HOME > IT & Software > Ethical Hacking training course Master hacking

Ethical Hacking training course Master hacking

SynopsisEthical Hacking training course – Master hacking, avail...
Ethical Hacking training course Master hacking  No.1

Ethical Hacking training course – Master hacking, available at $39.99, has an average rating of 4.75, with 112 lectures, based on 177 reviews, and has 10209 subscribers.

You will learn about Bulding ethical hacking skills for acquiring Certified Ethical Hacker certification from Ec-council This course is ideal for individuals who are Anyone – who is interested in their own security or someone elses. It is particularly useful for Anyone – who is interested in their own security or someone elses.

Enroll now: Ethical Hacking training course – Master hacking

Summary

Title: Ethical Hacking training course – Master hacking

Price: $39.99

Average Rating: 4.75

Number of Lectures: 112

Number of Published Lectures: 112

Number of Curriculum Items: 112

Number of Published Curriculum Objects: 112

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Bulding ethical hacking skills for acquiring Certified Ethical Hacker certification from Ec-council
  • Who Should Attend

  • Anyone – who is interested in their own security or someone elses.
  • Target Audiences

  • Anyone – who is interested in their own security or someone elses.
  • Security is major concern for an individuals and enterprises alike. Gaining ethical skills helps one from protecting himself and his/her organization. The CEH course by EC?council is organized structure of course contents and we have addressed almost all contents, technologies and tools. This course shall be updated with the additional course videos as and when available.

    Course Curriculum

    Chapter 1: Module 1 – Introduction to Hacking

    Lecture 1: 1.1 Introduction to Hacking

    Lecture 2: 1.2 Ethical hacker

    Lecture 3: 1.3 Information Security Laws and Standards

    Lecture 4: 1.4 Information Security

    Lecture 5: 1.5 Incident Management

    Lecture 6: 1.6 Data breaches and malware trends

    Lecture 7: 1.7 Threat modelling

    Lecture 8: 1.8 EISA, Vulnerability Assessment, VA research, info warfare

    Chapter 2: Module 2 – Footprinting (Reconnaissance)

    Lecture 1: 2.1 Footprinting (Reconnaissance) introduction

    Lecture 2: 2.2-Fp through Search engines

    Lecture 3: 2.3-Google hacking-dorking

    Lecture 4: 2.4 Web crawler / Spider

    Lecture 5: 2.5 Footprinting through Websites

    Lecture 6: 2.6 Whois lookup

    Lecture 7: 2.7 Traceroute, Looking glass server, BGP Tools

    Lecture 8: 2.8 NSLookup

    Lecture 9: 2.9 SNMP – Simple Network Management Protocol

    Lecture 10: 2.10 Maltego – Visual link analysis tool: part 1

    Lecture 11: 2.11 Recon-ng reconnaissance framework

    Lecture 12: 2.12 Footprinting through email tracking

    Chapter 3: Module 3 – Network scanning

    Lecture 1: 3.1 Introduction to Network scanning

    Lecture 2: 3.2 Network port scanning

    Lecture 3: 3.3 Network scanning tools

    Lecture 4: 3.4 Nmap – Network mapper – scanner

    Lecture 5: 3.5 Network monitoring tools – Open source

    Lecture 6: 3.6 Network monitoring tools – Commercial

    Lecture 7: 3.7 Ping – Ping sweep

    Lecture 8: 3.8a HPing and FPing demo on Kali Linux

    Lecture 9: 3.8 HPing and FPing

    Lecture 10: 3.9 Proxy Servers 1

    Lecture 11: 3.10 Proxy server tools – 2

    Lecture 12: 3.11 Tor project Tor proxy – (The Onion Routing)

    Chapter 4: Module 4 – Network Enumeration

    Lecture 1: 4.1 Network Enumeration introduction

    Lecture 2: 4.2 Network enumeration tools

    Lecture 3: 4.3 Scanning and Enumeration Countermeasures

    Chapter 5: Module 5 – System Hacking

    Lecture 1: 5.1 Hacking Methodology

    Lecture 2: 5.2 Password cracking

    Lecture 3: 5.8 Brute-force attack

    Lecture 4: 5.15 Ophcrack – Windows password cracker

    Lecture 5: 5.16 CeWL – Custom Word List generator

    Lecture 6: 5.17 Crunch wordlist generator

    Lecture 7: 5.18 John the Ripper

    Lecture 8: 5.19 Pwdump – Password Dumper and Hash Suite

    Lecture 9: 5.20 Hashcat – advanced password recovery tool

    Chapter 6: Module 6 – Malware Trojans

    Lecture 1: 6.1 Trojan horse (Trojan) introduction

    Lecture 2: 6.3 Beast trojan – Remote Administration Tool (RAT)

    Lecture 3: 6.4 Beast Trojan demo – Educational purpose ONLY

    Lecture 4: 6.5 Process explorer

    Lecture 5: 6.7 Malware countermeasures

    Chapter 7: Module 7 – Malwares – Virus and Worms

    Lecture 1: 7.1 Virus introduction

    Lecture 2: 7.2 How virus works

    Lecture 3: 7.4 Virus removal

    Lecture 4: 7.5 Stealth techniques

    Lecture 5: 7.6 Virus maker tools – bvm

    Chapter 8: Module 8 – Packet Sniffers

    Lecture 1: 8.1 – Packet Sniffers

    Lecture 2: 8.2 – Wireshark

    Lecture 3: 8.3 – Wireshark – demo

    Lecture 4: 8.4 – Countermeasures-Sniffing

    Lecture 5: 8.5 Xplico

    Chapter 9: Module 9 – Social engineering / networking

    Lecture 1: 9.1 Social engineering introduction

    Lecture 2: 9.2 Social engineering techniques

    Lecture 3: 9.3 Social engineering countermeasures

    Chapter 10: Module 10 – DoS/DDoS attacks

    Lecture 1: 10.1 DoS-DDoS attacks Introduction

    Lecture 2: 10.2 DoS-DDoS attack Types

    Lecture 3: 10.3 DoS-DDoS attack techniques and tools

    Chapter 11: Module 11 – SessionHijacking

    Lecture 1: 11.1 Session hijacking

    Lecture 2: 11.2 Cookies

    Lecture 3: 11.3 Session hijacking tools

    Lecture 4: 11.4-Burp Suite – Proxy

    Lecture 5: 11.5-Firesheep and HTTPS Anywhere

    Lecture 6: 11.6-Session hijacking – Countermeasures

    Chapter 12: Module 12 – Hacking Web Servers

    Lecture 1: 12.1 Introduction

    Lecture 2: 12.2 Attack Types

    Chapter 13: Module 13 – Hacking Web Applications

    Lecture 1: 13.1 Hacking web apps Introduction

    Lecture 2: 13.2 OWASP

    Lecture 3: 13.3 OWASP-Top 10

    Lecture 4: 13.4 Tools and countermeasures

    Lecture 5: 13.5 OWASP WebGoat

    Chapter 14: Module 14 – SQL Injection

    Lecture 1: 14.2 – SQL Injection attacks

    Lecture 2: 14.3 – SQL Injection mitigation

    Lecture 3: 14.4 – SQL Injection Tools

    Chapter 15: Module 15 – Hacking Wireless networks

    Lecture 1: 15.1 Cracking Wireless security

    Lecture 2: 15.2 Wireless hacking Tools

    Lecture 3: 15.3 Wireless hacking Countermeasures

    Lecture 4: Fern Wifi Cracker

    Instructors

  • Ethical Hacking training course Master hacking  No.2
    Kaushik Vadali
    Cloud Infra and Info Security professional at CBTU
  • Rating Distribution

  • 1 stars: 16 votes
  • 2 stars: 8 votes
  • 3 stars: 37 votes
  • 4 stars: 43 votes
  • 5 stars: 73 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!