• Home
uCertify Logo
  • Login or Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Certified Ethical Hacker Version 11

(CEH-v11.AB1) / ISBN: 9781644593431
This course includes
Lessons
TestPrep
LiveLab
CEH-v11.AB1_pro.png?1648918992 CEH-v11.AB1_pro.png?1648918992
Share
Try This Course
Are you an instructor?
Request a free evaluation copy

Certified Ethical Hacker Version 11

Here's what you will get

Lessons
  • 13+ Lessons
  • 701+ Exercises
  • 202+ Quizzes
  • 150+ Flashcards
  • 150+ Glossary of terms
TestPrep
  • 125+ Pre Assessment Questions
  • 2+ Full Length Tests
  • 125+ Post Assessment Questions
  • 250+ Practice Test Questions
LiveLab
  • 42+ LiveLab
  • 42+ Video tutorials
  • 01:35+ Hours
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
  • Goals and Methods
  • Who Should Read This course?
  • Strategies for Exam Preparation
  • How This Course Is Organized
Lesson 2: An Introduction to Ethical Hacking
  • Security Fundamentals
  • Security Testing
  • Cyber Kill Chain
  • Hacker and Cracker Descriptions
  • Ethical Hackers
  • Test Plans—Keeping It Legal
  • Ethics and Legality
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
Lesson 3: The Technical Foundations of Hacking
  • The Hacking Process
  • The Ethical Hacker’s Process
  • Information Security Systems and the Stack
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
Lesson 4: Footprinting, Reconnaissance, and Scanning
  • Footprinting
  • Scanning
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
Lesson 5: Enumeration and System Hacking
  • Enumeration
  • System Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
Lesson 6: Social Engineering, Malware Threats, and Vulnerability Analysis
  • Social Engineering
  • Malware Threats
  • Vulnerability Analysis
  • Summary
  • Review All Key Topics
  • Command Reference to Check Your Memory
  • Exercises
  • Suggested Reading and Resources
Lesson 7: Sniffers, Session Hijacking, and Denial of Service
  • Sniffers
  • Session Hijacking
  • Denial of Service and Distributed Denial of Service
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
Lesson 8: Web Server Hacking, Web Applications, and Database Attacks
  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
Lesson 9: Wireless Technologies, Mobile Security, and Attacks
  • Wireless and Mobile Device Technologies
  • Wi-Fi
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
Lesson 10: Evading IDS, Firewalls, and Honeypots
  • Intrusion Detection and Prevention Systems
  • Firewalls
  • Honeypots
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
Lesson 11: Cryptographic Attacks and Defenses
  • Cryptography History and Concepts
  • Encryption Algorithms
  • Public Key Infrastructure
  • Email and Disk Encryption
  • Cryptoanalysis and Attacks
  • Security Protocols and Countermeasures
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
Lesson 12: Cloud Computing, IoT, and Botnets
  • Cloud Computing
  • IoT
  • Botnets
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
Lesson 13: Final Preparation
  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary

Hands on Activities (Live Labs)

The Technical Foundations of Hacking

  • Analyzing Captured Packets Using a Sniffer
  • Using the tracert Command

Footprinting, Reconnaissance, and Scanning

  • Using Maltego
  • Using nslookup for Passive Reconnaissance
  • Using ipconfig to Perform Reconnaissance
  • Performing Zone Transfer Using dig
  • Using the whois Program
  • Using the masscan Command
  • Scanning a Port Using nmap

Enumeration and System Hacking

  • Enumerating Data Using enum4linux
  • Scanning a Network using nbtscan
  • Using nmap Scripts for Enumerating Users
  • Managing NTFS Permissions
  • Cracking Windows Passwords
  • Viewing Syslog
  • Cracking a Linux Password Using John the Ripper
  • Using Rainbow Tables

Social Engineering, Malware Threats, and Vulnerability Analysis

  • Detecting a Phishing Site Using Netcraft
  • Using the SET Tool
  • Observing an SHA-Generated Hash Value
  • Scanning Malware Using Antivirus
  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning Using Nessus

Sniffers, Session Hijacking, and Denial of Service

  • Capturing Network Packets Using tcpdump
  • Using Ettercap for ARP Spoofing
  • Spoofing a MAC Address
  • Using Wireshark
  • Performing ARP Spoofing
  • Simulating a DoS Attack

Web Server Hacking, Web Applications, and Database Attacks

  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Exploiting Windows 7 Using Metasploit
  • Performing a Memory-Based Attack
  • Attacking a Website Using XSS Injection
  • Defending Against a Buffer Overflow Attack
  • Exploiting a Website Using SQL Injection

Evading IDS, Firewalls, and Honeypots

  • Using the hping Program

Cryptographic Attacks and Defenses

  • Examining Asymmetric Encryption
  • Using OpenSSL to Create a Public/Private Key Pair
  • Performing Symmetric Encryption
  • Creating PGP Certification
  • Hiding Text Using Steganography
  • Observing an MD5-Generated Hash Value
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept