Ethical Hacking training course – Master hacking
Ethical Hacking training course – Master hacking, available at $39.99, has an average rating of 4.75, with 112 lectures, based on 177 reviews, and has 10209 subscribers.
You will learn about Bulding ethical hacking skills for acquiring Certified Ethical Hacker certification from Ec-council This course is ideal for individuals who are Anyone – who is interested in their own security or someone else's. It is particularly useful for Anyone – who is interested in their own security or someone else's.
Enroll now: Ethical Hacking training course – Master hacking
Summary
Title: Ethical Hacking training course – Master hacking
Price: $39.99
Average Rating: 4.75
Number of Lectures: 112
Number of Published Lectures: 112
Number of Curriculum Items: 112
Number of Published Curriculum Objects: 112
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Bulding ethical hacking skills for acquiring Certified Ethical Hacker certification from Ec-council
Who Should Attend
- Anyone – who is interested in their own security or someone else's.
Target Audiences
- Anyone – who is interested in their own security or someone else's.
Security is major concern for an individuals and enterprises alike. Gaining ethical skills helps one from protecting himself and his/her organization. The CEH course by EC council is organized structure of course contents and we have addressed almost all contents, technologies and tools. This course shall be updated with the additional course videos as and when available.
Course Curriculum
Chapter 1: Module 1 – Introduction to Hacking
Lecture 1: 1.1 Introduction to Hacking
Lecture 2: 1.2 Ethical hacker
Lecture 3: 1.3 Information Security Laws and Standards
Lecture 4: 1.4 Information Security
Lecture 5: 1.5 Incident Management
Lecture 6: 1.6 Data breaches and malware trends
Lecture 7: 1.7 Threat modelling
Lecture 8: 1.8 EISA, Vulnerability Assessment, VA research, info warfare
Chapter 2: Module 2 – Footprinting (Reconnaissance)
Lecture 1: 2.1 Footprinting (Reconnaissance) introduction
Lecture 2: 2.2-Fp through Search engines
Lecture 3: 2.3-Google hacking-dorking
Lecture 4: 2.4 Web crawler / Spider
Lecture 5: 2.5 Footprinting through Websites
Lecture 6: 2.6 Whois lookup
Lecture 7: 2.7 Traceroute, Looking glass server, BGP Tools
Lecture 8: 2.8 NSLookup
Lecture 9: 2.9 SNMP – Simple Network Management Protocol
Lecture 10: 2.10 Maltego – Visual link analysis tool: part 1
Lecture 11: 2.11 Recon-ng reconnaissance framework
Lecture 12: 2.12 Footprinting through email tracking
Chapter 3: Module 3 – Network scanning
Lecture 1: 3.1 Introduction to Network scanning
Lecture 2: 3.2 Network port scanning
Lecture 3: 3.3 Network scanning tools
Lecture 4: 3.4 Nmap – Network mapper – scanner
Lecture 5: 3.5 Network monitoring tools – Open source
Lecture 6: 3.6 Network monitoring tools – Commercial
Lecture 7: 3.7 Ping – Ping sweep
Lecture 8: 3.8a HPing and FPing demo on Kali Linux
Lecture 9: 3.8 HPing and FPing
Lecture 10: 3.9 Proxy Servers 1
Lecture 11: 3.10 Proxy server tools – 2
Lecture 12: 3.11 Tor project Tor proxy – (The Onion Routing)
Chapter 4: Module 4 – Network Enumeration
Lecture 1: 4.1 Network Enumeration introduction
Lecture 2: 4.2 Network enumeration tools
Lecture 3: 4.3 Scanning and Enumeration Countermeasures
Chapter 5: Module 5 – System Hacking
Lecture 1: 5.1 Hacking Methodology
Lecture 2: 5.2 Password cracking
Lecture 3: 5.8 Brute-force attack
Lecture 4: 5.15 Ophcrack – Windows password cracker
Lecture 5: 5.16 CeWL – Custom Word List generator
Lecture 6: 5.17 Crunch wordlist generator
Lecture 7: 5.18 John the Ripper
Lecture 8: 5.19 Pwdump – Password Dumper and Hash Suite
Lecture 9: 5.20 Hashcat – advanced password recovery tool
Chapter 6: Module 6 – Malware Trojans
Lecture 1: 6.1 Trojan horse (Trojan) introduction
Lecture 2: 6.3 Beast trojan – Remote Administration Tool (RAT)
Lecture 3: 6.4 Beast Trojan demo – Educational purpose ONLY
Lecture 4: 6.5 Process explorer
Lecture 5: 6.7 Malware countermeasures
Chapter 7: Module 7 – Malwares – Virus and Worms
Lecture 1: 7.1 Virus introduction
Lecture 2: 7.2 How virus works
Lecture 3: 7.4 Virus removal
Lecture 4: 7.5 Stealth techniques
Lecture 5: 7.6 Virus maker tools – bvm
Chapter 8: Module 8 – Packet Sniffers
Lecture 1: 8.1 – Packet Sniffers
Lecture 2: 8.2 – Wireshark
Lecture 3: 8.3 – Wireshark – demo
Lecture 4: 8.4 – Countermeasures-Sniffing
Lecture 5: 8.5 Xplico
Chapter 9: Module 9 – Social engineering / networking
Lecture 1: 9.1 Social engineering introduction
Lecture 2: 9.2 Social engineering techniques
Lecture 3: 9.3 Social engineering countermeasures
Chapter 10: Module 10 – DoS/DDoS attacks
Lecture 1: 10.1 DoS-DDoS attacks Introduction
Lecture 2: 10.2 DoS-DDoS attack Types
Lecture 3: 10.3 DoS-DDoS attack techniques and tools
Chapter 11: Module 11 – SessionHijacking
Lecture 1: 11.1 Session hijacking
Lecture 2: 11.2 Cookies
Lecture 3: 11.3 Session hijacking tools
Lecture 4: 11.4-Burp Suite – Proxy
Lecture 5: 11.5-Firesheep and HTTPS Anywhere
Lecture 6: 11.6-Session hijacking – Countermeasures
Chapter 12: Module 12 – Hacking Web Servers
Lecture 1: 12.1 Introduction
Lecture 2: 12.2 Attack Types
Chapter 13: Module 13 – Hacking Web Applications
Lecture 1: 13.1 Hacking web apps Introduction
Lecture 2: 13.2 OWASP
Lecture 3: 13.3 OWASP-Top 10
Lecture 4: 13.4 Tools and countermeasures
Lecture 5: 13.5 OWASP WebGoat
Chapter 14: Module 14 – SQL Injection
Lecture 1: 14.2 – SQL Injection attacks
Lecture 2: 14.3 – SQL Injection mitigation
Lecture 3: 14.4 – SQL Injection Tools
Chapter 15: Module 15 – Hacking Wireless networks
Lecture 1: 15.1 Cracking Wireless security
Lecture 2: 15.2 Wireless hacking Tools
Lecture 3: 15.3 Wireless hacking Countermeasures
Lecture 4: Fern Wifi Cracker
Instructors
-
Kaushik Vadali
Cloud Infra and Info Security professional at CBTU
Rating Distribution
- 1 stars: 16 votes
- 2 stars: 8 votes
- 3 stars: 37 votes
- 4 stars: 43 votes
- 5 stars: 73 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024