Udemy

Ethical Hacker Training for the v13 Exam

立即報名
  • 4,099 名學生
  • 更新於 3/2026
4.6
(575 個評分)
CTgoodjobs 嚴選優質課程,為職場人士提升競爭力。透過本站連結購買Udemy課程,本站將獲得推廣佣金,有助未來提供更多實用進修課程資訊給讀者。

課程資料

報名日期
全年招生
課程級別
學習模式
修業期
21 小時 43 分鐘
教學語言
英語
授課導師
Vision Training Systems : IT Training
評分
4.6
(575 個評分)
3次瀏覽

課程簡介

Ethical Hacker Training for the v13 Exam

Learn how to become an Ethical Hacker with Tools and Techniques of Modern Ethical Hacking and Cybersecurity Defense

Course overview

This course is an independent training resource to help students prepare for the CEH® v13 exam. We are not affiliated with EC-Council, and this course is not an official EC-Council training program. CEH® and Certified Ethical Hacker® are registered trademarks of EC-Council.

Embark on a transformative journey with our ethical hacking course, purpose-built to prepare you for EC-council v13 exam. You’ll explore the principles of ethical hacking and learn to think like an ethical hacker, mastering techniques for identifying and exploiting vulnerabilities before malicious actors can.

What you’ll learn

  • How to apply ethical hacking methodologies to assess system security

  • Tools and tactics used by an ethical hacker for reconnaissance, footprinting, and scanning

  • Techniques for system hacking, privilege escalation, and post-exploitation

  • Strategies to analyze malware threats and implement effective countermeasures

  • Best practices for reporting findings and remediating vulnerabilities

Key topics covered

  • Information security fundamentals and the mindset of an ethical hacker

  • Footprinting, reconnaissance, and ethical hacking reconnaissance tools

  • Network scanning, enumeration, and vulnerability analysis

  • System hacking, malware threats, and web application attacks

  • Wireless network hacking, cryptography, and evasion techniques

  • Challenge labs aligned to v13 objectives, reinforcing your ethical hacking certification readiness

Explore and work with common hacking tools when performing activities throughout the course using both Kali Linux and Windows Server. Some include:

Reconnaissance / OSINT

  • Maltego — visual link-analysis and relationship mapping for people, domains, and infrastructure.

  • theHarvester — gather e-mail addresses, subdomains and hostnames from public sources.

  • Shodan — search engine for internet-connected devices and services.

  • Recon-ng — modular framework for automated web reconnaissance.

Scanning / Enumeration

  • Nmap — host discovery, port scanning and service fingerprinting.

  • Netcat — lightweight network read/write utility often used for banner grabbing and simple connections.

  • Masscan — very fast internet-scale port scanner.

Vulnerability assessment

  • Nessus — commercial vulnerability scanner (widely used in CEH labs).

  • OpenVAS / Greenbone — open-source vulnerability scanning.

  • Nikto — web server vulnerability scanner.

Web application testing

  • Burp Suite (Community/Professional) — web proxy, request/response inspection, scanner and many web testing utilities.

  • OWASP ZAP — open-source web application security scanner and proxy.

  • sqlmap — automated SQL injection discovery and exploitation tool (discussed from a testing/defensive perspective).

Exploitation frameworks

  • Metasploit Framework — widely used for exploit development, payloads and post-exploitation demos (taught ethically).

  • Empire / PowerShell frameworks — post-exploitation and lateral-movement demos (usually in controlled lab contexts).

Password attacks / credential tools

  • John the Ripper — password cracking utility for hashes.

  • Hashcat — GPU-accelerated password cracking.

  • Hydra / Medusa — online password brute-force tools for many protocols.

Network sniffing / traffic analysis

  • Wireshark — packet capture and deep protocol analysis.

  • tcpdump — command-line packet capture and filtering.

Wireless testing

  • Aircrack-ng suite — capture and analyze wireless traffic, recover weak WEP/WPA-PSK keys (for lab learning).

  • Kismet — wireless network detector, sniffer and IDS.

Reverse engineering & malware analysis (introductory)

  • Ghidra — open-source reverse engineering tool (disassembler/Decompiler).

  • Radare2 — reverse engineering framework.

  • IDA Pro — commercial disassembler (often referenced).

Digital forensics

  • Autopsy / Sleuth Kit — disk and file system forensics analysis tools.

  • Volatility — memory forensics framework.

Social engineering / phishing

  • Social-Engineer Toolkit (SET) — framework for social-engineering simulations (used in training and awareness exercises).

  • King Phisher — phishing campaign simulation tool (used in authorised assessments).

OSINT & mapping misc

  • Google Dorks — advanced search queries methodology (covered conceptually).

  • SpiderFoot — automated OSINT reconnaissance.

This ethical hacking course is ideal for:

  • IT professionals aiming to become a certified in ethical hacking

  • Security analysts and network administrators seeking ethical hacking certification

  • Aspiring ethical hackers preparing for the newest version exam

  • Anyone interested in a comprehensive ethical hacking training path

Why choose this course

• Over 68 hours of in-depth video lectures and interactive labs
• Real-world scenarios that mirror actual hacking challenges
• Downloadable resources and toolkits to support continual practice

Exam preparation and career outcomes

Aligned directly with the EC-council v13 exam blueprint, this course equips you for the official V13 exam. On completion, you’ll hold the knowledge and practical experience to pursue roles such as ethical hacker, Penetration Tester, or Security Analyst—and achieve recognized ethical hacking certification.


課程章節

  • 22 個章節
  • 318 堂課
  • 第 1 章 Module 1: Information Security and Ethical Hacking Overview
  • 第 2 章 Module 2: Footprinting and Reconnaissance
  • 第 3 章 Module 3: Scanning Networks
  • 第 4 章 Module 4: Enumeration
  • 第 5 章 Module 5: Vulnerability Analysis
  • 第 6 章 Module 6: System Hacking
  • 第 7 章 Module 7: Malware Threats
  • 第 8 章 Module 8: Sniffing and Spoofing
  • 第 9 章 Module 9: Social Engineering
  • 第 10 章 Module 10: Denial-of-Service
  • 第 11 章 Module 11: Session Hijacking
  • 第 12 章 Module12: Attack Detection and Prevention
  • 第 13 章 Module 13: Hacking Web Servers
  • 第 14 章 Module 14: Hacking Web Applications
  • 第 15 章 Module 15: SQL Injection
  • 第 16 章 Module 16: Hacking Wireless Networks
  • 第 17 章 Module 17: Hacking Mobile Platforms
  • 第 18 章 Module 18: IoT Hacking & OT Hacking
  • 第 19 章 Module 19: Cloud Computing
  • 第 20 章 Module 20: Cryptography
  • 第 21 章 Module 21: Challenge Lab
  • 第 22 章 Final Test

課程內容

  • Students will gain an understanding of the fundamentals of information security, ethical hacking, and risk management., Students will learn how to use open-source intelligence (OSINT) tools and techniques for footprinting and reconnaissance., Students will acquire the skills to conduct network scanning and enumeration for potential vulnerabilities., Students will gain an understanding of the process of vulnerability analysis and how to exploit system vulnerabilities., Students will learn to identify, analyze, and mitigate malware threats and denial-of-service attacks., Students will gain knowledge of various hacking methods for web servers, web applications, and mobile platforms., Students will understand the risks and vulnerabilities associated with cloud computing and IoT devices., Students willl learn the principles of cryptography and how to use cryptographic tools and techniques for data protection.


評價

  • A
    Angelo Leone
    1.0

    This course does not worth the money, there is no practical exersices, only boring talking, the instructor could be very good at her job but she does not know or do not want to really teach anything. For this boring theory I can watch Youtube videos with better and useful content for free. This is a Fraud.

  • M
    Malik Usama
    1.5

    Only they tell the theory. cannot do any practical in that course. If you need only theory, then this will be fine.

  • D
    Dev Kumar Sen
    3.5

    too much theory, doesn't matter how much instructor qualified. concept can be taught through practical , i'll highly recommend to not purchase this course.

  • A
    Albert Blaga
    5.0

    Muy bien explicado!

立即關注瀏覽更多

本網站使用Cookies來改善您的瀏覽體驗,請確定您同意及接受我們的私隱政策使用條款才繼續瀏覽。

我已閱讀及同意