32 Hours 57 Minutes |
|
239 Course Videos |
|
249 Test Questions |
This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the ECC 312-50 version 10 exam while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows- and Kali Linux-based, covering a broad range of examples used by ethical hackers.
In this course, you will learn hands-on penetration testing and hacking skills including:
- Footprinting, scanning, and enumeration
- Vulnerability analysis
- Sniffing and Spoofing
- Social engineering
- Denial of Service
- Web server, web application, and database hacking
- System hacking using various forms of malware and tools
- Wireless network and mobile device hacking
- Evading IDS, Firewalls, and Honeypots
- Cryptography
- Cloud computing and Internet of Things hacking
The Certified Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques.
The topics in this course cover a broad range of ethical hacking concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.
- Introduction
- Introduction to Hacking
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts and Scope
- Information Security Controls Part 1
- Information Security Controls Part 2
- Information Security Laws and Standards
- Footprinting and Reconnaissance
- Footprinting Methodology
- Google Hacking
- FootPrinting Through Social Networking
- Website Foot Printing
- Email Foot Printing
- Competitive Intelligence Gathering
- WhoIs Foot Printing
- DNS Logical and Geographical Foot Printing
- Network Footprinting
- Foot Printing
- Foot Printing Tools
- Foot Printing Penetration Testing
- Conduct Recon with Ping Act
- Query DNS with NSLookUp Act
- Discover Website Subdomain with Sublist3r Act
- Obtain OSINT Information About a Person wit Pipl Act
- Gather Contact and Host Information with theHarvester Act
- Automate OSINT Research with Recon-ng Act
- Get Started with Metasploit Act
- Conduct Open Source Intelligence with OSR Framework Act
- Obtain Whois Information with Smart Whois Act
- Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
- Create an Offline Copy of a Website with HTTrack Act
- Trace an Email with eMail Tracker Pro Act
- Network Scanning
- Discovery Scans
- Port Scans
- Nmap
- Nmap Stealth Scans
- Nmap Options
- H-ping and Other Scanners
- SSDP Scanning
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Scanning Pen Testing
- Checking for Live Systems with Angry IP Scanner Act
- Network Scanning with MegaPing Act
- Advanced Scanning with nmap Act
- Packet Crafting with Hping3 Act
- Packet Crafting with Colasoft Packet Builder Act
- Enumeration
- Enumeration Technicques Tools
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Enumeration Countermeasures
- Enumeration Penetration Testing
- Enumerate NetBIOS Information with SuperScan Act
- Enumerate NetBIOS Information with NetBIOS Enumerator Act
- Enumerate NetBIOS and LDAP Information with Hyena Act
- Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act
- Vulnerability Analysis
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools and Reports
- Perform a Vulnerability Scan and Analysis with Nessus Act
- Malware Threats
- Trojan Concepts
- Trojan Types
- Trojan Tools
- Virus and Worm Concepts
- Virus Types
- Malware Analysis
- Malware Reverse Engineering
- Malware Detection
- Malware Countermeasures
- Malware Penetration Testing
- Infect a Victim with a Remote Access Trojan Act
- Sniffing Concepts
- DHCP Attacks
- MAC Attacks
- ARP Poisoning
- DNS Poisoning
- Sniffing Tools
- Sniffing Countermeasures
- Sniff a Clear Text HTTP Session with Wireshark Act
- Intercept and Crack a Network Login Act
- Social Engineering
- Human Based Social Engineering
- Computer Based Social Engineering
- Additional Types of Social Enginnering
- Social Engineering Countermeasures
- Social Engineering Penetration Testing
- Fool a User with a Baited USB Stick Act
- Harvest Credentials with Spear Phishing Act
- Denial of Service
- Common Dos-DDoS Attack Types
- Additional DoS Attack Types
- BotNets
- DoS Countermeasures
- Additional DoS Countermeasures
- DoS Penetration Testing
- Perform a DoS Attack With the Low Orbit ION Cannon Act
- Step Up the DoS Attack With the High Orbit ION Cannon Act
- Perform a Slowloris DoS Attack Act
- Session Hijacking
- Browser Session Hijacking
- Way to Compromise a Session Token
- Client Side Attacks
- Hijacking at the Network Level
- Session Hijacking Tools
- Session Hijacking Countermeasures
- Session Hijacking Testing
- Hacking Web Servers
- Webserver Attacks
- Methodology of Webserver Attacks
- Webserver Attack and Defense Tools
- Webserver General Defense
- Webserver Specific Attack Countermeasures
- Webserver Patch Management
- Webserver Pen Testing
- Footprint a Web Server with IDServe Act
- Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
- Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
- Brute Force a Web Server with Medusa Act
- Hacking Web Applications
- Web App Vulnerabilities and Exploits
- Web Application Threats
- Injection Attacks
- Hidden Fields and Clickjacking
- Cross Site Attacks
- Additional Web App Attacks
- Web Hacking Methodology
- Web App Hacking Countermeasures
- Web App Security Tools
- Web Application Penetration Testing
- Conduct a Simple Command Injection Attack Act
- Inject a Malicious Link with Cross Site Scripting Act
- Conduct a Cross Site Request Forgery Attack
- SQL Injection
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- SQL Injection Countermeasures
- SQL Injection Penetration Testing
- SQL Injection Act
- Hacking Wireless Networks
- Wireless Discovery and Mapping
- WiFi Sniffers
- WiFi Attacks
- WiFi Cracking
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Hacking Countermeasures
- Wireless Security Tools
- Wireless Penetration Testing
- Crack a WEP Key with Aircrack-ng Act
- Crack a WPA Key with Aircrack-ng Act
- System Hacking Methodology
- Windows System Vulnerabilities and Exploits
- Linux System Vulnerablities and Exploits
- Password Cracking Methods
- Network Service Password Cracking
- Windows Password Cracking
- Linux Password Cracking
- Password Cracking Tools
- Other Methods of Obtaining Passwords
- Keylogging
- Spyware
- RootKits
- Hiding Files
- Steganography
- Privilege Escalation
- Creating and Maintaining Remote Access
- Hiding Evidence
- System Hacking Penetration Testing
- Spoof Name Resolution and Capture Credentials with Responder Act
- Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
- Crack Passwords with L0pht7 Act
- Exploit Client Side Vulnerabilities Act
- Track User Activity with Spyware Act
- View and Clear Audit Policies with Auditpol Act
- Hide Data Using Whitespace Steganography Act
- Hide Data Using Least Significant Bit Steganography Act
- Cover Your Tracks Act
- Hacking Mobile Platforms
- Hacking Android OS
- Rooting Android
- Securing Android
- Hacking iOS
- Jailbreaking iOS
- Securing iOS
- Hacking Windows Phone OS
- Hacking Blackberry
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Penetration Testing
- Prepare Your Wireless Email Environment Act
- Pwn a Mobile Device with Metasploit Act
- Use a Mobile Device in a DDoS Campaign Act
- Return Your VMs to Original Configuration Act
- Uninstall Main Activity Malware from Android Act
- Evading IDS Firewalls and Honeypots
- Firewalls
- Honeypots
- IDS Firewalls and Honeypots Tools
- Evasion
- Evasion Countermeasures
- IDS Firewall Honeypot Penetration Testing
- Fly Below IDS Radar Act
- Test and Analyze a Honey Pot Act
- Bypass Windows Firewall Act
- Cryptography
- Encryption Algorithms
- Cryptography Tools
- Public key Infrastructure
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Crytography Penetration Testing
- Examine Hashing Algorithms Act
- Protect Data with Symmetric Encryption Act
- Protect Data with Asymmetric Encryption Act
- Cloud Computing
- Virtualization
- Cloud Computing Threats
- Countermeasures to Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Best Practices
- Cloud Penetration Testing
- IoT Hacking
- IoT Vulnerabilities and Attacks
- IoT Hacking Methodology and Tools
- IoT Hacking Countermeasures
- oT Penetration Testing
- Search the Internet for Vulnerable IoT Devices Act
- Conclusion
Description
This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the ECC 312-50 version 10 exam while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows- and Kali Linux-based, covering a broad range of examples used by ethical hackers.
In this course, you will learn hands-on penetration testing and hacking skills including:
- Footprinting, scanning, and enumeration
- Vulnerability analysis
- Sniffing and Spoofing
- Social engineering
- Denial of Service
- Web server, web application, and database hacking
- System hacking using various forms of malware and tools
- Wireless network and mobile device hacking
- Evading IDS, Firewalls, and Honeypots
- Cryptography
- Cloud computing and Internet of Things hacking
The Certified Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques.
The topics in this course cover a broad range of ethical hacking concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.
- Introduction
- Introduction to Hacking
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts and Scope
- Information Security Controls Part 1
- Information Security Controls Part 2
- Information Security Laws and Standards
- Footprinting and Reconnaissance
- Footprinting Methodology
- Google Hacking
- FootPrinting Through Social Networking
- Website Foot Printing
- Email Foot Printing
- Competitive Intelligence Gathering
- WhoIs Foot Printing
- DNS Logical and Geographical Foot Printing
- Network Footprinting
- Foot Printing
- Foot Printing Tools
- Foot Printing Penetration Testing
- Conduct Recon with Ping Act
- Query DNS with NSLookUp Act
- Discover Website Subdomain with Sublist3r Act
- Obtain OSINT Information About a Person wit Pipl Act
- Gather Contact and Host Information with theHarvester Act
- Automate OSINT Research with Recon-ng Act
- Get Started with Metasploit Act
- Conduct Open Source Intelligence with OSR Framework Act
- Obtain Whois Information with Smart Whois Act
- Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
- Create an Offline Copy of a Website with HTTrack Act
- Trace an Email with eMail Tracker Pro Act
- Network Scanning
- Discovery Scans
- Port Scans
- Nmap
- Nmap Stealth Scans
- Nmap Options
- H-ping and Other Scanners
- SSDP Scanning
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Scanning Pen Testing
- Checking for Live Systems with Angry IP Scanner Act
- Network Scanning with MegaPing Act
- Advanced Scanning with nmap Act
- Packet Crafting with Hping3 Act
- Packet Crafting with Colasoft Packet Builder Act
- Enumeration
- Enumeration Technicques Tools
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Enumeration Countermeasures
- Enumeration Penetration Testing
- Enumerate NetBIOS Information with SuperScan Act
- Enumerate NetBIOS Information with NetBIOS Enumerator Act
- Enumerate NetBIOS and LDAP Information with Hyena Act
- Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act
- Vulnerability Analysis
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools and Reports
- Perform a Vulnerability Scan and Analysis with Nessus Act
- Malware Threats
- Trojan Concepts
- Trojan Types
- Trojan Tools
- Virus and Worm Concepts
- Virus Types
- Malware Analysis
- Malware Reverse Engineering
- Malware Detection
- Malware Countermeasures
- Malware Penetration Testing
- Infect a Victim with a Remote Access Trojan Act
- Sniffing Concepts
- DHCP Attacks
- MAC Attacks
- ARP Poisoning
- DNS Poisoning
- Sniffing Tools
- Sniffing Countermeasures
- Sniff a Clear Text HTTP Session with Wireshark Act
- Intercept and Crack a Network Login Act
- Social Engineering
- Human Based Social Engineering
- Computer Based Social Engineering
- Additional Types of Social Enginnering
- Social Engineering Countermeasures
- Social Engineering Penetration Testing
- Fool a User with a Baited USB Stick Act
- Harvest Credentials with Spear Phishing Act
- Denial of Service
- Common Dos-DDoS Attack Types
- Additional DoS Attack Types
- BotNets
- DoS Countermeasures
- Additional DoS Countermeasures
- DoS Penetration Testing
- Perform a DoS Attack With the Low Orbit ION Cannon Act
- Step Up the DoS Attack With the High Orbit ION Cannon Act
- Perform a Slowloris DoS Attack Act
- Session Hijacking
- Browser Session Hijacking
- Way to Compromise a Session Token
- Client Side Attacks
- Hijacking at the Network Level
- Session Hijacking Tools
- Session Hijacking Countermeasures
- Session Hijacking Testing
- Hacking Web Servers
- Webserver Attacks
- Methodology of Webserver Attacks
- Webserver Attack and Defense Tools
- Webserver General Defense
- Webserver Specific Attack Countermeasures
- Webserver Patch Management
- Webserver Pen Testing
- Footprint a Web Server with IDServe Act
- Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
- Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
- Brute Force a Web Server with Medusa Act
- Hacking Web Applications
- Web App Vulnerabilities and Exploits
- Web Application Threats
- Injection Attacks
- Hidden Fields and Clickjacking
- Cross Site Attacks
- Additional Web App Attacks
- Web Hacking Methodology
- Web App Hacking Countermeasures
- Web App Security Tools
- Web Application Penetration Testing
- Conduct a Simple Command Injection Attack Act
- Inject a Malicious Link with Cross Site Scripting Act
- Conduct a Cross Site Request Forgery Attack
- SQL Injection
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- SQL Injection Countermeasures
- SQL Injection Penetration Testing
- SQL Injection Act
- Hacking Wireless Networks
- Wireless Discovery and Mapping
- WiFi Sniffers
- WiFi Attacks
- WiFi Cracking
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Hacking Countermeasures
- Wireless Security Tools
- Wireless Penetration Testing
- Crack a WEP Key with Aircrack-ng Act
- Crack a WPA Key with Aircrack-ng Act
- System Hacking Methodology
- Windows System Vulnerabilities and Exploits
- Linux System Vulnerablities and Exploits
- Password Cracking Methods
- Network Service Password Cracking
- Windows Password Cracking
- Linux Password Cracking
- Password Cracking Tools
- Other Methods of Obtaining Passwords
- Keylogging
- Spyware
- RootKits
- Hiding Files
- Steganography
- Privilege Escalation
- Creating and Maintaining Remote Access
- Hiding Evidence
- System Hacking Penetration Testing
- Spoof Name Resolution and Capture Credentials with Responder Act
- Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
- Crack Passwords with L0pht7 Act
- Exploit Client Side Vulnerabilities Act
- Track User Activity with Spyware Act
- View and Clear Audit Policies with Auditpol Act
- Hide Data Using Whitespace Steganography Act
- Hide Data Using Least Significant Bit Steganography Act
- Cover Your Tracks Act
- Hacking Mobile Platforms
- Hacking Android OS
- Rooting Android
- Securing Android
- Hacking iOS
- Jailbreaking iOS
- Securing iOS
- Hacking Windows Phone OS
- Hacking Blackberry
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Penetration Testing
- Prepare Your Wireless Email Environment Act
- Pwn a Mobile Device with Metasploit Act
- Use a Mobile Device in a DDoS Campaign Act
- Return Your VMs to Original Configuration Act
- Uninstall Main Activity Malware from Android Act
- Evading IDS Firewalls and Honeypots
- Firewalls
- Honeypots
- IDS Firewalls and Honeypots Tools
- Evasion
- Evasion Countermeasures
- IDS Firewall Honeypot Penetration Testing
- Fly Below IDS Radar Act
- Test and Analyze a Honey Pot Act
- Bypass Windows Firewall Act
- Cryptography
- Encryption Algorithms
- Cryptography Tools
- Public key Infrastructure
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Crytography Penetration Testing
- Examine Hashing Algorithms Act
- Protect Data with Symmetric Encryption Act
- Protect Data with Asymmetric Encryption Act
- Cloud Computing
- Virtualization
- Cloud Computing Threats
- Countermeasures to Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Best Practices
- Cloud Penetration Testing
- IoT Hacking
- IoT Vulnerabilities and Attacks
- IoT Hacking Methodology and Tools
- IoT Hacking Countermeasures
- oT Penetration Testing
- Search the Internet for Vulnerable IoT Devices Act
- Conclusion
Additional information
32 Hours 57 Minutes |
|
239 Course Videos |
|
249 Test Questions |
You may also like…
-
Read more
Cloud Computing Security Knowledge (CCSK)
9 Hours 25 Minutes
62 Course Videos
89 Test Questions
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares... -
Read more
CompTIA Cybersecurity Analyst (CSA+)
17 Hours 54 Minutes
67 Course Videos
250 Test Questions
The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to... -
Read more
CompTIA PenTest+ (PT0-001)
26 Hours
217 Course Videos
249 Test Questions
This highly hands-on course gives participants experience in network and system penetration testing It covers all of the...