Certified Ethical Hacker (CEH) Online Course
The Complete Ethical Hacking Course [Video]
This course is highly practical and is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system so that you can practice all the skills and techniques you learn in real-time. You'll start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test and have a safe space to practice using hacking tools and attacks. We'll experience real-time hacking examples and learn how to protect ourselves against these attacks at the same time!
In this course, you'll learn:
- How hackers launch attacks on different systems, computers, users, websites, and wireless networks
- What tools hackers use, why, and how they work
- How to protect yourself (or your clients!) against these attacks
- How to build your security and hacking tools with Python—from scratch and with no programming experience necessary!
- How to create your own ethical hacking tool portfolio.
Course Table of Content
- Introduction
- Hacking Lab Setup
- Kali Linux 101
- Anonymity Online
- Dark Web
- Network Pentesting
- Gathering Information From Networks
- Wireless Attacks
- Post Connection Attacks
- System Pentesting
- Attacks On Users
- Social Engineering
- Social Media Security
- Beef
- External Network Attacks
- Fake Game Website Attacks Introduction
- Post Hacking Sessions
- Hacker Methodology
- Website Reconnaissance
- Website Pentesting
- Cross Site Scripting
- SQL 101
- SQL Injection
- Website Pentesting Tools
- Ethical Hacking Certifications
- Python For Ethical Hacking Setup
- Python Data Types & Structures Introduction
- Control Statements & Loops
- Essentials
- Functions
- Object Oriented Programming
- Modules
- MAC Changer
- Network Scanner
- Man In The Middle
- Packet Listener
- Keylogger
- Backdoor
- Packaging & Malicious Files
Medium: Self-paced
Content Type: Videos
Delivery: Online
Access Duration: Life Long Access