July Release Confetti
150+ New Courses, Hands‑On Labs, And
Interactive Learning Activities
Learn More

Certified Ethical Hacker Certification - CEH v10

Training Architect
course instructor image
Ermin Kreponic
A skilled Java and C++ developer, a security researcher and an individual with an affinity for problem solving and diving head first into the unknown. Independent and highly motivated individual, requiring minimal supervision, with a good perception of time in regard to project timetable. A strong proponent of open-source technologies and passionate Linux user with a great deal of experience in dealing with code deployment and overall system administration (DevOps). On the personal side note, as part of my previous experiences I have worked with all sorts of people from different time zones, and in the process I have come to regard the need to sleep as a sort of an urban myth. Cold cup of coffee from the night before over time became my best friend. But I have no regrets, because I do what I love doing.

Course Introduction

Getting Started

Introduction to Ethical Hacking

Overview of Information Security

Overview of Information Security Threats and Attacks

History of Hacking

Protecting Information

Penetration Testing

Footprinting

Footprinting Process

Reports and Countermeasures

Scanning Networks

Network Scanning Techniques

System Hacking

Password Cracking Techniques

Techniques for Creating and Maintaining Access to the Remote System

Hiding Malicious Programs

Covering Tracks and Destroying Evidence

Wireless Networks and Spoofing

Spoofing Techniques

Attacking and Exploiting Wireless Networks

Social Engineering

Tip, Tricks and Real Life Scenarios

Firewalls and Honeypots

Firewalls

Honeypots

Hacking Web Servers and Web Applications

Let's Attack Web Servers and Web Applications!

Cryptography

About Cryptography

Encryption, Decryption, Cryptanalysis and Attack Vectors

Final practice exam

Final

Final practice exam SOLUTIONS

Final SOLUTIONS

Details

Welcome to the Certified Ethical Hacker Course!


Have you always wanted to learn how to discover weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this exam is for you.


With the rapid development of information technology, almost every industry in the world has some sort of an information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become an imperative to protect these systems and information they contain.


If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then CEH certificate will be of great benefit to you and your organization.


This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.


https://interactive.linuxacademy.com/diagrams/CEH.html


Study Guides

Introduction to Ethical Hacking

This module is an introduction to the course and its objective is to introduce students with important security concepts which will be needed later in the course. The module begins with an overview of information security in which students will learn common terminology, information security concepts, and attack vectors. The following chapters discuss concepts of ethical hacking, penetration testing, and finally information security laws and standards.

Footprinting

Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to learn as much as possible about the target to find a way to break into the system.

Scanning Networks

Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase. In this phase, a number of different procedures are used with the objective to identify hosts, ports, and services in the target network. The whole purpose is to identify vulnerabilities in communication channels and then create an attack plan.

System Hacking

Attackers first collect enough information which can be used to gain access to the system. Usually, it is a low-privileged account which they use to access the system, and then they escalate their privileges to admin level. Once they have the right privileges, their goal is to maintain the access for as long as possible during which time they execute malicious programs, steal information, or simply tamper with the system. After they are done with their attack, attackers hide their tracks by modifying the system logs.

Wireless Networks and Sniffing

Packet sniffing refers to the process of capturing data packets on a network using a program or a device. Packet sniffing programs are called sniffers and they are designed to capture packets that contain information such as passwords, router configuration, traffic, and so on. With sniffers, attackers can access the network traffic from a single point. Turning the NIC system into promiscuous mode allows sniffers to listen to the data that is being transmitted on that network segment.

Social Engineering

Social engineering is a technique which relies on human interaction in order to obtain sensitive information. Attackers use social engineering to extract important information about their targets. This mostly involves interacting with the target’s employees who are in possession of such information.

Firewalls and Honeypots

Firewall is a program or a device that monitors network traffic and allows or blocks traffic in accordance with the defined set of rules. Firewalls act as filters between a network/system and the Internet. Their purpose is to define a set of rules based on which the incoming and outgoing traffic is filtered. These rules ensure that only allowed incoming and outgoing traffic can pass through the firewall, and everything else is blocked.

Hacking Web Servers and Web Applications

Web server is a system used for storing, processing, and delivering websites. It is designed to host web applications, allowing clients to access those applications. It implements client-server model architecture, in which it has the server role, and the browser has the client role.

Cryptography

Cryptography refers to the process of hiding information by converting the readable text into unreadable text using some sort of a key or encryption algorithm. Information protected using cryptography includes emails, files, and other sensitive data.

Instructor Deck

Community

Looking For Team Training?

Learn More