Certified Ethical Hacker

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The Certified Ethical Hacker (CEH) course by EC-Council is designed to provide students with the knowledge and skills necessary to understand and detect weaknesses in systems and networks through ethical hacking techniques. The course covers a wide range of cybersecurity topics, emphasizing the tools and methodologies hackers use to breach security defenses.

Key Features:

  • Comprehensive Overview: The CEH course provides an in-depth understanding of the latest hacking tools, techniques, and methodologies from an ethical hacker’s perspective.
  • Hands-On Labs: The course includes practical lab sessions, allowing students to simulate real-world hacking techniques in a controlled environment.
  • Hacking Techniques: Focus on areas such as footprinting, scanning, enumeration, system hacking, malware threats, social engineering, and web application hacking.
  • Security Controls: Students learn to implement security measures to safeguard systems from potential attacks.
  • Industry Standard: The course aligns with the latest standards set by global organizations and is updated regularly to include the most recent threats and vulnerabilities.

Topics Covered:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hacking Web Applications
  13. Hacking Wireless Networks
  14. Hacking Mobile Platforms
  15. Evading IDS, Firewalls, and Honeypots
  16. Cloud Computing
  17. Cryptography

Target Audience:

  • Security professionals
  • Network administrators
  • Penetration testers
  • Auditors
  • Security officers

The CEH certification validates the ability to think and act like a hacker, making it a vital credential for those seeking roles in penetration testing, ethical hacking, and security analysis.

Show More

Course Content

Introduction

  • Introduction to the Linux Command Line
  • Getting Started with the Command Line
  • Zoom Recorded Video
    02:48:19
  • Getting Help with Man Pages
  • Using the ls Command
  • Viewing Text Files: The more and less Commands
  • Using the cat Command
  • Conclusion
  • Knowledge Check
  • Zom In Cyber: Practical Hands-On Linux Command Line Assignment

Linux – Lesson 2
Linux

Linux – Lesson 3
Preparing during the week

Linux – Lesson 4

Linux – Lesson 5

Linux – Lesson 6

Student Ratings & Reviews

No Review Yet
No Review Yet