH - Microsoft Edition

6

Module 05: Vulnerability Analysis - CEH - Microsoft Edition

7

Module 06: System Hacking - CEH - Microsoft Edition

8

Module 07: Malware Threats - CEH - Microsoft Edition

9

Module 08: Sniffing - CEH - Microsoft Edition

10

Module 09: Social Engineering - CEH - Microsoft Edition

11

Module 10: Denial-of-Service - CEH - Microsoft Edition

12

Module 11: Session Hijacking - CEH - Microsoft Edition

13

Module 12: Evading IDS, Firewalls, and Honeypots - CEH - Microsoft Edition

14

Module 13: Hacking Web Servers CEH - Microsoft Edition- CEH - Microsoft Edition

15

Module 14: Hacking Web Applications - CEH - Microsoft Edition

16

Module 15: SQL Injection - CEH - Microsoft Edition

17

Module 16: Hacking Wireless Networks - CEH - Microsoft Edition

18

Module 17: Hacking Mobile Platforms - CEH - Microsoft Edition

19

Module 18: IoT Hacking - CEH - Microsoft Edition

20

Module 19: Cloud Computing

« » page 1 / 2