top of page

Certified Ethical Hacker (CEH v11)

BAM Professional Enrichment Course

Building Cities - One Business at a Time

Whether you’re looking to advance in your current occupation or examine new interests, BAM’s Professional Enrichment Courses can assist in advancing your career. Selecting an additional certification or developing imperative insights can help accomplish in-demand hard and soft skills, attributes that enhance marketability when pursuing new roles.

The World Economic Forum reports that learning is a vital skill for all professionals and the requirement of a “global reskilling emergency.” Many organizations estimate that significant economies will offer over 130 million new jobs globally to address altering conditions in the workforce. Predictions show that 42% of the core skills within career roles will experience profound changes this year. The willingness to reskill remains critical to adjusting to new challenges resulting from the change.

The Course - ISBN: 9781644593219

 

Get hands-on experience in Ethical hacking basics with the Certified Ethical Hacker course and lab. The course provides a vivid introduction to the technical foundations of hacking, social engineering, malware threats, and vulnerability analysis with clear and approachable lesson flowcharts, and other tools. It illustrates how to look after web server hacking, web applications, and database attacks. The Certified Ethical Hacker course will assist you in dealing with Cryptographic attacks and defenses concepts.

Here's what you will receive

light_bulb_text_8492622.png
  • 6+ Lessons | 332+ Exercises | 225+ Quizzes | 299+ Flashcards | 150+ Glossary of terms

light_bulb_text_8492624.png
  • 125+ Pre Assessment Questions | 2+ Full-Length Tests | 125+ Post Assessment Questions | 250+ Practice Test Question

light_bulb_text_8492629 (1).png
  • 48+ Performance labs | 48+ Video tutorials | 01:27+ Hours

What you will learn

Lesson 1: Introduction

  • What Is a CEH?

  • About EC-Council

  • Using This Course

  • Objective Map

  • Let's Get Started!

Lesson 2: Ethical Hacking

  • Overview of Ethics

  • Overview of Ethical Hacking

  • Methodologies

  • Methodology of Ethical Hacking

  • Summary

Lesson 3: Networking Foundations

  • Communications Models

  • Topologies

  • Physical Networking

  • IP

  • TCP

  • UDP

  • Internet Control Message Protocol

  • Network Architectures

  • Cloud Computing

  • Summary

Lesson 4: Security Foundations

  • The Triad

  • Risk

  • Policies, Standards, and Procedures

  • Organizing Your Protections

  • Security Technology

  • Being Prepared

  • Summary

Lesson 5: Footprinting and Reconnaissance

  • Open Source Intelligence

  • Domain Name System

  • Passive Reconnaissance

  • Website Intelligence

  • Technology Intelligence

  • Summary

Lesson 6: Scanning Networks

  • Ping Sweeps

  • Port Scanning

  • Vulnerability Scanning

  • Packet Crafting and Manipulation

  • Evasion Techniques

  • Protecting and Detecting

  • Summary

Lesson 7: Enumeration

  • Service Enumeration

  • Remote Procedure Calls

  • Server Message Block

  • Simple Network Management Protocol

  • Simple Mail Transfer Protocol

  • Web-Based Enumeration

  • Summary

Lesson 8: System Hacking

  • Searching for Exploits

  • System Compromise

  • Gathering Passwords

  • Password Cracking

  • Client-Side Vulnerabilities

  • Living Off the Land

  • Fuzzing

  • Post Exploitation

  • Summary

Lesson 9: Malware

  • Malware Types

  • Malware Analysis

  • Creating Malware

  • Malware Infrastructure

  • Antivirus Solutions

  • Persistence

  • Summary

Lesson 10: Sniffing

  • Packet Capture

  • Packet Analysis

  • Spoofing Attacks

  • Summary

Lesson 11: Social Engineering

  • Social Engineering

  • Physical Social Engineering

  • Phishing Attacks

  • Website Attacks

  • Wireless Social Engineering

  • Automating Social Engineering

  • Summary

Lesson 12: Wireless Security 

  • Wi-Fi

  • Bluetooth

  • Mobile Devices

  • Summary

Lesson 13: Attack and Defense

  • Web Application Attacks

  • Denial-of-Service Attacks

  • Application Exploitation

  • Lateral Movement

  • Defense in Depth/Defense in Breadth

  • Defensible Network Architecture

  • Summary

Lesson 14: Cryptography

  • Basic Encryption

  • Symmetric Key Cryptography

  • Asymmetric Key Cryptography

  • Certificate Authorities and Key Management

  • Cryptographic Hashing

  • PGP and S/MIME

  • Disk and File Encryption

  • Summary

Performance Lab

Security Foundations

  • Creating a Personal Linux Firewall Using iptables

  • Viewing Syslog

  • Configuring Audit Policies in Windows

  • Using Event Viewer

Performance Lab

Footprinting and Reconnaissance

  • Using the whois Program

  • Using the theHarvester Tool

  • Using Maltego

  • Using Recon-ng

  • Using ipconfig to Perform Reconnaissance

  • Using dnsrecon

  • Performing Zone Transfer Using dig

  • Using nslookup for Passive Reconnaissance

  • Using the host Program

  • Mirroring Sites with HTTrack

Performance Lab

Scanning Networks

  • Using the fping Command

  • Using Zenmap

  • Scanning a Port Using nmap

  • Using the masscan Command

  • Performing Vulnerability Scanning Using OpenVAS

  • Conducting Vulnerability Scanning Using Nessus

  • Using the hping Program

Performance Lab

Enumeration

  • Using the Metasploit SunRPC Scanner

  • Using nmap Scripts for Enumerating Users

  • Enumerating Data Using enum4linux

Performance Lab

System Hacking

  • Using searchsploit

  • Grabbing a Screenshot of a Target Machine Using Metasploit

  • Using Rainbow Tables

  • Cracking Windows Passwords

  • Cracking a Linux Password Using John the Ripper

  • Exploiting Windows 7 Using Metasploit

Performance Lab

 Malware

  • Observing an MD5-Generated Hash Value

  • Using the msfvenom Program

  • Scanning Malware Using Antivirus

Performance Lab

Sniffing

  • Capturing Network Packets Using tcpdump

  • Using Wireshark

  • Using Ettercap for ARP Spoofing

  • Performing ARP Spoofing

Performance Lab

Social Engineering

  • Detecting a Phishing Site Using Netcraft

  • Using the SET Tool

Performance Lab

Attack and Defense

  • Exploiting a Website Using SQL Injection

  • Attacking a Website Using XSS Injection

  • Simulating a DoS Attack

  • Defending Against a Buffer Overflow Attack

Performance Lab

Cryptography

  • Performing Symmetric Encryption

  • Examining Asymmetric Encryption

  • Using OpenSSL to Create a Public/Private Key Pair

  • Observing an SHA-Generated Hash Value

  • Creating PGP Certification

Lesson 15: Security Architecture and Design 

  • Data Classification

  • Security Models

  • Application Architecture

  • Security Architecture

  • Summary

Lesson 16: Cloud Computing and the Internet of Things 

  • Cloud Computing Overview

  • Cloud Architectures and Deployment

  • Common Cloud Threats

  • Internet of Things

  • Operational Technology

  • Summary

bottom of page