Take this
course

Software Development / Security & Encryption

Penetration Testing and Ethical Hacker Bootcamp

Launch yourself into a ethical hacking career and prepare for industry certifications and exams.

Description

 This Bootcamp readies students for Industry certifications exam and Interviews which is paramount for any IT specialist and anyone trying to enhance their network's defenses. With top experts and an interactive environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing.This bootcamp was designed for aspiring information security professionals who wish to take an immersive look at this in-demand career and ultimately become a professional pentester. You'll examine not just the theories and tools a professional hacker would use when conducting a penetration test, but also gain an insight into the day to day workflow of an ethical hacker.Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system.This course prepares students for the Industry certifications. 

Full details

Curriculum

  • Introduction to Ethical Hacking
    Introduction
    Welcome to CEH training in this class we will go over Introduction to CEH and what you will learn throughout this course. Also we will go over Logical Operators for Security Introduction And some Networking concepts and terms.
    4:38
    TCP, UDP and Networking
    In this class we will go over TCP Protocol, TCP 3-Way Handshake, UDP Packet, TCP Header Flags and then end with TCP vs UDP protocols.
    8:31
    Firewalls
    In this class we will go over Firewalls mostly discussing about Stateful Firewalls and Packet Filtering.
    6:11
    Hacker, Cracker and Types of Hackers
    This class we will go over definitions of Hacker and Cracker to start with. Then you will learn the different types of Hackers out there mainly we will go over White hat, Grey Hat, Black Hat and Hard hat.
    3:35
    Network Penetration and NMAP
    This class will teach you what Network Penetration is, then we will go over types of penetration testing mainly White box test, Black and Gray box test, finally we will go over NMAP.
    8:53
    WayBackMachine and Regulations
    In this class we will talk about WayBackMachine and get you familiar with it. Then we will discuss Regulations.
    8:40
    Cracker vs Hacker vs IRL
    This class discusses the difference between Crackers, Hackers, and IRL
    8:40
    SYN Scan and IPID
    8:11
    Google Hacking
    6:09
    Governance Frameworks and Vulnerabilities
    5:27
    RISK and WarDriving
    7:38
    Exploit DB and Chained Exploits Attacks
    11:36
    Password Lists, Rainbow Tables, and Password Cracking
    12:23
    USB Security and Proxy
    9:41
    Protocols & Common Port Numbers
    6:17
    Directory Traversal Attacks, 4-Way Handshake, Enumeration and Covering tracks
    10:46
    Footprinting and Network Traffic Sniffing
    14:10
  • Enumeration
    Open Mail Relay, IP Sec and SSO
    7:43
    NBTSTAT & SID
    8:52
  • Sniffing
    OSI Model and CIA
    11:38
    Angry IP and Scans
    9:31
    Spoofing and Hijacking
    11:38
    DNS, DNS:Domain and Zone Transfer, DNS:Zone and Cache Poisoning and Reflect...
    10:41
    Split Horizon and CIDR
    6:41
    MAC Address & IPv4/IPv6 Addressing
    8:06
    Interrupts & DHCP (Dynamic Host Control Protocol)
    11:14
    Wireshark and Wireless Hacking
    5:18
  • Denial of Service
    Smurf/Fraggle/Teardrop Attacks
    7:23
  • Session Hijacking
    Burp Proxy and Hping
    7:17
  • Hacking Web Applications
    Cross Site Scripting & Cross Site Request Forgery
    8:48
    Firesheep, DSLAM/Cable Modem Architecture
    9:22
    Basic HTML
    4:22
  • SQL Injection
    Nikto Web Scanner, BT Crack, and Havij
    4:59
    SQL Injection
    6:10
    SQL (Structured Query Language)
    4:53
  • Hacking Wireless Networks
    WarDialing and OS
    6:50
    ACLs & Proximity Card
    4:37
    Kismet, WebGoat and WebScarab Signs a System is Hacked
    7:42
    Wireless Network Security
    10:50
  • Evading IDS, Firewalls, and Honeypots
    Hardening and IDS
    10:04
    Firewalk, Firewalls
    7:43
    Hexadecimal & ASCII
    11:42
  • Cryptography
    Ciphers and Data Center Humidity
    7:14
    Encryption DPI and SOAP
    9:55
    SSL & TLS
    13:15
    Renegotiation, Version Rollback, and BEAST Attacks
    11:52
    Truncation, Freak and Logjam, and Heartbleed Bug Attacks
    6:52
    Encryption Analysis
    10:17
    Symmetric & Asymmetric Ciphers
    4:59
    NAT (Network address Translation) & PKI (Public Key Infrastructure)
    6:59
  • Trojans and Backdoors
    IRC and Network Shells
    8:59
  • Viruses and Worms
    VIRI Part 1
    11:21
    VIRI Part 2
    9:10
    VIRI Part 3
    6:34
    Malware Types Part 1
    7:56
    Malware Types Part 2
    11:29
    Common Malware
    7:03
  • Buffer Overflow
    Buffer Overflow Protection
    5:59
  • Payment Card Industry (PCI)
    Payment Card Industry (PCI)
    6:33
    Build and Maintain Secure Networks and Systems
    6:44
    Protect Cardholder Data
    10:36
    Encrypt Transmission of Cardholder Data Across Open Public Networks
    6:32
    Restrict Access to Cardholder Data by Business Need-to-Know
    9:01
    Regularly Test Security Systems and Processes
    9:02
  • Penetration Testing
    SSDLC & Threat Modeling
    5:46
    EAP and Kali Linux
    8:57
    Misc. Tools
    9:46
    Repudiation & Kali Linux
    9:02
    Three phases of security testing
    5:41
  • CEH Cloud and Mobile Device Security
    CEH Cloud and Mobile Device Security
  • Test Prep Questions
    CEH Test Prep Questions 1
    5:45
    CEH Test Prep Questions 2
    7:13
    CEH Test Prep Questions 3
    8:50
    CEH Test Prep Questions 4
    6:10
    CEH Test Prep Questions 5
    5:10
    CEH Test Prep Questions 6
    7:57
    CEH Test Prep Questions 7
    6:30
    CEH Test Prep Questions 8
    8:54
    CEH Test Prep Questions 9
    9:57
    CEH Test Prep Questions 10
    9:36
    CEH Test Prep Questions 11
    9:47
    CEH Test Prep Questions 12
    9:36
    CEH Test Prep Questions 13
    9:28
    CEH Test Prep Questions 14
    7:20
    CEH Test Prep Questions 15
    9:15
    CEH Test Prep Questions 16
    9:05
    CEH Test Prep Questions 17
    10:03
    CEH Test Prep Questions 18
    9:17
    CEH Test Prep Questions 19
    8:05
    CEH Test Prep Questions 20
    9:01
    CEH Test Prep Questions 21
    8:48
    CEH Test Prep Questions 22
    9:13
    CEH Test Prep Questions 23
    8:57
    CEH Test Prep Questions 24
    8:54
    CEH Test Prep Questions 25
    10:03
    CEH Test Prep Questions 26
    9:20
    CEH Test Prep Questions 27
    9:26
    CEH Test Prep Questions 28
    8:26
    CEH Test Prep Questions 29
    7:07
    CEH Test Prep Questions 30
    8:17

Skills

  • Certified Ethical Hacker (CEH)
  • Computer Hacking
  • Cybersecurity
  • Ethical Hacking

Similar Courses

More Courses by this Instructor