BENEFITS
Expert-Led Courses
Self-Paced Learning
Best
Seller
Completion Certificate
Lifetime Access
Certified Ethical Hacker (CEH) v12 Course Overview
The Certified Ethical Hacker (CEH) v12 course is a comprehensive program designed for aspiring ethical hackers and cybersecurity professionals to master the techniques, tools, and methodologies used in real-world penetration testing and cybersecurity assessments. This course aligns with the latest trends in cybersecurity, equipping participants with the skills needed to identify vulnerabilities, analyze risks, and defend against advanced cyber threats.
Through 20 meticulously structured modules, the course provides hands-on activities, case studies, and interactive labs to build a strong foundation in ethical hacking concepts and practical applications.
Course Highlights
- Introduction to Ethical Hacking: Learn the core principles of ethical hacking, cybersecurity frameworks, and laws.
- Footprinting and Reconnaissance: Understand OSINT, advanced Google hacking, and DNS footprinting techniques.
- Scanning Networks: Master the use of tools like Nmap, Angry IP Scanner, and Hping3 for network discovery and vulnerability scanning.
- System Hacking: Explore tools like Metasploit and techniques such as password cracking, privilege escalation, and post-exploitation.
- Malware Threats: Analyze malware behavior, create malware droppers, and explore advanced persistent threats.
- Web and Mobile Hacking: Dive into web server vulnerabilities, OWASP top 10 attacks, mobile platform exploitation, and countermeasures.
- IoT and Cloud Hacking: Uncover the intricacies of IoT/OT vulnerabilities, cloud risks, and secure best practices.
- Cryptography: Develop proficiency in encryption techniques, hashing, PKI, and cryptographic tools.
Key Features
- Hands-On Learning: 150+ interactive labs and activities, including Google hacking, Nmap scans, password cracking, and SQL injection.
- Real-World Tools: Practical exposure to industry-standard tools like Metasploit, Wireshark, Burp Suite, and SQLmap.
- Comprehensive Coverage: Modules span across network security, system vulnerabilities, malware threats, web and wireless attacks, and cloud security.
- Countermeasure Strategies: Learn defense techniques to secure systems and networks against cyberattacks.
Who Should Take This Course?
This course is ideal for:
- IT professionals, network administrators, and cybersecurity enthusiasts
- Ethical hackers and penetration testers
- Security analysts and consultants
- Anyone aiming for a CEH certification or a career in cybersecurity
Certification Preparation
The CEH v12 course prepares you for the EC-Council Certified Ethical Hacker (CEH) certification exam, a globally recognized credential validating your expertise in ethical hacking and cybersecurity defense.
Prerequisites
A basic understanding of IT, networking, and operating systems is recommended. Prior experience in cybersecurity is beneficial but not mandatory.
Course Outcome
By the end of the course, participants will be proficient in ethical hacking methodologies, equipped to conduct penetration tests, identify vulnerabilities, and implement robust security measures to protect critical systems and data.
Embark on your journey to becoming a Certified Ethical Hacker today!
Offer Curriculum
- 1.0 Introduction (1:29)
- 1.1 Elements of Security (29:40)
- 1.2 Cyber Kill Chain (7:19)
- 1.3 MITRE ATT&CK Framework (3:51)
- 1.3.1 Activity - Researching the MITRE ATTACK Framework (6:55)
- 1.4 Hacking (9:28)
- 1.5 Ethical Hacking (17:26)
- 1.6 Information Assurance (18:10)
- 1.7 Risk Management (24:44)
- 1.8 Incident Management (9:52)
- 1.9 Information Security Laws and Standards (12:13)
- 1.10 Introduction to Ethical Hacking Review (4:44)
- 2.1 Footprinting Concepts (7:41)
- 2.10 Footprinting and Reconnaissance Countermeasures (1:47)
- 2.11 Footprinting and Reconnaissance Review (3:15)
- 2.2 OSINT Tools (13:14)
- 2.2.1 Activity - Conduct OSINT with OSR Framework (7:26)
- 2.2.2 Activity - OSINT with theHarvester (8:49)
- 2.2.3 Activity - Add API Keys to theHarvester (8:16)
- 2.2.4 Activity - Extract Document Metadata with FOCA (6:34)
- 2.2.5 Activity - Extract Document Metadata with FOCA (6:34)
- 2.3 Advanced Google Search (8:10)
- 2.3.1 Activity - Google Hacking (6:13)
- 2.4 Whois Footprinting (7:08)
- 2.4.1 Activity - Conducting Whois Research (12:21)
- 2.5 DNS Footprinting (7:51)
- 2.5.1 Activity - Query DNS with NSLOOKUP (5:35)
- 2.6 Website Footprinting (7:02)
- 2.6.1 Activity - Fingerprint a Webserver with ID Serve (5:07)
- 2.6.2 Activity - Extract Data from Websites (3:00)
- 2.6.3 Activity - Mirror a Website with HTTrack (5:31)
- 2.7 Email Footprinting (3:18)
- 2.7.1 Activity - Trace a Suspicious Email (9:33)
- 2.8 Network Footprinting (7:40)
- 2.9 Social Network Footprinting (4:45)
- 3.1 Scanning Concepts (7:28)
- 3.2 Discovery Scans (11:01)
- 3.2.1 Activity - ICMP ECHO and ARP Pings (20:32)
- 3.2.2 Activity - Host Discovery with Angry IP Scanner (10:52)
- 3.3 Port Scans (29:53)
- 3.3.1 Activity - Port Scan with Angry IP Scanner (8:37)
- 3.4 Other Scan Types (18:19)
- 3.5 Scanning Tools (3:18)
- 3.5.1 Activity - Hping3 Packet Crafting (18:18)
- 3.5.2 Activity - Fingerprinting with Zenmap (8:47)
- 3.6 NMAP (28:44)
- 3.6.1 Activity - Nmap Basic Scans (10:53)
- 3.6.2 Activity - Host Discovery with Nmap (14:25)
- 3.6.3 - Activity - Nmap Version Detection (7:09)
- 3.6.4 Activity - Nmap Idle (Zombie) Scan (15:04)
- 3.6.5 Activity - Nmap FTP Bounce Scan (8:18)
- 3.6.6 - Activity - NMAP Scripts (12:57)
- 3.7 Firewall and IDS Evasion (30:35)
- 3.7.1 Activity - Nmap Advanced Scans (17:41)
- 3.8 Proxies (16:29)
- 3.9 Scanning Countermeasures (5:46)
- 3.10 Scanning Networks Review (7:05)
- 4.1 Enumeration Overview (8:46)
- 4.2 SMB_NetBIOS_Enumeration (14:49)
- 4.2.1 Activity - Enumerate NetBIOS Information with Hyena (2:20)
- 4.3 File Transfer Enumeration (14:26)
- 4.4 WMI Enumeration (8:11)
- 4.4.1 - Activity - Enumerating WMI with Hyena (10:54)
- 4.5 SNMP Enumeration (13:52)
- 4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect (9:53)
- 4.6 LDAP Enumeration (5:17)
- 4.7 DNS Enumeration (10:23)
- 4.8 SMTP Enumeration (12:06)
- 4.8.1 Activity - Enumerate Email Users with SMTP (14:15)
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration (2:47)
- 4.10.1 Activity - Enumerate a Website with DirBuster (7:22)
- 4.11 Other Enumeration Types (17:45)
- 4.12 Enumeration Countermeasures and Review (2:46)
- 6.1 System Hacking Concepts (19:06)
- 6.2 Common OS Exploits (11:31)
- 6.3 Buffer Overflows (12:26)
- 6.3.1 Activity - Performing a Buffer Overflow (12:00)
- 6.4 System Hacking Tools and Frameworks (15:16)
- 6.4.1 Activity - Hack a Linux Target from Start to Finish (12:03)
- 6.5 Metasploit (30:53)
- 6.5.1 Activity - Get Started with Metasploit (22:37)
- 6.6 Meterpreter (24:18)
- 6.7 Keylogging and Spyware (7:41)
- 6.7.1 Activity - Keylogging with Meterpreter (9:10)
- 6.8 Netcat (10:39)
- 6.8.1 Activity - Using Netcat (19:59)
- 6.9 Hacking Windows (19:20)
- 6.9.1 Activity - Hacking Windows with Eternal Blue (9:35)
- 6.10 Hacking Linux (13:50)
- 6.11 Password Attacks (26:35)
- 6.11.1 Activity - Pass the Hash (13:47)
- 6.11.2 Activity - Password Spraying (8:37)
- 6.12 Password Cracking Tools (9:11)
- 6.13 Windows Password Cracking (36:18)
- 6.13.1 Activity - Cracking Windows Passwords (5:52)
- 6.13.2 Activity - Cracking Password Hashes with Hashcat (6:47)
- 6.14 Linux Password Cracking (3:17)
- 6.15 Other Methods for Obtaining Passwords (12:57)
- 6.16 Network Service Attacks (8:10)
- 6.16.1 Activity - Brute Forcing a Network Service with Medusa
- 6.17 Post Exploitation (17:03)
- 6.18 Pivoting (14:07)
- 6.18.1 Activity - Pivoting Setup (8:00)
- 6.19 Maintaining Access (11:15)
- 6.19.1 Activity - Persistence (12:58)
- 6.20 Hiding Data (18:12)
- 6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography (6:34)
- 6.21 Covering Tracks (13:44)
- 6.21.1 Activity - Clearing Tracks in Windows (7:58)
- 6.21.2 Activity - View and Clear Audit Policies with Auditpol (8:28)
- 6.22 System Hacking Countermeasures (10:18)
- 6.23 System Hacking Review (2:14)
- 7.1 Malware Overview (16:01)
- 7.2 Viruses (17:04)
- 7.3 Trojans (21:52)
- 7.3.1 Activity - Deploying a RAT (11:16)
- 7.4 Rootkits (8:25)
- 7.5 Other Malware (5:25)
- 7.6 Advanced Persistent Threat (16:06)
- 7.7 Malware Makers (11:05)
- 7.7.1 Activity - Creating a Malware Dropper and Handler (10:04)
- 7.8 Malware Detection (7:19)
- 7.9 Malware Analysis (8:28)
- 7.9.1 Activity - Performing a Static Code Review (3:59)
- 7.9.2 Activity - Analyzing the SolarWinds Orion Hack (24:57)
- 7.10 Malware Countermeasures (6:49)
- 7.11 Malware Threats Review (2:39)
- 8.1 Network Sniffing (16:39)
- 8.2 Sniffing Tools (11:29)
- 8.2.1 Activity- Sniffing HTTP with Wireshark (6:47)
- 8.2.2 Activity - Capturing Files from SMB (6:07)
- 8.3 ARP and MAC Attacks (16:24)
- 8.3.1 Activity - Performing an MITM Attack with Ettercap (9:35)
- 8.4 Name Resolution Attacks (16:21)
- 8.4.1 Activity - Spoofing Responses with Responder (7:55)
- 8.5 Other Layer 2 Attacks (23:59)
- 8.6 Sniffing Countermeasures (6:04)
- 8.7 Sniffing Review (1:41)
- 9.1 Social Engineering Concepts (7:01)
- 9.2 Social Engineering Techniques (21:23)
- 9.2.1 Activity - Deploying a Baited USB Stick (9:04)
- 9.2.2 Activity - Using an O.MG Lightning Cable (14:53)
- 9.3 Social Engineering Tools (6:26)
- 9.3.1 Activity - Phishing for Credentials (10:49)
- 9.4 Social Media, Identity Theft, Insider Threats (8:40)
- 9.5 Social Engineering Countermeasures (8:13)
- 9.6 Social Engineering Review (5:28)
- 10.1 DoS-DDoS Concepts (3:46)
- 10.2 Volumetric Attacks (2:01)
- 10.3 Fragmentation Attacks (4:31)
- 10.4 State Exhaustion Attacks (4:08)
- 10.5 Application Layer Attacks (3:54)
- 10.5.1 Activity - Performing a LOIC Attack (7:08)
- 10.5.2 Activity - Performing a HOIC Attack (3:16)
- 10.5.3 Activity - Conducting a Slowloris Attack (5:46)
- 10.6 Other Attacks (8:01)
- 10.7 DoS Tools (3:01)
- 10.8 DoS Countermeasures (6:43)
- 10.9 DoS Review (1:20)
- 11.2 Compromising a Session Token (11:01)
- 11.1 Session Hijacking (9:35)
- 11.3 XSS (16:11)
- 11.4 CSRF (8:52)
- 11.5 Other Web Hijacking Attacks (8:22)
- 11.6 Network-Level Session Hijacking (9:23)
- 11.6.1 Activity - Hijack a Telnet Session (10:26)
- 11.7 Session Hijacking Tools (2:38)
- 11.8 Session Hijacking Countermeasures (1:31)
- 11.9 Session Hijacking Review (4:04)
- 12.1 Types of IDS (17:14)
- 12.2 Snort (16:07)
- 12.3 System Logs (8:16)
- 12.4 IDS Considerations (5:07)
- 12.5 IDS Evasion (13:51)
- 12.5.1 Activity - Fly Below IDS Radar (20:31)
- 12.6 Firewalls (9:45)
- 12.7 Packet Filtering Rules (14:41)
- 12.8 Firewall Deployments (13:22)
- 12.9 Split DNS (7:03)
- 12.10 Firewall Product Types (3:06)
- 12.11 Firewall Evasion (42:38)
- 12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall (19:54)
- 12.11.2 Activity - Busting the DOM for WAF Evasion (23:26)
- 12.12 Honeypots (6:22)
- 12.13 Honeypot Detection and Evasion (6:00)
- 12.13.1 Activity - Test and Analyze a Honey Pot (9:07)
- 12.14 Evading IDS, Firewalls, and Honeypots Review (12:00)
- 14.1 Web Application Concepts (5:26)
- 14.2 Attacking Web Apps (8:04)
- 14.3 A01 Broken Access Control (12:48)
- 14.4 A02 Cryptographic Failures (8:38)
- 14.5 A03 Injection (22:58)
- 14.5.1 Activity - Command Injection (19:45)
- 14.6 A04 Insecure Design (5:31)
- 14.7 A05 Security Misconfiguration (5:19)
- 14.8 A06 Vulnerable and Outdated Components (5:32)
- 14.9 A07 Identification and Authentication Failures (15:31)
- 14.10 A08 Software and Data integrity Failures (7:21)
- 14.11 A09 Security Logging and Monitoring Failures (10:17)
- 14.12 A10 Server-Side Request Forgery (8:27)
- 14.13 XSS Attacks (16:06)
- 14.13.1 Activity - XSS Walkthrough (19:36)
- 14.13.2 Activity - Inject a Malicious iFrame with XXS (5:57)
- 14.14 CSRF (10:18)
- 14.15 Parameter Tampering (4:03)
- 14.15.1 Activity - Parameter Tampering with Burp (9:13)
- 14.16 Clickjacking (3:48)
- 14.17 SQL Injection (13:17)
- 14.18 Insecure Deserialization Attacks (5:02)
- 14.19 IDOR (5:32)
- 14.19.1 Activity - Hacking with IDOR (8:57)
- 14.20 Directory Traversal (5:02)
- 14.21 Session Management Attacks (9:20)
- 14.22 Response Splitting (3:30)
- 14.23 Overflow Attacks (12:54)
- 14.24 XXE Attacks (4:20)
- 14.25 Web App DoS (6:18)
- 14.26 Soap Attacks (3:17)
- 14.27 AJAX Attacks (3:32)
- 14.28 Web API Hacking (16:48)
- 14.29 Webhooks and Web Shells (9:28)
- 14.30 Web App Hacking Tools (4:00)
- 14.31 Hacking Web Applications Countermeasures (11:43)
- 14.32 Hacking Web Applications Review (10:10)
- 15.1 SQL Injection Overview (5:26)
- 15.2 Basic SQL Injection (14:05)
- 15.3 Finding Vulnerable Websites (2:47)
- 15.4 Error-based SQL Injection (1:47)
- 15.5 Union SQL Injection (4:24)
- 15.5.1 Activity - Testing SQLi on a Live Website - Part 1 (24:12)
- 15.5.2 Activity - Testing SQLi on a Live Website - Part 2 (22:24)
- 15.6 Blind SQL Injection (9:02)
- 15.7 SQL Injection Tools (1:57)
- 15.7.1 Activity - SQL Injection Using SQLmap (21:42)
- 15.8 Evading Detection (3:54)
- 15.9 Analyzing SQL Injection (6:40)
- 15.10 SQL Injection Countermeasures (16:31)
- 15.11 SQL Injection Review (1:22)
- 16.1 Wireless Concepts (15:18)
- 16.2 Wireless Security Standards (5:43)
- 16.3 WI-FI Discovery Tools (5:16)
- 16.4 Common Wi-Fi Attacks (16:08)
- 16.5 Wi-Fi Password Cracking (4:28)
- 16.6 WEP Cracking (10:20)
- 16.6.1 Activity - Cracking WEP (5:17)
- 16.7 WPA,WPA2,WPA3 Cracking (17:45)
- 16.7.1 Activity - WPA KRACK Attack (4:59)
- 16.8 WPS Cracking (3:42)
- 16.9 Bluetooth Hacking (7:49)
- 16.10 Other Wireless Hacking (8:12)
- 16.10.1 Activity - Cloning an RFID badge (8:16)
- 16.10.2 Activity - Hacking with a Flipper Zero (1:58)
- 16.11 Wireless Security Tools (3:50)
- 16.12 Wireless Hacking Countermeasures (6:59)
- 16.13 Hacking Wireless Networks Review (13:03)
- 17.1 Mobile Device Overview (7:30)
- 17.2 Mobile Device Attacks (16:45)
- 17.3 Android Vulnerabilities (8:31)
- 17.4 Rooting Android (4:28)
- 17.5 Android Exploits (6:38)
- 17.5.1 Activity - Hacking Android (22:34)
- 17.5.2 Activity - Using a Mobile Device in a DDoS Campaign (5:09)
- 17.6 Android-based Hacking Tools (4:39)
- 17.7 Reverse Engineering an Android App (5:36)
- 17.8 Securing Android (3:17)
- 17.9 iOS Overview (11:03)
- 17.10 Jailbreaking iOS (3:59)
- 17.11 iOS Exploits (8:47)
- 17.12 iOS-based Hacking Tools (2:53)
- 17.13 Reverse Engineering an iOS App (4:39)
- 17.14 Securing iOS (1:56)
- 17.15 Mobile Device Management (11:07)
- 17.16 Hacking Mobile Platforms Countermeasures (2:26)
- 17.17 Hacking Mobile Platforms Review (2:33)
- 18.1 IoT Overview (13:09)
- 18.2 IoT Infrastructure (10:18)
- 18.3 IoT Vulnerabilities and Threats (18:25)
- 18.3.1 Activity - Searching for Vulnerable IoT Devices (5:09)
- 18.4 IoT Hacking Methodology and Tools (30:42)
- 18.5 IoT Hacking Countermeasures (8:00)
- 18.6 OT Concepts (13:21)
- 18.7 IT-OT Convergence (7:09)
- 18.8 OT Components (24:20)
- 18.9 OT Vulnerabilities (17:06)
- 18.10 OT Attack Methodology and Tools (21:08)
- 18.11 OT Hacking Countermeasures (8:02)
- 18.12 IoT and OT Hacking Review (3:19)
- 19.2 Cloud Types (16:22)
- 19.1 Cloud Computing Concepts (22:08)
- 19.3 Cloud Benefits and Considerations (11:30)
- 19.4 Cloud Risks and Vulnerabilities (9:56)
- 19.5 Cloud Threats and Countermeasures (14:27)
- 19.5.1 Activity - Hacking S3 Buckets (7:17)
- 19.6 Cloud Security Tools And Best Practices (9:08)
- 19.7 Cloud Computing Review (4:09)
- 20.1 Cryptography Concepts (13:24)
- 20.2 Symmetric Encryption (10:01)
- 20.2.1 Activity - Symmetric Encryption (3:41)
- 20.3 Asymmetric Encryption (11:07)
- 20.3.1 Activity - Asymmetric Encryption (4:55)
- 20.4 Public Key Exchange (7:40)
- 20.5 PKI (15:26)
- 20.5.1 Activity - Generating and Using an Asymmetric Key Pair (8:07)
- 20.6 Digital Signatures (7:42)
- 20.7 Hashing (13:52)
- 20.7.1 Activity - Calculating Hashes (10:39)
- 20.8 Common Cryptography Use Cases (25:07)
- 20.9 Cryptography Tools (5:31)
- 20.10 Cryptography Attacks (16:54)
- 20.11 Cryptography Review (11:59)
- 20.12 Course Conclusion (0:28)
Offer Ending Soon