Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course

Description

Welcome to the Certified Ethical Hacker Course! (v10).Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then the CEH certificate will be of great benefit to you and your organization.This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.

Syllabus

Syllabus Getting Started Overview of Information Security Overview of Information Security Threats and Attacks History of Hacking Protecting Information Penetration Testing Footprinting Process Reports and Countermeasures Network Scanning Techniques Password Cracking Techniques Techniques for Creating and Maintaining Access to the Remote System Hiding Malicious Programs Covering Tracks and Destroying Evidence Spoofing Techniques Attacking and Exploiting Wireless Networks Tip, Tricks and Real Life Scenarios Firewalls Honeypots Let's Attack Web Servers and Web Applications! About Cryptography Encryption, Decryption, Cryptanalysis and Attack Vectors Final Final SOLUTIONS


Certified Ethical Hacker (CEH) - Linux Academy's Prep Course

Affiliate notice

Welcome to the Certified Ethical Hacker Course! (v10).Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then the CEH certificate will be of great benefit to you and your organization.This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.

Syllabus Getting Started Overview of Information Security Overview of Information Security Threats and Attacks History of Hacking Protecting Information Penetration Testing Footprinting Process Reports and Countermeasures Network Scanning Techniques Password Cracking Techniques Techniques for Creating and Maintaining Access to the Remote System Hiding Malicious Programs Covering Tracks and Destroying Evidence Spoofing Techniques Attacking and Exploiting Wireless Networks Tip, Tricks and Real Life Scenarios Firewalls Honeypots Let's Attack Web Servers and Web Applications! About Cryptography Encryption, Decryption, Cryptanalysis and Attack Vectors Final Final SOLUTIONS