Course curriculum

    1. 1.0 Introduction to CEH v12

    2. 1.1 Elements of Security

    3. 1.2 Cyber Kill Chain

    4. 1.3 MITRE ATT&CK Framework

    5. 1.3.1 Activity - Researching the MITRE ATTACK Framework

    6. 1.4 Hacking

    7. 1.5 Ethical Hacking

    8. 1.6 Information Assurance

    9. 1.7 Risk Management

    10. 1.8 Incident Management

    11. 1.9 Information Security Laws and Standards

    12. 1.10 Introduction to Ethical Hacking Review

    1. 2.1 Footprinting Concepts

    2. 2.2 OSINT Tools

    3. 2.2.1 Activity - Conduct OSINT with OSR Framework

    4. 2.2.2 Activity - OSINT with theHarvester

    5. 2.2.3 Activity - Add API Keys to theHarvester

    6. 2.2.4 Activity - Extract Document Metadata with FOCA

    7. 2.2.5 Activity - Extract Document Metadata with FOCA

    8. 2.3 Advanced Google Search

    9. 2.3.1 Activity - Google Hacking

    10. 2.4 Whois Footprinting

    11. 2.5 DNS Footprinting

    12. 2.5.1 Activity - Query DNS with NSLOOKUP

    13. 2.6 Website Footprinting

    14. 2.6.1 Activity - Fingerprint a Webserver with ID Serve

    15. 2.6.2 Activity - Extract Data from Websites

    16. 2.6.3 Activity - Mirror a Website with HTTrack

    17. 2.7 Email Footprinting

    18. 2.7.1 Activity - Trace a Suspicious Email

    19. 2.8 Network Footprinting

    20. 2.9 Social Network Footprinting

    21. 2.10 Footprinting and Reconnaissance Countermeasures

    22. 2.11 Footprinting and Reconnaissance Review

    1. 3.1 Scanning Concepts

    2. 3.2 Discovery Scans

    3. 3.2.1 Activity - ICMP ECHO and ARP Pings

    4. 3.2.2 Activity - Host Discovery with Angry IP Scanner

    5. 3.3 Port Scans

    6. 3.3.1 Activity - Port Scan with Angry IP Scanner

    7. 3.4 Other Scan Types

    8. 3.5 Scanning Tools

    9. 3.5.1 Activity - Hping3 Packet Crafting

    10. 3.5.2 Activity - Fingerprinting with Zenmap

    11. 3.6 NMAP

    12. 3.6.1 Activity - Nmap Basic Scans

    13. 3.6.2 Activity - Host Discovery with Nmap

    14. 3.6.3 - Activity - Nmap Version Detection

    15. 3.6.4 Activity - Nmap Idle (Zombie) Scan

    16. 3.6.5 Activity - Nmap FTP Bounce Scan

    17. 3.6.6 - Activity - NMAP Scripts

    18. 3.7 Firewall and IDS Evasion

    19. 3.7.1 Activity - Nmap Advanced Scans

    20. 3.8 Proxies

    21. 3.9 Scanning Countermeasures

    22. 3.10 Scanning Networks Review

    1. 4.1 Enumeration Overview

    2. 4.2 SMB_NetBIOS_Enumeration

    3. 4.2.1 Activity - Enumerate NetBIOS Information with Hyena

    4. 4.3 File Transfer Enumeration

    5. 4.4 WMI Enumeration

    6. 4.5 SNMP Enumeration

    7. 4.6 LDAP Enumeration

    8. 4.7 DNS Enumeration

    9. 4.8 SMTP Enumeration

    10. 4.8.1 Activity - Enumerate Email Users with SMTP

    11. 4.9 Remote Connection Enumeration

    12. 4.10 Website Enumeration

    13. 4.10.1 Activity - Enumerate a Website with DirBuster

    14. 4.11 Other Enumeration Types

    15. 4.12 Enumeration Countermeasures and Review

    1. 5.1 Vulnerability Scanning

    2. 5.1.1 Vulnerability Scanning with OpenVAS

    3. 5.2 Vulnerability Assessment

    4. 5.3 Vulnerability Analysis Review

    1. 6.1 System Hacking Concepts

    2. 6.2 Common OS Exploits

    3. 6.3 Buffer Overflows

    4. 6.4 System Hacking Tools and Frameworks

    5. 6.4.1 Activity - Hack a Linux Target from Start to Finish

    6. 6.5 Metasploit

    7. 6.5.1 Activity - Get Started with Metasploit

    8. 6.6 Meterpreter

    9. 6.7 Keylogging and Spyware

    10. 6.7.1 Activity - Keylogging with Meterpreter

    11. 6.8 Netcat

    12. 6.8.1 Activity - Using Netcat

    13. 6.9 Hacking Windows

    14. 6.10 Hacking Linux

    15. 6.11 Password Attacks

    16. 6.11.1 Activity - Pass the Hash

    17. 6.11.2 Activity - Password Spraying

    18. 6.12 Password Cracking Tools

    19. 6.13 Windows Password Cracking

    20. 6.13.1 Activity - Cracking Windows Passwords

    21. 6.13.2 Activity - Cracking Password Hashes with Hashcat

    22. 6.14 Linux Password Cracking

    23. 6.15 Other Methods for Obtaining Passwords

    24. 6.16 Network Service Attacks

    25. 6.17 Post Exploitation

    26. 6.18 Pivoting

    27. 6.18.1 Activity - Pivoting Setup

    28. 6.19 Maintaining Access

    29. 6.19.1 Activity - Persistence

    30. 6.20 Hiding Data

    31. 6.21 Covering Tracks

    32. 6.21.1 Activity - Clearing Tracks in Windows

    33. 6.21.2 Activity - View and Clear Audit Policies with Auditpol

    34. 6.22 System Hacking Countermeasures

    35. 6.23 System Hacking Review

About this course

  • £1,995.00
  • 325 lessons
  • 54.5 hours of video content

Discover your potential, starting today