🔍 Click to enlarge photo

Certified Ethical Hacker CEHv13 (312–50 v13) Pearson Course

Web price: $199.00
Member price: $199.00
Qty

Please select required options above

Description

The Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Topics include the basic concepts related to ethical hacking, reconnaissance techniques, system hacking phases and attack techniques, network and perimeter hacking, web application hacking occurs, wireless network hacking, and mobile platforms, IoT, and OT hacking.

The goal of this course is to provide you with all the tools you need to prepare for the Certified Ethical Hacker exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try.

Duration:

Approximately 50 hours. Actual duration will vary by student.

Course components: 180-day access to:
  • Video Content
  • Text Content
  • Labs
  • Practice Exam
Audience
  • An IT skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner to assess the security posture of a target system(s).
Prerequisites
  • Minimum 2 years' experience in Information Security
  • Knowledge of networking, TCP/IP, and basic computer language
Course objectives: Upon successful completion of this course, students should be able to:
  • Explain basic concepts related to ethical hacking
  • Demonstrate reconnaissance techniques
  • Describe system hacking phases and attack techniques
  • Identify network and perimeter hacking
  • Explain how web application hacking occurs
  • Understand wireless network hacking
  • Describe hacking on mobile platforms, IoT, and OT hacking

Training outline

Lesson 1: An Introduction to Ethical Hacking (1 hour and 12 minutes)

  • Security Fundamentals
  • Security Testing
  • Hacker and Cracker Descriptions
  • Ethical Hackers
  • Test Plans – Keeping It Legal
  • Ethics and Legality

Lesson 2: The Technical Foundations of Hacking (36 minutes)

  • The Hacking Process
  • The Ethical Hacker’s Process
  • Information Security Systems and the Stack

Lesson 3: Footprinting, Reconnaissance, Scanning, and Enumeration (48 minutes)

  • Footprinting
  • Reconnaissance
  • Scanning
  • Enumeration

Lesson 4: Enumerations and System Hacking Attack Techniques (24 minutes)

  • Enumeration
  • System Hacking

Lesson 5: Social Engineering, Malware Threats, and Vulnerability Analysis (36 minutes)

  • Social Engineering
  • Malware Threats
  • Vulnerability Analysis

Lesson 6: Sniffers, Session Hijacking, and Denial of Service (36 minutes)

  • Sniffers
  • Session Hijacking
  • Denial of Service and Distributed Denial of Service

Lesson 7: Web Server Hacking, Web Applications, and Database Attacks (36 minutes)

  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking

Lesson 8: Wireless Technologies, Mobile Security, and Attacks (36 minutes)

  • Wireless Technologies
  • Mobile Security
  • Wireless LANs

Lesson 9: Evading IDS, Firewalls, and Honeypots (36 minutes)

  • Intrusion Detection and Prevention Systems
  • Firewalls
  • Honeypots

Lesson 10: Cryptographic Attacks and Defenses (1 hour and 12 minutes)

  • Cryptography History and Concepts
  • Encryption Algorithms
  • Public Key Infrastructure
  • Security Protocols and Attack Countermeasures
  • Email and Disk Encryption
  • Cryptoanalysis and Attacks

Lesson 11: Cloud Computing, IoT, and Botnets (36 minutes)

  • Cloud Computing
  • Internet of Things (IoT)
  • Botnets