Course Information
Course Overview
Exam Prep Course
The Complete Guide to Ethical Hacking is a comprehensive course that provides in-depth knowledge and practical skills in ethical hacking and network security. The course is designed to help learners understand the latest tools and techniques used by ethical hackers to test and secure network systems.
The Complete Guide to Ethical Hacking course is an excellent program for individuals looking to enhance their skills and knowledge in ethical hacking and network security. Upon completion of the course, learners can take the certification exam to become a Certified Ethical Hacker, which can open up various career opportunities in the field.
Understand the Principles of Ethical Hacking
Identify Vulnerabilities in Network Systems
Exploit Vulnerabilities in Network Systems
Understand Malware Threats
Analyze Network Traffic
Understand Social Engineering Techniques
Exploit Web Application Vulnerabilities
Hack Wireless Networks
Understand Cryptography Principles
Address Cloud Security Risks
It is recommended that learners complete relevant foundational courses or certifications before enrolling in this course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.
The course is suitable for Cybersecurity Professionals, IT Managers, Network Administrators ,Penetration Testers, Security Officers, Law Enforcement Personnel.
Stone River eLearning is not affiliated with EC-Council, and this course is not a certified EC-Council Certified Ethical Hacker CEH v. 11 course.
Course Content
- 10 section(s)
- 147 lecture(s)
- Section 1 Intro to Ethical Hacking
- Section 2 Recon Techniques - Footprinting and Recon
- Section 3 Recon Techniques - Scanning
- Section 4 Recon Techniques - Enumeration
- Section 5 System Hacking Phases and Attack Techniques - Vulnerability Analysis
- Section 6 System Hacking Phases and Attack Techniques - System Hacking
- Section 7 System Hacking Phases and Attack Techniques - Malware Threats
- Section 8 Network and Perimeter Hacking - Sniffing
- Section 9 Network and Perimeter Hacking - Social Engineering
- Section 10 Network and Perimeter Hacking - Denial of Service
What You’ll Learn
- Understand the Principles of Ethical Hacking
- Identify Vulnerabilities in Network Systems
- Exploit Vulnerabilities in Network Systems
- Understand Malware Threats
- Analyze Network Traffic
- Understand Social Engineering Techniques
- Exploit Web Application Vulnerabilities
- Hack Wireless Networks
- Understand Cryptography Principles
- Address Cloud Security Risks
Skills covered in this course
Reviews
-
MMichael Lynch
Decent refresher...appreciated the presentation compared to the normal here on Udemy.
-
KKyaw Naing Oo
good
-
PPawan Rai
just theory start to end just waisted of time
-
MMohit Choudhary
Good, what I expected