Udemy

Complete Guide to Ethical Hacking

Enroll Now
  • 741 Students
  • Updated 7/2023
4.4
(94 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Language
English
Taught by
Stone River eLearning
Rating
4.4
(94 Ratings)

Course Overview

Complete Guide to Ethical Hacking

Exam Prep Course

The Complete Guide to Ethical Hacking  is a comprehensive course that provides in-depth knowledge and practical skills in ethical hacking and network security. The course is designed to help learners understand the latest tools and techniques used by ethical hackers to test and secure network systems.

The Complete Guide to Ethical Hacking course is an excellent program for individuals looking to enhance their skills and knowledge in ethical hacking and network security. Upon completion of the course, learners can take the certification exam to become a Certified Ethical Hacker, which can open up various career opportunities in the field.

  1. Understand the Principles of Ethical Hacking

  2. Identify Vulnerabilities in Network Systems

  3. Exploit Vulnerabilities in Network Systems

  4. Understand Malware Threats

  5. Analyze Network Traffic

  6. Understand Social Engineering Techniques

  7. Exploit Web Application Vulnerabilities

  8. Hack Wireless Networks

  9. Understand Cryptography Principles

  10. Address Cloud Security Risks

It is recommended that learners complete relevant foundational courses or certifications before enrolling in this course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.

The course is suitable for Cybersecurity Professionals, IT Managers, Network Administrators ,Penetration Testers, Security Officers, Law Enforcement Personnel.


Stone River eLearning is not affiliated with EC-Council, and this course is not a certified EC-Council Certified Ethical Hacker CEH v. 11 course.

Course Content

  • 10 section(s)
  • 147 lecture(s)
  • Section 1 Intro to Ethical Hacking
  • Section 2 Recon Techniques - Footprinting and Recon
  • Section 3 Recon Techniques - Scanning
  • Section 4 Recon Techniques - Enumeration
  • Section 5 System Hacking Phases and Attack Techniques - Vulnerability Analysis
  • Section 6 System Hacking Phases and Attack Techniques - System Hacking
  • Section 7 System Hacking Phases and Attack Techniques - Malware Threats
  • Section 8 Network and Perimeter Hacking - Sniffing
  • Section 9 Network and Perimeter Hacking - Social Engineering
  • Section 10 Network and Perimeter Hacking - Denial of Service

What You’ll Learn

  • Understand the Principles of Ethical Hacking
  • Identify Vulnerabilities in Network Systems
  • Exploit Vulnerabilities in Network Systems
  • Understand Malware Threats
  • Analyze Network Traffic
  • Understand Social Engineering Techniques
  • Exploit Web Application Vulnerabilities
  • Hack Wireless Networks
  • Understand Cryptography Principles
  • Address Cloud Security Risks


Reviews

  • M
    Michael Lynch
    4.0

    Decent refresher...appreciated the presentation compared to the normal here on Udemy.

  • K
    Kyaw Naing Oo
    5.0

    good

  • P
    Pawan Rai
    1.0

    just theory start to end just waisted of time

  • M
    Mohit Choudhary
    5.0

    Good, what I expected

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed