Certified Ethical Hacker Boot Camp
Gain the knowledge required to pass the CEH exam and move on to a career as a professional pentester!
Watch Promo
Welcome to the Certified Ethical Hacker Boot Camp for 2018! This course was designed for information security professionals who wish to take the CEH exam and move on to a career as a professional pentester. It is our goal with this course to give you the knowledge to not only pass the CEH exam, but also give you insight into the day to day workflow of a certified ethical hacker.
Here is what you will receive upon enrolling in this course:
- 19+ Hours of HD Video
- Lessons on how to think like a hacker
- Live hacking demonstrations
- A blueprint for conducting your own penetration test
- Links to additional resources to continue your education
- 1 on 1 assistance from a certified ethical hacker
What topics will this course cover?
- Hacking terminology
- Passive & active reconnaissance
- Scanning & enumeration
- Network mapping
- Sniffing and spoofing
- Windows and Linux hacking
- Social engineering basics
- Credential harvesting
- Website cloning
- Anti-virus evasion
- Hacking demonstrations with tools such as Maltego, FOCA, Harvester, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, and much more!
Thank you for taking the time to read this, and we hope to see you in the course!
Your Instructor
The digital age is upon us. Would you like to build/protect the systems that shape our future?
I am here on Teachable to produce valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages and much more. Enroll in one of my courses for a practical, down to earth approach to learning.
Course Curriculum
-
StartSurveying the attack surface (10:24)
-
StartRecon types and goals (7:44)
-
StartPassive recon pt.1 (7:21)
-
StartPassive recon pt.2 (10:02)
-
StartActive recon (15:01)
-
StartRecon walk-through and tools summary (14:08)
-
StartSection 2 - Powerpoint
-
StartDEMO - Maltego real world example (7:04)
-
StartDEMO - FOCA to examine metadata (4:57)
-
StartDEMO - Harvester (2:02)
-
StartDEMO - Information collection using Recon-ng (6:24)
-
StartScanning & enumeration (8:10)
-
StartIdentifying active hosts pt.1 (9:45)
-
StartIdentifying active hosts pt.2 (13:17)
-
StartIdentifying active services (18:23)
-
StartOS and services fingerprinting (14:41)
-
StartNetwork mapping (9:46)
-
StartFinal thoughts (11:04)
-
StartSection 3 - Powerpoint
-
StartDEMO - Nmap syntax pt.1 (14:21)
-
StartDEMO - Nmap syntax pt.2 (15:32)
-
StartDEMO - Nmap hosts discovery (12:19)
-
StartDEMO - Nmap service discovery (17:10)
-
StartDEMO - Nmap scripts (11:17)
-
StartDEMO - masscan (10:57)